Graph Neural Networks for Physical-Layer Security in Multi-User Flexible-Duplex Networks
Abstract
This paper explores Physical-Layer Security (PLS) in Flexible Duplex (FlexD) networks, considering scenarios involving eavesdroppers. Our investigation revolves around the intricacies of the sum secrecy rate maximization problem, particularly when faced with coordinated and distributed eavesdroppers employing a Minimum Mean Square Error (MMSE) receiver. Our contributions include an iterative classical optimization solution and an unsupervised learning strategy based on Graph Neural Networks (GNNs). To the best of our knowledge, this work marks the initial exploration of GNNs for PLS applications. Additionally, we extend the GNN approach to address the absence of eavesdroppers’ channel knowledge. Extensive numerical simulations highlight FlexD’s superiority over Half-Duplex (HD) communications and the GNN approach’s superiority over the classical method in both performance and time complexity.
Index Terms:
Flexible-duplex (FlexD) communications, graph neural networks (GNN), joint resource allocation, physical-layer security, sum secrecy rate, transmitter/receiver scheduling.I Introduction
Flexible Duplex (FlexD) networks improve spectral efficiency compared to traditional half-duplex (HD) and full-duplex (FD) systems by dynamically adapting time and frequency allocations. Unlike fixed resource blocks for uplink (UL) and downlink (DL) in HD communications, FlexD dynamically adjusts to channel changes. Recent advancements like resource allocation and game-theoretic-mode scheduling enhance network throughput [1, 2, 3, 4]. In the context of robust wireless connectivity beyond 5G, emphasizing security is crucial [5]. Our research focuses on PLS with FlexD strategy to address evolving security challenges in wireless applications.
I-A Related work
Complex wireless networks pose a challenge in securing data against intelligent eavesdroppers. Traditional cryptography is often insufficient. Physical layer security (PLS) leverages the dynamic wireless channels to establish secure connections, operating independently of upper-layer integrations. This simplifies network architectures and enhances security [6, 7, 8]. PLS has been extensively investigated for both conventional HD and FD communications, as discussed in [9, 10, 11, 12] and references therein. The literature on FlexD presents diverse algorithms for resource scheduling, including a graph neural network (GNN) approach [2], iterative pattern search algorithms [1], a radio frame selection algorithm for flexible duplex networks [13], and resource management in Narrowband Internet of Things (NB-IoT) [14]. However, the dynamic scheduling demands in FlexD networks pose a computationally complex challenge due to the combinatorial nature, exacerbated by the need for secure communication in the presence of eavesdroppers. Notably, none of the existing approaches specifically address the goal of PLS-targeted resource allocation in FlexD networks.
I-B Problem statement and contribution
FlexD-based PLS in multi-user networks necessitates effective power allocation and communication direction. The non-convex nature of power allocation and the combinatorial challenges in dynamic scheduling make classical algorithms less efficient. Recent advancements in wireless communication leverage machine learning to tackle such issues in complex networks, extending to resource allocation [15], wireless sensing [16], and user localization [17]. The intrinsic graph structure of wireless networks aligns with the use of GNNs, tailored for processing non-Euclidean data. Recent GNN applications encompass decentralized inference [18], resource allocation with random edge GNNs [19], and link scheduling [20].
In addressing the research gap between multi-user FlexD networks and PLS, this work pioneers the introduction of a novel multi-user FlexD system model. It further proposes both classical optimization and GNN algorithms as the initial endeavors to maximize network secrecy within the existing literature. This study presents several noteworthy contributions:
-
1.
Innovative System Model: Presenting a novel system model that accommodates multiple legitimate users and coordinated eavesdroppers. Assuming optimal conditions for eavesdroppers, we set a lower bound for the system’s sum secrecy rate, initially addressing the optimization problem with classical methods.
-
2.
Efficient Graph Representation of FlexD System: Introducing a distinctive graph representation for the FlexD system, consolidating two paired users into a single node to optimize memory and computational resources. Then, integrating passive eavesdropper nodes into user pairs reduces node count and simplifies the network graph.
-
3.
GNN-Based Optimization Strategy: Introducing an innovative GNN-based optimization to maximize the sum secrecy rate of FlexD networks. This approach outperforms classical methods in performance and time complexity.
-
4.
Enhanced GNN Model: Modifying the GNN model to predict without eavesdropper channel information achieves comparable performance to models with full channel data, enhancing practicality and versatility.
