GMM Based Semi-Supervised Learning for Channel-Based Authentication Scheme
暂无分享,去创建一个
Rachel Greenstadt | Kapil R. Dandekar | John MacLaren Walsh | Nikhil Gulati | K. Dandekar | J. Walsh | R. Greenstadt | Nikhil Gulati
[1] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[2] Richard P. Martin,et al. Detecting and Localizing Wireless Spoofing Attacks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[3] Sneha Kumar Kasera,et al. Robust location distinction using temporal link signatures , 2007, MobiCom '07.
[4] Kapil R. Dandekar,et al. Two port reconfigurable CRLH leaky wave antenna with improved impedance matching and beam tuning , 2009, 2009 3rd European Conference on Antennas and Propagation.
[5] Hamid Jafarkhani,et al. A reconfigurable multiple-input multiple-output communication system , 2008, IEEE Transactions on Wireless Communications.
[6] David R. Cheriton,et al. Detecting identity-based attacks in wireless networks using signalprints , 2006, WiSe '06.
[7] Larry J. Greenstein,et al. Channel-based spoofing detection in frequency-selective rayleigh channels , 2009, IEEE Transactions on Wireless Communications.
[8] Larry J. Greenstein,et al. Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.
[9] Kapil R. Dandekar,et al. A Reconfigurable Antenna-Based Solution for Stationary Device Authentication in Wireless Networks , 2012 .
[10] B. Clerckx,et al. Channel Characterization of Indoor Wireless Personal Area Networks , 2006, IEEE Transactions on Antennas and Propagation.
[11] Kapil R. Dandekar,et al. Enhancing wireless security through reconfigurable antennas , 2010, 2010 IEEE Radio and Wireless Symposium (RWS).
[12] Mohammed J. Zaki,et al. ADMIT: anomaly-based data mining for intrusions , 2002, KDD.
[13] J.-E. Berg,et al. Temporal radio channel variations with stationary terminal , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.
[14] Kapil R. Dandekar,et al. Impact of pattern reconfigurable antennas on Interference Alignment over measured channels , 2012, 2012 IEEE Globecom Workshops.
[15] P. Pagani,et al. Characterization and Modeling of Temporal Variations on an Ultrawideband Radio Link , 2006, IEEE Transactions on Antennas and Propagation.
[16] Nasser M. Nasrabadi,et al. Pattern Recognition and Machine Learning , 2006, Technometrics.
[17] Leonid Portnoy,et al. Intrusion detection with unlabeled data using clustering , 2000 .
[18] Yong Sheng,et al. Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[19] Srinivasan Parthasarathy,et al. Towards NIC-based intrusion detection , 2003, KDD '03.
[20] R. Redner,et al. Mixture densities, maximum likelihood, and the EM algorithm , 1984 .
[21] David González,et al. Learning algorithm for reconfigurable antenna state selection , 2012, 2012 IEEE Radio and Wireless Symposium.