A survey on deep learning techniques in wireless signal recognition

X Li, F Dong, S Zhang, W Guo - Wireless Communications and …, 2019 - Wiley Online Library
Wireless signal recognition plays an important role in cognitive radio, which promises a
broad prospect in spectrum monitoring and management with the coming applications for …

User authentication schemes using machine learning methods—a review

N Siddiqui, L Pryor, R Dave - Proceedings of International Conference on …, 2021 - Springer
With the recent advancements in technology, more and more people rely on their personal
devices to store their sensitive information. Concurrently, the environment in which these …

Radio identity verification-based IoT security using RF-DNA fingerprints and SVM

D Reising, J Cancelleri, TD Loveless… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
It is estimated that the number of Internet-of-Things (IoT) devices will reach 75 billion in the
next five years. Most of those currently and soon-to-be deployed devices lack sufficient …

Semi-supervised specific emitter identification based on bispectrum feature extraction CGAN in multiple communication scenarios

K Tan, W Yan, L Zhang, Q Ling… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Specific emitter identification (SEI) refers to the technology that uses the inherent defects of
the physical layer of a hardware device to identify and uniquely associate a single emitter …

Comparison of statistical and machine learning techniques for physical layer authentication

L Senigagliesi, M Baldi, E Gambi - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this article we consider authentication at the physical layer, in which the authenticator
aims at distinguishing a legitimate supplicant from an attacker on the basis of the …

Multi-task based deep learning approach for open-set wireless signal identification in ISM band

J Gong, X Qin, X Xu - IEEE Transactions on Cognitive …, 2021 - ieeexplore.ieee.org
Wireless signal identification plays an important role in effectively implementing spectrum
monitoring and management. However, in ISM (Industrial, Science and Medical) band, it …

Instantaneous frequency estimation for wheelset bearings weak fault signals using second-order synchrosqueezing S-transform with optimally weighted sliding …

R Lin, Z Liu, Y Jin - ISA transactions, 2021 - Elsevier
The second-order synchrosqueezing S-transform (SSST2) is an important method for
instantaneous frequency (IF) estimation of non-stationary signals. Based on the …

Radio frequency fingerprint identification based on deep complex residual network

S Wang, H Jiang, X Fang, Y Ying, J Li, B Zhang - IEEE access, 2020 - ieeexplore.ieee.org
Radio frequency fingerprint identification is a non-password authentication method based
on the physical layer hardware of the communication device. Deep learning methods …

射频指纹识别的研究现状及趋势

曾勇虎, 陈翔, 林云, 郝晓军, 许雄, 汪连栋 - 电波科学学报, 2020 - cjors.cn
传统的基于密码机制和安全协议的无线网络安全存在隐患, 新的基于物理层的射频指纹(radio
frequency fingerprinting, RFF) 方法利用发射机射频信号的细微差异来区分不同个体 …

A Comprehensive Survey on Physical Layer Authentication Techniques: Categorization and Analysis of Model-Driven and Data-Driven Approaches

Z Lai, Z Chang, M Sha, Q Zhang, N Xie, C Chen… - ACM Computing …, 2024 - dl.acm.org
The open and broadcast nature of wireless mediums introduces significant security
vulnerabilities, making authentication a critical concern in wireless networks. In recent years …