Notation. Scalars: lowercase, Vectors: bold lowercase, Matrices: bold uppercase. Conjugate transpose: , Identity matrix: (). Sets: , Multisets: , Vector concatenation: .
II System Model

II-A Network Model
As illustrated in Fig. 1, the FlexD network comprises users, denoted as , aiming for simultaneous secure communications amid the presence of coordinating eavesdroppers, labeled as . In Fig. 1, solid lines represent desired communication links, dashed lines indicate interference links, and dash-dotted lines denote leakage links dedicated to eavesdropping. For clarity, the figure specifically highlights channels involving , , and . Within the FlexD network, without loss of generality, users with adjacent indices form user pairs, denoted as . In a resource block, each user pair designates one node as the transmitter and the other as the receiver. FlexD users managing interference as receivers face transmitter nodes. As transmitters, they minimize leakage to eavesdroppers and interference to other users. FlexD user pairs dynamically schedule communication directions, capitalizing on wireless channel variations to maximize sum secrecy rates.
Eavesdroppers within the network engage in passive monitoring of FlexD user pair communications. Our analysis assumes adaptive coordinated eavesdroppers, strategically adjusting their positions to optimize the signal-to-interference plus noise ratio (SINR), thereby maximizing the potential for secure communication leakage. Eavesdroppers employ a Minimum Mean Square Error (MMSE) receiver, treating interference as noise, representing the best-case scenario with Gaussian codebook sequences [21]. For simplicity, we assume single-antenna configurations for FlexD users and eavesdroppers, though the analysis can extend to multi-antenna scenarios.
II-B Analytical Model
Consider a FlexD user pair denoted as , where and . For a given resource block, the SINR of the th FlexD node is expressed as
(1) |
where denotes the transmit power of the th node, denotes the wireless channel from to , and denotes the complex Gaussian noise power. The term represents the total interference from transmitter nodes. The binary variable indicates whether is a transmitter or a receiver with and , respectively. This variable ensures that transmitter nodes have zero received SINR and receiver node channels are excluded from the interference expression. Additionally, to analyze the more challenging generalized scenario, we assume non-reciprocal channels, i.e., .
Coordinated eavesdroppers attempt to intercept FlexD communications by treating individual links as desired signals and considering others as interference. This process can be parallelized to decode all the communications from FlexD user pairs. Then, the received SINR of FlexD user at the coordinated eavesdroppers’ end, assuming MMSE receivers, is given by
(2) |
where and denotes the channel vector from the th FlexD user to eavesdroppers and the identity matrix, respectively.
Using (1) and (2), the instantaneous secrecy rate achieved by the communication from th user to th user is expressed as [22]
(3) |
This expresses the achievable secrecy rate by selecting communication from to , with a similar expression for to . One expression evaluates to zero based on the communication direction. The instantaneous secrecy rate expression can be evaluated for all user pairs and communication directions to obtain the sum secrecy rate of the FlexD network. This rate is assured over a fixed channel state in a given resource block. In the next subsection, we formulate the objective function to maximize the sum secrecy rate for all user pairs in the network.
II-C Optimization Problem
The optimization goal is to maximize the sum secrecy rate of the FlexD network, as shown in (3). This entails optimizing power and transmission direction for all user pairs. The objective is mathematically represented as
(4a) | ||||
s.t. | (4b) | |||
(4c) | ||||
(4d) | ||||
(4e) |
where is the maximum transmit power of a FlexD node.
Notably, Addressing this challenge involves grappling with various complexities: i) the problem’s inherent nature is marked by non-convexity, non-differentiability, and a combinatorial structure, making it inherently intricate; ii) the computational burden is heightened due to the inclusion of high-dimensional vector spaces; iii) the absence of readily available optimal solutions hampers seamless integration with supervised learning methods; and iv) real-world scenarios present the added hurdle of lacking eavesdroppers’ channel data, compelling legitimate users to rely on location/distance data for estimating channel conditions. Addressing the challenges of this problem demands innovative solutions. In Section III, we tackle complexities i), ii), and iii) by using classical methods and GNN approaches. Subsequently, in Section IV, we extend our GNN approach to address complexity iv) related to the unavailability of full eavesdroppers’ channel knowledge.
