Deep-Learning-Based Physical Layer Authentication for Industrial Wireless Sensor Networks
暂无分享,去创建一个
Hong Wen | Jinsong Wu | Feiyi Xie | Run-Fa Liao | Yixin Jiang | Fei Pan | Aidong Xu | Minggui Cao | Jinsong Wu | H. Wen | Yixin Jiang | Aidong Xu | Runfa Liao | Fei Pan | Feiyi Xie | Minggui Cao
[1] Ming Xiao,et al. Physical-Layer Security for Industrial Wireless Control Systems: Basics and Future Directions , 2018, IEEE Industrial Electronics Magazine.
[2] Xianbin Wang,et al. Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.
[3] J. Sobana,et al. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks , 2014 .
[4] Wolfgang Kellerer,et al. Achieving Hybrid Wired/Wireless Industrial Networks With WDetServ: Reliability-Based Scheduling for Delay Guarantees , 2018, IEEE Transactions on Industrial Informatics.
[5] Hong Wen,et al. A Novel Physical Layer Authentication Method with Convolutional Neural Network , 2019, 2019 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA).
[6] Manu Bansal,et al. A review on lightweight cryptography algorithms for data security and authentication in IoTs , 2017, 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC).
[7] Mert Bal. Industrial applications of collaborative Wireless Sensor Networks: A survey , 2014, 2014 IEEE 23rd International Symposium on Industrial Electronics (ISIE).
[8] Manik Lal Das,et al. Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.
[9] Kenneth E. Barner,et al. Sensor Data Cryptography in Wireless Sensor Networks , 2008, IEEE Transactions on Information Forensics and Security.
[10] Abdesselam Bouzerdoum,et al. A generalized feedforward neural network architecture for classification and regression , 2003, Neural Networks.
[11] Georges Kaddoum,et al. Cross-Layer Authentication Protocol Design for Ultra-Dense 5G HetNets , 2018, 2018 IEEE International Conference on Communications (ICC).
[12] Hong Wen,et al. Lightweight one-time password authentication scheme based on radio-frequency fingerprinting , 2018, IET Commun..
[13] Hong Wen,et al. The Rayleigh Fading Channel Prediction via Deep Learning , 2018, Wirel. Commun. Mob. Comput..
[14] Xuemin Shen,et al. Channel-based physical layer authentication , 2014, 2014 IEEE Global Communications Conference.
[15] Eduard A. Jorswieck,et al. To avoid or not to avoid CSI leakage in physical layer secret communication systems , 2015, IEEE Communications Magazine.
[16] Mihail L. Sichitiu,et al. Physical Security Perimeters for Wireless Local Area Networks , 2006, Int. J. Netw. Secur..
[17] Meng Joo Er,et al. Wireless Sensor Networks for Industrial Environments , 2005, International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06).
[18] H. Vincent Poor,et al. Authenticating Users Through Fine-Grained Channel Information , 2018, IEEE Transactions on Mobile Computing.
[19] Richard P. Martin,et al. Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks , 2010, IEEE Transactions on Vehicular Technology.
[20] Yushan Li,et al. Optimized Coherent Integration-Based Radio Frequency Fingerprinting in Internet of Things , 2018, IEEE Internet of Things Journal.
[21] Matthias Hollick,et al. Survey on Wireless Sensor Network Technologies for Industrial Automation: The Security and Quality of Service Perspectives , 2010, Future Internet.
[22] Jitendra K. Tugnait,et al. Wireless User Authentication via Comparison of Power Spectral Densities , 2013, IEEE Journal on Selected Areas in Communications.
[23] Geoffrey Ye Li,et al. Power of Deep Learning for Channel Estimation and Signal Detection in OFDM Systems , 2017, IEEE Wireless Communications Letters.
[24] Ning Wang,et al. Physical-Layer Authentication Based on Extreme Learning Machine , 2017, IEEE Communications Letters.
[25] Zhibo Pang,et al. Ultra High Performance Wireless Control for Critical Applications: Challenges and Directions , 2017, IEEE Transactions on Industrial Informatics.
[26] Nasir Ghani,et al. Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations , 2019, IEEE Communications Surveys & Tutorials.
[27] Liang Xiao,et al. Learning-Based PHY-Layer Authentication for Underwater Sensor Networks , 2019, IEEE Communications Letters.
[28] Guigang Zhang,et al. Deep Learning , 2016, Int. J. Semantic Comput..
[29] Georges Kaddoum,et al. Securing Fog-to-Things Environment Using Intrusion Detection System Based On Ensemble Learning , 2019, 2019 IEEE Wireless Communications and Networking Conference (WCNC).
[30] R. Clarke. A statistical theory of mobile-radio reception , 1968 .
[31] Wei Wei,et al. RSA-based digital image encryption algorithm in wireless sensor networks , 2010, 2010 2nd International Conference on Signal Processing Systems.
[32] J.A. Anderson,et al. Neural Network Models for Pattern Recognition and Associative Memory , 2002 .