Machine Learning for In-Region Location Verification in Wireless Networks
暂无分享,去创建一个
Stefano Tomasin | Francesco Formaggio | Alessandro Brighente | Giorgio Maria Di Nunzio | S. Tomasin | Alessandro Brighente | Francesco Formaggio
[1] Zhu Han,et al. PHY-Layer Authentication With Multiple Landmarks With Reduced Overhead , 2018, IEEE Transactions on Wireless Communications.
[2] Elena Simona Lohan,et al. Robustness, Security and Privacy in Location-Based Services for Future IoT: A Survey , 2017, IEEE Access.
[3] Bernhard Schölkopf,et al. Estimating the Support of a High-Dimensional Distribution , 2001, Neural Computation.
[4] David A. Wagner,et al. Secure verification of location claims , 2003, WiSe '03.
[5] C. M. Roach,et al. Fast curve fitting using neural networks , 1992 .
[6] Yong Guan,et al. Lightweight Location Verification Algorithms for Wireless Sensor Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.
[7] X. C. Guo,et al. A novel LS-SVMs hyper-parameter selection based on particle swarm optimization , 2008, Neurocomputing.
[8] Stefano Tomasin,et al. Geo-specific encryption through implicitly authenticated location for 5G wireless systems , 2016, 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
[9] Giorgio Maria Di Nunzio,et al. Location-Verification and Network Planning via Machine Learning Approaches , 2019, 2019 International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOPT).
[10] Jiannong Cao,et al. Secure localization and location verification in wireless sensor networks: a survey , 2010, The Journal of Supercomputing.
[11] Ulrich Türke,et al. IST-Momentum project public deliverable 5.3: Evaluation of reference and public scenarios , 2003 .
[12] Sailes K. Sengijpta. Fundamentals of Statistical Signal Processing: Estimation Theory , 1995 .
[13] David Chaum,et al. Distance-Bounding Protocols (Extended Abstract) , 1994, EUROCRYPT.
[14] Nicola Laurenti,et al. Optimization of anchor nodes' usage for location verification systems , 2017, 2017 International Conference on Localization and GNSS (ICL-GNSS).
[15] Bart Preneel,et al. Location verification using secure distance bounding protocols , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[16] Radford M. Neal. Pattern Recognition and Machine Learning , 2007, Technometrics.
[17] Paul C. van Oorschot,et al. CPV: Delay-Based Location Verification for the Internet , 2017, IEEE Transactions on Dependable and Secure Computing.
[18] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[19] Weihua Zhuang,et al. PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks , 2016, IEEE Transactions on Vehicular Technology.
[20] K. Johana,et al. Benchmarking Least Squares Support Vector Machine Classifiers , 2022 .
[21] Victor C. M. Leung,et al. Secure Location Verification for Vehicular Ad-Hoc Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[22] Franco Scarselli,et al. On the Complexity of Neural Network Classifiers: A Comparison Between Shallow and Deep Architectures , 2014, IEEE Transactions on Neural Networks and Learning Systems.
[23] Bruce W. Suter,et al. The multilayer perceptron as an approximation to a Bayes optimal discriminant function , 1990, IEEE Trans. Neural Networks.
[24] Geoffrey E. Hinton,et al. Reducing the Dimensionality of Data with Neural Networks , 2006, Science.
[25] Mikhail Nesterenko,et al. Secure Location Verification Using Radio Broadcast , 2004, IEEE Transactions on Dependable and Secure Computing.
[26] Geoffrey E. Hinton,et al. Deep Learning , 2015, Nature.
[27] Aydin Sezgin,et al. Broadcasting Into the Uncertainty: Authentication and Confidentiality by Physical-Layer Processing , 2015, Proceedings of the IEEE.
[28] Jieping Ye,et al. SVM versus Least Squares SVM , 2007, AISTATS.
[29] Nicola Laurenti,et al. Physical Layer Authentication over MIMO Fading Wiretap Channels , 2012, IEEE Transactions on Wireless Communications.
[30] Young-Sik Choi,et al. Least squares one-class support vector machine , 2009, Pattern Recognit. Lett..
[31] Shihao Yan,et al. Location Verification Systems Under Spatially Correlated Shadowing , 2014, IEEE Transactions on Wireless Communications.
[32] Bruce Denby,et al. Robust indoor localization and tracking using GSM fingerprints , 2015, EURASIP J. Wirel. Commun. Netw..
[33] Liangmin Wang,et al. Security Verification of Location Estimate in Wireless Sensor Networks , 2010, 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM).
[34] Johan A. K. Suykens,et al. Least Squares Support Vector Machine Classifiers , 1999, Neural Processing Letters.