III Sum Secrecy Rate Maximization with Full CSI
Addressing non-convexity and the combinatorial nature, both classical and GNN solutions employ iterative algorithms. This involves transforming Problem (4) into a differentiable function by relaxing the non-negative constraint. As an optimal solution for Problem (4) is unavailable, the proposed GNN model employs unsupervised learning for training. Notably, the GNN solution exhibits quadratic time complexity, ensuring computational efficiency and suitability for implementation on low-level hardware.
III-A Classical Approach
We introduce an iterative algorithm designed to address a relaxed version of the optimization objective presented in (4). Due to the absence of differentiability, we eliminate the non-negative operator in (3). Consequently, the optimization problem can be projected into a higher-dimensional space using the MMSE-SINR equivalence. The resulting relaxed problem is then solved iteratively for and , employing algorithms proposed in [23] and [1], respectively.
This block-coordinate descent mechanism is repeated until the sum secrecy rate converges to a user-defined threshold. However, it is worth noting that this algorithm exhibits diminished performance due to the challenges posed by the high-dimensional optimization landscape. Specifically, in scenarios with an increased number of users in the network, the algorithm optimizing becomes predominant, resulting in a time complexity of under the assumption of linear time complexity for determining the sum secrecy rate. Conversely, in situations with more eavesdroppers in the network, the algorithm optimizing takes precedence, leading to a time complexity of . This elevated time complexity can pose a computational bottleneck, especially in dense real-world scenarios.
III-B Graph Neural Network (GNN) Approach
[width=0.7]figures/input_graph
The classical approach to (4) is computationally complex and suboptimal due to coordinate descent’s susceptibility to converge to local optima. we propose a novel GNN-based unsupervised learning strategy for maximizing sum secrecy rate in the FlexD network. Unlike traditional methods, our approach concurrently optimizes and , reducing computational complexity to with our proposed graph structure as input.
III-B1 GNNs
Learning from graph-structured data presents a unique challenge, requiring the preservation of the underlying graph structure. GNNs effectively address this challenge, consistently yielding promising results in diverse applications [15, 16, 17]. GNNs leverage neighborhood, node, and edge information to iteratively learn node representations within a graph. Most GNN architectures employ information aggregation and combination strategies across successive iterations, commonly known as graph layers. The aggregation and combination steps in the th layer can be formally expressed as:
(5) |
where the function encapsulates the specific neural network architecture tailored to the given use case. The notation denotes the neighbors of node . This iterative process allows GNNs to effectively capture and utilize the structural information inherent in graph data, showcasing their adaptability and efficacy in complex learning tasks.
III-B2 Proposed Graph Representation of the FlexD Network
Our proposed network model manifests as an undirected graph , where and denote the vertices and edges of the graph, respectively. Each node in the graph corresponds to a user pair, resulting in a total of nodes. The node features encapsulate two non-reciprocal channels between the th and th users, denoted as . The interference from user pairs to other user pairs is represented by the edges of the graph, encapsulated as edge features . The proposed graph representation is depicted in Fig. 2.
It is noteworthy that eavesdroppers, being passive listeners, are not represented as vertices in the graph. Channel information from users to eavesdroppers is integrated through linear projections to the node embedding within the graph neural architecture.
III-B3 Proposed GNN Architecture
In our prior research on sum rate maximization of FlexD networks [2], we employed an edge-level task to determine communication direction and a node-level task to identify the power vector of a graph. This work introduces a more computationally and memory-efficient graph structure, extracting both direction and power vectors through a node-level task. Notably, this approach eliminates the need for two distinct aggregation schemes.
The proposed graph structure, depicted in Fig. 2, leverages node features derived from paired channel information and linear projections of channel data to eavesdroppers. The linear projection is mathematically expressed as:
(6) |
where represents a learnable projection matrix, with in our experiments. This projection serves to reduce the dimensionality of the channel information vector, enhancing learning performance and computational efficiency. The node features of the input graph can be expressed as:
(7) |
Here, the superscript denotes the input graph. For a given edge, the input edge features encompass the eight different potential interference channels:
(8) |
where and represent the connecting nodes of the edge, and . The processed input graph is then fed into the GNN to learn representations of node and edge features. The aggregation function is represented as two nested functions. The aggregation function for the th layer can be written as:
(9) |
where is a chosen nonlinearity function111 is used in our experiments. Unlike , this activation function has a well-defined gradient in the negative region, providing a solution to the dying neurons in the negative region., and , , and are weight matrices for node embedding, neighbor node embedding, and edge embedding, respectively. represents the cardinality of node embeddings of the th layer. This aggregation is repeated for layers, simulating an iterative message-passing mechanism. The th layer contains node embeddings that capture the structural information of the entire input graph, enabling node-level decisions regarding power value and communication direction. The transmit power of the th node pair is obtained using:
(10) |
where is the power value of the th user pair, denotes the sigmoid activation function, and is approximated by a multi-layer perception (MLP). The sigmoid activation function constrains power values to the range, scaled to by multiplying by . The direction value of the user pair is found using:
(11) |
where is the direction vector of the th user pair, denotes the softmax function, and is approximated by an MLP.
