Related references
Note: Only part of the references are listed.Comparison of Statistical and Machine Learning Techniques for Physical Layer Authentication
Linda Senigagliesi et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)
Detection of Eavesdropping Attack in UAV-Aided Wireless Systems: Unsupervised Learning With One-Class SVM and K-Means Clustering
Tiep M. Hoang et al.
IEEE WIRELESS COMMUNICATIONS LETTERS (2020)
Independence-Checking Coding for OFDM Channel Training Authentication: Protocol Design, Security, Stability, and Tradeoff Analysis
Dongyang Xu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)
Challenges of Multi-Factor Authentication for Securing Advanced IoT Applications
Aleksandr Ometov et al.
IEEE NETWORK (2019)
Learning-Aided Physical Layer Authentication as an Intelligent Process
He Fang et al.
IEEE TRANSACTIONS ON COMMUNICATIONS (2019)
Enhanced Authentication Based on Angle of Signal Arrivals
Amr Abdelaziz et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)
Machine Learning for Intelligent Authentication in 5G and Beyond Wireless Networks
He Fang et al.
IEEE WIRELESS COMMUNICATIONS (2019)
Physical-Layer Security of 5G Wireless Networks for IoT: Challenges and Opportunities
Ning Wang et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
Deep Neural Networks for CSI-Based Authentication
Qian Wang et al.
IEEE ACCESS (2019)
Machine Learning-based Physical Layer Authentication using Neighborhood Component Analysis in MIMO Wireless Communications
Jiseok Yoon et al.
2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE (2019)
Secret Key Exchange and Authentication via Randomized Spatial Modulation and Phase Shifting
Hasan Taha et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)
PHY-Layer Authentication With Multiple Landmarks With Reduced Overhead
Liang Xiao et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2018)
Analysis of Channel-Based User Authentication by Key-Less and Key-Based Approaches
Stefano Tomasin
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2018)
Securing the Internet of Things in the Age of Machine Learning and Software-Defined Networking
Francesco Restuccia et al.
IEEE INTERNET OF THINGS JOURNAL (2018)
IoT Security Techniques Based on Machine Learning How do IoT devices use AI to enhance security?
Liang Xiao et al.
IEEE SIGNAL PROCESSING MAGAZINE (2018)
POSTER: WLAN Device Fingerprinting using Channel State Information (CSI)
Florian Adamsky et al.
WISEC'18: PROCEEDINGS OF THE 11TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS (2018)
Physical-Layer Authentication Based on Extreme Learning Machine
Ning Wang et al.
IEEE COMMUNICATIONS LETTERS (2017)
Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges
Yiliang Liu et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)
PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks
Liang Xiao et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2016)
Physical Layer Authentication Enhancement Using Two-Dimensional Channel Quantization
Jiazi Liu et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2016)
Artificial-Noise-Aided Physical Layer Phase Challenge-Response Authentication for Practical OFDM Transmission
Xiaofu Wu et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2016)
The Challenges Facing Physical Layer Security
Wade Trappe
IEEE COMMUNICATIONS MAGAZINE (2015)
Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints
Amitav Mukherjee
PROCEEDINGS OF THE IEEE (2015)
Physical Layer Authentication for Mobile Systems with Time-Varying Carrier Frequency Offsets
Weikun Hou et al.
IEEE TRANSACTIONS ON COMMUNICATIONS (2014)
Wireless User Authentication via Comparison of Power Spectral Densities
Jitendra K. Tugnait
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2013)
MIMO Authentication via Deliberate Fingerprinting at the Physical Layer
Paul L. Yu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2011)
PHYSICAL LAYER SECURITY IN WIRELESS NETWORKS: A TUTORIAL
Yi-Sheng Shiu et al.
IEEE WIRELESS COMMUNICATIONS (2011)
Channel-Based Spoofing Detection in Frequency-Selective Rayleigh Channels
Liang Xiao et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2009)
Using the physical layer for wireless authentication in time-variant channels
Liang Xiao et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2008)
A Stochastic MIMO radio channel model with experimental validation
JP Kermoal et al.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2002)