Machine Learning Approach to RF Transmitter Identification
暂无分享,去创建一个
Bishal Thapa | Jan Silovsky | Khalid Youssef | Louis Bouchard | Karen Haigh | Chris Vander Valk | J. Silovský | K. Haigh | B. Thapa | Louis-S. Bouchard | K. Youssef
[1] M. S. Ramaiah,et al. Performance of ANN in Pattern Recognition For Process Improvement Using Levenberg- Marquardt And Quasi-Newton Algorithms , 2013 .
[2] Hiroshi Dozono,et al. Convolutional Self Organizing Map , 2016, 2016 International Conference on Computational Science and Computational Intelligence (CSCI).
[3] K. Haigh,et al. Machine Learning for Embedded Systems : A Case Study , 2015 .
[4] Raymond Knopp,et al. Relative channel reciprocity calibration in MIMO/TDD systems , 2010, 2010 Future Network & Mobile Summit.
[5] L. Buydens,et al. Facilitating the application of Support Vector Regression by using a universal Pearson VII function based kernel , 2006 .
[6] Srinivasan Seshan,et al. 802.11 user fingerprinting , 2007, MobiCom '07.
[7] Srdjan Capkun,et al. Attacks on public WLAN-based positioning systems , 2009, MobiSys '09.
[8] Jie Yang,et al. Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.
[9] T.,et al. Training Feedforward Networks with the Marquardt Algorithm , 2004 .
[10] Sigeru Omatu,et al. Identification of the defective transmission devices using the wavelet transform , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[11] Srdjan Capkun,et al. Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[12] Guy A. E. Vandenbosch,et al. An Efficient Method for Antenna Design Optimization Based on Evolutionary Computation and Machine Learning Techniques , 2014, IEEE Transactions on Antennas and Propagation.
[13] Witold Kinsner,et al. Transient analysis and genetic algorithms for classification , 1995, IEEE WESCANEX 95. Communications, Power, and Computing. Conference Proceedings.
[14] Tara N. Sainath,et al. FUNDAMENTAL TECHNOLOGIES IN MODERN SPEECH RECOGNITION Digital Object Identifier 10.1109/MSP.2012.2205597 , 2012 .
[15] Tara Singh Kamal,et al. Analysis and Design of Circular Fractal Antenna Using Artificial Neural Networks , 2013 .
[16] Anders Krogh,et al. Introduction to the theory of neural computation , 1994, The advanced book program.
[17] Nitesh V. Chawla,et al. Deep learning for network analysis: Problems, approaches and challenges , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.
[18] Josh Petersen,et al. Modulation recognition using hierarchical deep neural networks , 2017, 2017 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN).
[19] Danijela Cabric,et al. USRP N210 demonstration of wideband sensing and blind hierarchical modulation classification , 2017, 2017 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN).
[20] Srdjan Capkun,et al. Physical-layer Identification of RFID Devices , 2009, USENIX Security Symposium.
[21] Mohammad Bagher Menhaj,et al. Training feedforward networks with the Marquardt algorithm , 1994, IEEE Trans. Neural Networks.
[22] N.S. Subotic,et al. Distributed RADAR waveform design based on compressive sensing considerations , 2008, 2008 IEEE Radar Conference.
[23] Louis-S. Bouchard,et al. Feature-Preserving Noise Removal , 2015, IEEE Transactions on Medical Imaging.
[24] O. Ureten,et al. Detection of radio transmitter turn-on transients , 1999 .
[25] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[26] Tara N. Sainath,et al. Deep Neural Networks for Acoustic Modeling in Speech Recognition , 2012 .
[27] Qiang Wang,et al. An ANN-Based Synthesis Model for the Single-Feed Circularly-Polarized Square Microstrip Antenna With Truncated Corners , 2012, IEEE Transactions on Antennas and Propagation.
[28] Harold H. Szu,et al. Novel identification of intercepted signals from unknown radio transmitters , 1995, Defense, Security, and Sensing.
[29] T. Charles Clancy,et al. Convolutional Radio Modulation Recognition Networks , 2016, EANN.
[30] John C. Platt,et al. Fast training of support vector machines using sequential minimal optimization, advances in kernel methods , 1999 .
[31] Chee Kheong Siew,et al. Extreme learning machine: Theory and applications , 2006, Neurocomputing.
[32] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[33] Hao Yu,et al. Levenberg—Marquardt Training , 2011 .
[34] David Tse,et al. Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels , 2007, IEEE Transactions on Information Forensics and Security.
[35] Michel Barbeau,et al. Enhancing intrusion detection in wireless networks using radio frequency fingerprinting , 2004, Communications, Internet, and Information Technology.
[36] Roberto Battiti,et al. First- and Second-Order Methods for Learning: Between Steepest Descent and Newton's Method , 1992, Neural Computation.
[37] Srdjan Capkun,et al. Attacks on physical-layer identification , 2010, WiSec '10.
[38] W. Marsden. I and J , 2012 .
[39] Tien Dang Vo-Huu,et al. Fingerprinting Wi-Fi Devices Using Software Defined Radios , 2016, WISEC.
[40] Michael S. Bernstein,et al. ImageNet Large Scale Visual Recognition Challenge , 2014, International Journal of Computer Vision.
[41] Mala Mitra,et al. Privacy for RFID Systems to Prevent Tracking and Cloning , 2008 .
[42] Srdjan Capkun,et al. Transient-based identification of wireless sensor nodes , 2009, 2009 International Conference on Information Processing in Sensor Networks.
[43] Marco Gruteser,et al. Wireless device identification with radiometric signatures , 2008, MobiCom '08.