相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Comparison of Statistical and Machine Learning Techniques for Physical Layer Authentication
Linda Senigagliesi et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)
Exploiting Randomized Continuous Wave in Secure Backscatter Communications
Qian Yang et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
Multiuser Physical Layer Authentication in Internet of Things With Data Augmentation
Run-Fa Liao et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
RF Fingerprinting Unmanned Aerial Vehicles With Non-Standard Transmitter Waveforms
Nasim Soltani et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)
Design of a Hybrid RF Fingerprint Extraction and Device Classification Scheme
Linning Peng et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
Learning-Aided Physical Layer Authentication as an Intelligent Process
He Fang et al.
IEEE TRANSACTIONS ON COMMUNICATIONS (2019)
Secure Short-Packet Communications for Mission-Critical IoT Applications
Hui-Ming Wang et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2019)
Impedance-Based Gaussian Processes for Modeling Human Motor Behavior in Physical and Non-Physical Interaction
Jose R. Medina et al.
IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING (2019)
Machine Learning for Intelligent Authentication in 5G and Beyond Wireless Networks
He Fang et al.
IEEE WIRELESS COMMUNICATIONS (2019)
Physical-Layer Security of 5G Wireless Networks for IoT: Challenges and Opportunities
Ning Wang et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
Received Signal Strength Based Gait Authentication
Marshed Mohamed et al.
IEEE SENSORS JOURNAL (2018)
Authenticating Users Through Fine-Grained Channel Information
Hongbo Liu et al.
IEEE TRANSACTIONS ON MOBILE COMPUTING (2018)
Combating the Control Signal Spoofing Attack in UAV Systems
Ke-Wen Huang et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)
Analysis of Channel-Based User Authentication by Key-Less and Key-Based Approaches
Stefano Tomasin
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2018)
Physical-layer entity authentication scheme for mobile MIMO systems
Saud Althunibat et al.
IET COMMUNICATIONS (2018)
Physical Layer Authentication Enhancement Using a Gaussian Mixture Model
Xiaoying Qiu et al.
IEEE ACCESS (2018)
Physical-Layer Authentication Based on Extreme Learning Machine
Ning Wang et al.
IEEE COMMUNICATIONS LETTERS (2017)
Game Theoretic Study on Channel-Based Authentication in MIMO Systems
Liang Xiao et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2017)
Physical-layer authentication for wireless security enhancement: current challenges and future developments
Xianbin Wang et al.
IEEE COMMUNICATIONS MAGAZINE (2016)
Device Fingerprinting in Wireless Networks: Challenges and Opportunities
Qiang Xu et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)
Wireless Physical-Layer Identification: Modeling and Validation
Wenhao Wang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks
Liang Xiao et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2016)
Physical Layer Authentication Enhancement Using Two-Dimensional Channel Quantization
Jiazi Liu et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2016)
Design and Analysis of the Key Management Mechanism in Evolved Multimedia Broadcast/Multicast Service
Yi Ren et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2016)
The Challenges Facing Physical Layer Security
Wade Trappe
IEEE COMMUNICATIONS MAGAZINE (2015)
QuaDRiGa: A 3-D Multi-Cell Channel Model With Time Evolution for Enabling Virtual Field Trials
Stephan Jaeckel et al.
IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION (2014)
Physical Layer Authentication for Mobile Systems with Time-Varying Carrier Frequency Offsets
Weikun Hou et al.
IEEE TRANSACTIONS ON COMMUNICATIONS (2014)
Physical Layer Authentication over MIMO Fading Wiretap Channels
Paolo Baracca et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2012)
EXPLOITING THE PHYSICAL LAYER FOR ENHANCED SECURITY
Suhas Mathur et al.
IEEE WIRELESS COMMUNICATIONS (2010)
A framework of physical layer technique assisted authentication for vehicular communication networks
Wen Hong et al.
SCIENCE CHINA-INFORMATION SCIENCES (2010)