III-B4 Loss Function in the Unsupervised Learning Setting
In optimizing the trainable weights within our GNN model, we employ an improved variant of the stochastic gradient descent (SGD) algorithm known as AdamW. Despite the non-differentiable nature of problem (4) due to the non-negative operator, sub-derivatives in conjunction with SGD can be used to train the GNN model.
However, our experiments reveal that training performance improves when utilizing a relaxed version of the loss function. The loss function, derived from the relaxed version of problem (4), is expressed as:
(12) | ||||
s.t. | ||||
Here, the negative value of the relaxed sum secrecy rate is employed to transform the problem into a standard neural network minimization task.
IV Sum Secrecy Rate Maximization without Eavesdroppers’ CSI
In real-world scenarios, legitimate users often lack perfect channel state information (CSI) of eavesdroppers’ channels. Instead, they rely on statistical information derived from factors like location and distance to eavesdroppers. This reliance on statistical information poses challenges when maximizing the sum secrecy rate, particularly with algorithms designed for perfect CSI scenarios. Statistical models effectively capture wireless multipath fading channels in practical situations, accounting for large-scale and small-scale fading effects. Distance information, acting as a proxy, becomes valuable in situations where channel information is unavailable.
Theorem 1.
Given the distance matrix to eavesdroppers, there exists an MLP-based approximation such that, for any accuracy threshold , the channel matrix can be approximated as with .
Proof:
Based on Theorem 2.1 [24], given the input and output distributions and , respectively, under specific integrability conditions, the probability measure can be approximated to any given error by transforming using the gradient of a potential function. This transformation can be parameterized by an MLP. ∎
Theorem 1 states that MLPs can effectively map one distribution to another up to a certain precision. Leveraging this property, we can approximate the channel distribution of eavesdroppers by utilizing the distance metric of eavesdroppers. In the proposed graph representation, the distance to each eavesdropper replaces channel information when computing the linear projection (6). This mathematical representation can be expressed as:
(13) |
where denotes a trainable weight matrix. and represent distance vectors to eavesdroppers from the th and th users, respectively.
V Numerical Results
We compare proposed approaches through simulations, evaluating performance and time complexity. We also explore HD and FlexD communications performance, along with the GNN approach with and without eavesdroppers’ full CSI.
V-A Simulation Setup
We consider a network consisting of user pairs and eavesdroppers which are spanned over area. User pairs and the eavesdroppers are Poisson disk distributed over the given area. Users are paired randomly to form user pairs in the network. Channel realizations are generated by assuming Rayleigh fading with free space path loss at frequency and log-normal shadowing. Peak power of is assumed along with a noise level of .
Further, simulation results are presented for two additional baseline strategies: HD, the classical approach without direction selection, and Max Power, where the direction with the strongest channel of the desired link is selected, and is used as the transmit power. All the algorithms are implemented in Python language and tested on CPU for time comparisons. The GNN model consists of 3 layers and the MLPs used to realize (10) and (11) are kept consistent throughout the experiments. GNN models are trained with 10000 network realizations with a batch size of 128 samples. The AdamW optimizer is used with the learning rate of .
V-B Performance Comparison
Fig. 3 presents a comparison of the average sum secrecy rate (ASSR) performance across varying user and eavesdropper counts. The inherent limitations imposed by the coordinated nature of eavesdroppers are evident in the observed spectral efficiency, thereby providing valuable insights into the network’s capabilities under challenging conditions.
