Physical-Layer Authentication Based on Extreme Learning Machine
暂无分享,去创建一个
Ning Wang | Liang Xiao | Ting Jiang | Shichao Lv | Shichao Lv | Ting Jiang | Liang Xiao | Ning Wang
[1] Larry J. Greenstein,et al. Channel-based spoofing detection in frequency-selective rayleigh channels , 2009, IEEE Transactions on Wireless Communications.
[2] Zhu Han,et al. FHY-layer authentication with multiple landmarks with reduced communication overhead , 2017, 2017 IEEE International Conference on Communications (ICC).
[3] Jitendra K. Tugnait,et al. Wireless User Authentication via Comparison of Power Spectral Densities , 2013, IEEE Journal on Selected Areas in Communications.
[4] D. G. Chapman,et al. Mathematics of Statistics, Part Two. Second Edition. , 1952 .
[5] Weihua Zhuang,et al. PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks , 2016, IEEE Transactions on Vehicular Technology.
[6] Lajos Hanzo,et al. Physical-layer authentication for wireless security enhancement: current challenges and future developments , 2016, IEEE Communications Magazine.
[7] Weihua Zhuang,et al. Game Theoretic Study on Channel-Based Authentication in MIMO Systems , 2017, IEEE Transactions on Vehicular Technology.
[8] Cheng Wu,et al. Semi-Supervised and Unsupervised Extreme Learning Machines , 2014, IEEE Transactions on Cybernetics.
[9] J. Sobana,et al. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks , 2014 .