Table 1 Symbols used with description.
From: 6G -enabled qubit-based concealed communication with AI-driven breach detection in autonomous fleets
Symbol | Description | Symbol | Description |
|---|---|---|---|
\(\:{h}_{n}\) | Sharing instances | \(\:S\) | Communication analysis |
\(\:{\:h}_{0}\) | Single vehicle | \(\:{h}_{n}\) | Total vehicle count |
\(\:{h}^{{\prime\:}}\) | Neighbor vehicle (initial) | \(\:{\:n}_{f}\) | Information sharing |
\(\:{x}^{{\prime\:}}\) | Security parameter for sharing | \(\:{m}_{0}\) | Heterogeneous communication |
\(\:{\:q}^{{\prime\:}}\) | Request | \(\:{p}_{s}\) | Response |
\(\:L\) | Security measure | \(\:{m}^{{\prime\:}}\) | Data processing time |
\(\:{d}^{{\prime\:}}\) | Previous information state | \(\:I\) | Information sharing identification |
\(\:T\) | Authentication | \(\:{\:c}_{h}\) | Secured information sharing |
\(\:{\:e}_{d}\) | Recommendation | \(\:E\) | Adverse breach detection |
\(\:{b}_{e}\left({n}_{f}\right)\) | Adverse information sharing instances | \(\:{\:u}_{r}\) | Current security instances |
\(\:{g}^{{\prime\:}}\) | Qubits | \(\:{i}_{0}\left({n}_{f}\right)\) | Training instances |
\(\:{r}^{{\prime\:}}\) | Authenticated qubits | \(\:{\:i}_{0}\) | Secure communication between direct neighbors |
\(\:C\left(E\right)\) | Mapping function | \(\:S\left(O\right)\) | Mapping decision |
\(\:S\left({s}_{a}\right)\) | Mapping factor | \(\:E\left(T\right)\) | Authentication process |
\(\:I\left({h}^{{\prime\:}}\right)\) | Secure neighbor identification | \(\:K\) | Security breach detection |