Notably, the GNN approach outperforms the classical approach, Max Power, and HD communications by a substantial margin. For instance, with users and eavesdroppers, the GNN achieves a performance gain of -fold and -fold compared to classical and HD scenarios, respectively. However, this performance discrepancy diminishes with an increasing number of users and decreasing number of eavesdroppers due to the diversity introduced by more desired channels and the reduction in leakage links. A noteworthy observation is that the GNN model maintains a constant learnable parameter count, excluding the linear projection matrix, throughout the experiments. This highlights the scalability of the GNN, demonstrating minimal increases in learnable parameters and subsequently reducing computational costs, particularly in larger networks.
Across all scenarios, the classical algorithm with direction selection consistently outperforms the HD communications. This substantiates the claim that direction selection in FlexD networks significantly contributes to performance gains. For instance, in a -user network with and eavesdroppers, the performance gain from FlexD or direction selection is times and times, respectively. Additionally, the superior performance of the Max Power strategy with a better direction selection criterion validates this claim.




V-C Time Complexity
Fig.4a and Fig.4b show heuristic time complexity comparisons of algorithms. Each plot indicates single CPU time for algorithm execution, revealing insights into underlying mathematical operation time complexity. Max Power approach is computationally efficient than the GNN model but suffers from low performance due to the lack of proper power allocation. The GNN model consistently outperforms classical and HD communications with varying user and eavesdropper counts. This advantage becomes more pronounced with an increasing number of eavesdroppers while maintaining a fixed number of users. In Fig.4b with eavesdroppers, the time gap is on the order of , while in Fig.4a with users, it is on the order of . With an increasing number of eavesdroppers, the GNN approach maintains low time complexity growth due to dimensionality reduction in linear projection (6). As a result, the number of neurons needed for eavesdropper information processing remains nearly constant despite the growing number of eavesdroppers.
V-D Location Aided Secrecy Performance of the GNN Approach
In Fig. 4c, we evaluate two GNN models: one using distance knowledge from users to eavesdroppers and the other incorporating full CSI. Distance knowledge proves effective as a proxy for channel information, yielding substantial performance. However, with an increasing number of users, a growing performance gap between the two approaches appears. This implies neural networks may have limitations in fully extracting diversity information solely from distance knowledge.
VI Conclusion
This paper addressed FlexD-based PLS challenges in multi-user networks by introducing a novel system model for multiple users and coordinated eavesdroppers. We formulated and optimized the sum secrecy rate using both a heuristic classical algorithm and a GNN-based strategy. Our contributions include an innovative system model, an efficient graph representation for FlexD network, and a GNN-based optimization outperforming the classical method in sum secrecy performance and time complexity. Notably, the proposed GNN achieves a lower complexity of compared to the classical method’s worst-case complexity of . Leveraging neural networks, we used distance data as a proxy for eavesdroppers’ channel information, achieving reasonable performance. Future work will focus on user-fairness and improving partial CSI estimation through learning.
References
- [1] S. Dayarathna, R. Senanayake, and J. Evans, “Sum-rate optimization in flexible half-duplex networks with transmitter/receiver scheduling,” IEEE Trans. Wireless Commun., 2021.
- [2] T. Perera, S. Atapattu, Y. Fang, P. Dharmawansa, and J. S. Evans, “Flex-Net: a graph neural network approach to resource management in flexible duplex networks,” in IEEE Wireless Commun. and Networking Conf. (WCNC), 2023.
- [3] C. K. Sheemar, L. Badia, and S. Tomasin, “Game-theoretic mode scheduling for dynamic TDD in 5G systems,” IEEE Commun. Lett., vol. 25, no. 7, pp. 2425–2429, 2021.
- [4] M. Song, H. Shan, H. H. Yang, and T. Q. S. Quek, “Joint optimization of fractional frequency reuse and cell clustering for dynamic TDD small cell networks,” IEEE Trans. Wireless Commun., vol. 21, no. 1, pp. 398–412, 2022.
- [5] L. Mucchi, S. Jayousi, S. Caputo, E. Panayirci, S. Shahabuddin, J. Bechtold, I. Morales, R.-A. Stoica, G. Abreu, and H. Haas, “Physical-layer security in 6G networks,” IEEE Open J. Commun. Soc., vol. 2, pp. 1901–1914, 2021.
- [6] S. Atapattu, N. Ross, Y. Jing, and M. Premaratne, “Source-based jamming for physical-layer security on untrusted full-duplex relay,” IEEE Communications Letters, vol. 23, no. 5, pp. 842–846, 2019.
