Application of Dual-Tree Complex Wavelet Transforms to Burst Detection and RF Fingerprint Classification
暂无分享,去创建一个
[1] K. Riedel. Numerical Bayesian Methods Applied to Signal Processing , 1996 .
[2] O. Rioul,et al. Wavelets and signal processing , 1991, IEEE Signal Processing Magazine.
[3] Michael A. Temple,et al. Sensitivity Analysis of Burst Detection and RF Fingerprinting Classification Performance , 2009, 2009 IEEE International Conference on Communications.
[4] R. Fisher. THE USE OF MULTIPLE MEASUREMENTS IN TAXONOMIC PROBLEMS , 1936 .
[5] Hagit Messer,et al. Detection of a known transient signal of unknown scaling and arrival time , 1994, IEEE Trans. Signal Process..
[6] Witold Kinsner,et al. Transient analysis and genetic algorithms for classification , 1995, IEEE WESCANEX 95. Communications, Power, and Computing. Conference Proceedings.
[7] Hagit Messer,et al. The use of the wavelet transform in the detection of an unknown transient signal , 1992, IEEE Trans. Inf. Theory.
[8] Shigeo Abe DrEng. Pattern Classification , 2001, Springer London.
[9] W. Kinsner,et al. Multifractal modelling of radio transmitter transients for classification , 1997, IEEE WESCANEX 97 Communications, Power and Computing. Conference Proceedings.
[10] W. Hargrove,et al. Photogrammetric Engineering & Remote Sensing , 2022 .
[11] Robert F. Mills,et al. Radio frequency fingerprinting commercial communication devices to enhance electronic security , 2008, Int. J. Electron. Secur. Digit. Forensics.
[12] Orhan Arikan,et al. Short-time Fourier transform: two fundamental properties and an optimal implementation , 2003, IEEE Trans. Signal Process..
[13] Dirk Grunwald,et al. Wireless innovation through software radios , 2008, CCRV.
[14] Wade Trappe,et al. Detecting Spoofing and Anomalous Traffic in Wireless Networks via Forge-Resistant Relationships , 2007, IEEE Transactions on Information Forensics and Security.
[15] O. Ureten,et al. Detection of radio transmitter turn-on transients , 1999 .
[16] Ivan W. Selesnick,et al. On the Dual-Tree Complex Wavelet Packet and $M$-Band Transforms , 2008, IEEE Transactions on Signal Processing.
[17] Michael A. Temple,et al. Application of wavelet-based RF fingerprinting to enhance wireless network security , 2009, Journal of Communications and Networks.
[18] Robert F. Mills,et al. Using Spectral Fingerprints to Improve Wireless Network Security , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[19] René Carmona. Wavelet identification of transients in noisy time series , 1993, Optics & Photonics.
[20] D. Hatzinakos,et al. Bayesian frame synchronization for 802.11a WLANs: experimental results , 2005, Canadian Conference on Electrical and Computer Engineering, 2005..
[21] J. Dudczyk,et al. Mixed Method Based on Intrapulse Data and Radiated Emission to Emitter Sources Recognition , 2006, 2006 International Conference on Microwaves, Radar & Wireless Communications.
[22] Oktay Ureten,et al. Wireless security through RF fingerprinting , 2007, Canadian Journal of Electrical and Computer Engineering.
[23] V. Abhaikumar,et al. Wavelet based signal processing algorithms for early target detection , 2003, TENCON 2003. Conference on Convergent Technologies for Asia-Pacific Region.
[24] R.T. Johnk,et al. Electromagnetic signatures of WLAN cards and network security , 2005, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..
[25] Jay P. Boris,et al. Fulfilling the Roosevelts' Vision for American Naval Power (1923-2005) , 2006 .
[26] Michael A. Temple,et al. Application of wavelet denoising to improve OFDM-based signal detection and classification , 2010, Secur. Commun. Networks.
[27] Dimitrios Hatzinakos,et al. Bayesian frame synchronization using periodic preamble for OFDM-based WLANs , 2005, IEEE Signal Processing Letters.
[28] J. Dudczyk,et al. The utilization of unintentional radiation for identification of the radiation sources , 2004, 34th European Microwave Conference, 2004..
[29] G. V. Anand,et al. Detection of transient signals by wavelet packet transform and stochastic resonance , 2004, 2004 IEEE Region 10 Conference TENCON 2004..
[30] O. H. Tekbas,et al. An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions , 2004, Canadian Journal of Electrical and Computer Engineering.
[31] อนิรุธ สืบสิงห์,et al. Data Mining Practical Machine Learning Tools and Techniques , 2014 .
[32] Michel Barbeau,et al. DETECTION OF TRANSIENT IN RADIO FREQUENCY FINGERPRINTING USING SIGNAL PHASE , 2003 .
[33] Simon Haykin,et al. Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.
[34] O. Ureten,et al. Bayesian detection of Wi-Fi transmitter RF fingerprints , 2005 .
[35] Stephen Del Marco,et al. Improved transient signal detection using a wavepacket-based detector with an extended translation-invariant wavelet transform , 1997, IEEE Trans. Signal Process..
[36] E. Merenyi,et al. Relevance-based Feature Extraction from Hyperspectral Images in the Complex Wavelet Domain , 2006, 2006 IEEE Mountain Workshop on Adaptive and Learning Systems.
[37] Stephen P. Del Marco,et al. M-band wavepacket-based transient signal detector using a translation-invariant wavelet transform , 1994 .
[38] O. Ureten,et al. Generalised dimension characterisation of radio transmitter turn-on transients , 2000 .
[39] T. Higuchi. Approach to an irregular time series on the basis of the fractal theory , 1988 .
[40] Hagit Messer,et al. Detection of a transient signal of unknown scaling and arrival time using the discrete wavelet transform , 1991, [Proceedings] ICASSP 91: 1991 International Conference on Acoustics, Speech, and Signal Processing.
[41] H. Hotelling. The Generalization of Student’s Ratio , 1931 .
[42] L. E. Langley,et al. Specific emitter identification (SEI) and classical parameter fusion technology , 1993, Proceedings of WESCON '93.
[43] O. H. Tekbas,et al. Improvement of transmitter identification system for low SNR transients , 2004 .
[44] Richard P. Martin,et al. Detecting and Localizing Wireless Spoofing Attacks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[45] Oktay Üreten,et al. Improved Coarse Timing For Burst Mode OFDM , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[46] Erzsébet Merényi,et al. GENERALIZED RELEVANCE LEARNING VECTOR QUANTIZATION FOR CLASSIFICATION-DRIVEN FEATURE EXTRACTION FROM HYPERSPECTRAL DATA , 2006 .
[47] A. Walden,et al. Wavelet Methods for Time Series Analysis , 2000 .
[48] J. Dudczyk,et al. Applying the radiated emission to the specific emitter identification , 2004, 15th International Conference on Microwaves, Radar and Wireless Communications (IEEE Cat. No.04EX824).
[49] Jeyanthi Hall,et al. Detection of rogue devices in wireless networks , 2006 .
[50] M. Mendenhall,et al. Relevance-Based Feature Extraction for Hyperspectral Images , 2008, IEEE Transactions on Neural Networks.
[51] Yong Sheng,et al. Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[52] A. Prochazka,et al. Wavelet transform use for signal classification by self-organizing neural networks , 1995 .
[53] Marina Vannucci,et al. Wavelet tests for the detection of transients in the VIRGO interferometric gravitational wave detector , 2005, IEEE Transactions on Instrumentation and Measurement.
[54] Richard Baraniuk,et al. The Dual-tree Complex Wavelet Transform , 2007 .