A survey on deep learning techniques in wireless signal recognition
X Li, F Dong, S Zhang, W Guo - Wireless Communications and …, 2019 - Wiley Online Library
Wireless signal recognition plays an important role in cognitive radio, which promises a
broad prospect in spectrum monitoring and management with the coming applications for …
broad prospect in spectrum monitoring and management with the coming applications for …
User authentication schemes using machine learning methods—a review
N Siddiqui, L Pryor, R Dave - Proceedings of International Conference on …, 2021 - Springer
With the recent advancements in technology, more and more people rely on their personal
devices to store their sensitive information. Concurrently, the environment in which these …
devices to store their sensitive information. Concurrently, the environment in which these …
Radio identity verification-based IoT security using RF-DNA fingerprints and SVM
D Reising, J Cancelleri, TD Loveless… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
It is estimated that the number of Internet-of-Things (IoT) devices will reach 75 billion in the
next five years. Most of those currently and soon-to-be deployed devices lack sufficient …
next five years. Most of those currently and soon-to-be deployed devices lack sufficient …
Semi-supervised specific emitter identification based on bispectrum feature extraction CGAN in multiple communication scenarios
K Tan, W Yan, L Zhang, Q Ling… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Specific emitter identification (SEI) refers to the technology that uses the inherent defects of
the physical layer of a hardware device to identify and uniquely associate a single emitter …
the physical layer of a hardware device to identify and uniquely associate a single emitter …
Comparison of statistical and machine learning techniques for physical layer authentication
In this article we consider authentication at the physical layer, in which the authenticator
aims at distinguishing a legitimate supplicant from an attacker on the basis of the …
aims at distinguishing a legitimate supplicant from an attacker on the basis of the …
Multi-task based deep learning approach for open-set wireless signal identification in ISM band
J Gong, X Qin, X Xu - IEEE Transactions on Cognitive …, 2021 - ieeexplore.ieee.org
Wireless signal identification plays an important role in effectively implementing spectrum
monitoring and management. However, in ISM (Industrial, Science and Medical) band, it …
monitoring and management. However, in ISM (Industrial, Science and Medical) band, it …
Instantaneous frequency estimation for wheelset bearings weak fault signals using second-order synchrosqueezing S-transform with optimally weighted sliding …
R Lin, Z Liu, Y Jin - ISA transactions, 2021 - Elsevier
The second-order synchrosqueezing S-transform (SSST2) is an important method for
instantaneous frequency (IF) estimation of non-stationary signals. Based on the …
instantaneous frequency (IF) estimation of non-stationary signals. Based on the …
Radio frequency fingerprint identification based on deep complex residual network
S Wang, H Jiang, X Fang, Y Ying, J Li, B Zhang - IEEE access, 2020 - ieeexplore.ieee.org
Radio frequency fingerprint identification is a non-password authentication method based
on the physical layer hardware of the communication device. Deep learning methods …
on the physical layer hardware of the communication device. Deep learning methods …
射频指纹识别的研究现状及趋势
曾勇虎, 陈翔, 林云, 郝晓军, 许雄, 汪连栋 - 电波科学学报, 2020 - cjors.cn
传统的基于密码机制和安全协议的无线网络安全存在隐患, 新的基于物理层的射频指纹(radio
frequency fingerprinting, RFF) 方法利用发射机射频信号的细微差异来区分不同个体 …
frequency fingerprinting, RFF) 方法利用发射机射频信号的细微差异来区分不同个体 …
A Comprehensive Survey on Physical Layer Authentication Techniques: Categorization and Analysis of Model-Driven and Data-Driven Approaches
The open and broadcast nature of wireless mediums introduces significant security
vulnerabilities, making authentication a critical concern in wireless networks. In recent years …
vulnerabilities, making authentication a critical concern in wireless networks. In recent years …