- [7] Y. Wen, L. Liu, J. Li, X. Hou, N. Zhang, M. Dong, M. Atiquzzaman, K. Wang, and Y. Huo, “A covert jamming scheme against an intelligent eavesdropper in cooperative cognitive radio networks,” IEEE Trans. Veh. Technol., 2023.
- [8] N. Arı, N. Thomos, and L. Musavian, “Performance analysis of short packet communications with multiple eavesdroppers,” IEEE Trans. Commun., vol. 70, no. 10, pp. 6778–6789, 2022.
- [9] T.-X. Zheng, H.-M. Wang, J. Yuan, Z. Han, and M. H. Lee, “Physical layer security in wireless ad hoc networks under a hybrid full-/half-duplex receiver deployment strategy,” IEEE Trans. Wireless Commun., vol. 16, no. 6, pp. 3827–3839, 2017.
- [10] S. Atapattu, N. Ross, Y. Jing, Y. He, and J. S. Evans, “Physical-layer security in full-duplex multi-hop multi-user wireless network with relay selection,” IEEE Trans. Wireless Commun., vol. 18, no. 2, pp. 1216–1232, 2019.
- [11] T. Nuradha, K. T. Hemachandra, T. Samarasinghe, and S. Atapattu, “Physical-layer security for untrusted UAV-assisted full-duplex wireless networks,” in IEEE Globecom Workshops (GC Wkshps), 2019.
- [12] M. Wijewardena, T. Samarasinghe, K. T. Hemachandra, S. Atapattu, and J. S. Evans, “Physical layer security for intelligent reflecting surface assisted two–way communications,” IEEE Commun. Lett., vol. 25, no. 7, pp. 2156–2160, 2021.
- [13] H. Liu, Y. Jiao, Y. Gao, L. Sang, and D. Yang, “Performance evaluation of flexible duplex implement based on radio frame selection in lte heterogeneous network,” in Int. Conf. on Telecommun. (ICT), 2015, pp. 308–312.
- [14] H. Malik, M. M. Alam, H. Pervaiz, Y. Le Moullec, A. Al-Dulaimi, S. Parand, and L. Reggiani, “Radio resource management in NB-IoT systems: Empowered by interference prediction and flexible duplexing,” IEEE Netw., vol. 34, no. 1, pp. 144–151, 2019.
- [15] W. Guan, H. Zhang, and V. C. Leung, “Customized slicing for 6G: Enforcing artificial intelligence on resource management,” IEEE Netw., vol. 35, no. 5, pp. 264–271, 2021.
- [16] J. Wang, Q. Gao, X. Ma, Y. Zhao, and Y. Fang, “Learning to sense: Deep learning for wireless sensing with less training efforts,” IEEE Wireless Commun., vol. 27, no. 3, pp. 156–162, 2020.
- [17] M. Zhang, J. Jia, J. Chen, Y. Deng, X. Wang, and A. H. Aghvami, “Indoor localization fusing wifi with smartphone inertial sensors using lstm networks,” IEEE Internet Things J., vol. 8, no. 17, pp. 13 608–13 623, 2021.
- [18] M. Lee, G. Yu, and H. Dai, “Decentralized inference with graph neural networks in wireless communication systems,” IEEE Trans. Mobile Comput., 2021.
- [19] M. Eisen and A. Ribeiro, “Optimal wireless resource allocation with random edge graph neural networks,” IEEE Trans. Signal Process., vol. 68, pp. 2977–2991, 2020.
- [20] Z. Zhao, G. Verma, C. Rao, A. Swami, and S. Segarra, “Link scheduling using graph neural networks,” IEEE Trans. Wireless Commun., 2022.
- [21] R. Bustin and S. Shamai, “Mmse of “bad” codes,” IEEE Trans. Inform. Theory, vol. 59, no. 2, pp. 733–743, 2012.
- [22] J. Barros and M. R. D. Rodrigues, “Secrecy capacity of wireless channels,” in IEEE Int. Symp. Inf. Theory (ISIT), 2006, pp. 356–360.
- [23] H. Xu, G. Caire, W. Xu, and M. Chen, “Weighted sum secrecy rate maximization for d2d underlaid cellular networks,” IEEE Trans. Commun., vol. 68, no. 1, pp. 349–362, 2019.
- [24] Y. Lu and J. Lu, “A universal approximation theorem of deep neural networks for expressing probability distributions,” Adv. Neural Inf. Process Syst. (NeurIPS), vol. 33, pp. 3094–3105, 2020.