PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks
暂无分享,去创建一个
Weihua Zhuang | Yan Li | Liang Xiao | Guolong Liu | Guoan Han | W. Zhuang | Liang Xiao | Guoan Han | Yan Li | Guolong Liu
[1] Shamik Sengupta,et al. CR-Honeynet: A Learning & Decoy Based Sustenance Mechanism against Jamming Attack in CRN , 2014, 2014 IEEE Military Communications Conference.
[2] Song Guo,et al. RENDEZVOUS: towards fast event detecting in wireless sensor and actor networks , 2013, Computing.
[3] Prasant Mohapatra,et al. Dynamic defense strategy against advanced persistent threat with insiders , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[4] K. J. Ray Liu,et al. Indirect Reciprocity Security Game for Large-Scale Wireless Networks , 2012, IEEE Transactions on Information Forensics and Security.
[5] Xianbin Wang,et al. A two dimensional quantization algorithm for CIR-based physical layer authentication , 2013, 2013 IEEE International Conference on Communications (ICC).
[6] Eyal de Lara,et al. Ensemble: cooperative proximity-based authentication , 2010, MobiSys '10.
[7] Doreen Eichel. Estimation Theory With Applications To Communications And Control , 2016 .
[8] Larry J. Greenstein,et al. PHY-Authentication Protocol for Spoofing Detection in Wireless Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[9] Adam J. Miller,et al. Cognitive Jamming Game for Dynamically Countering Ad Hoc Cognitive Radio Networks , 2013, MILCOM 2013 - 2013 IEEE Military Communications Conference.
[10] Richard S. Sutton,et al. Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.
[11] Xiang-Yang Li,et al. Rejecting the attack: Source authentication for Wi-Fi management frames using CSI Information , 2012, 2013 Proceedings IEEE INFOCOM.
[12] Xianbin Wang,et al. Robust physical layer authentication using inherent properties of channel impulse response , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[13] Liang Xiao,et al. Spoofing Detection with Reinforcement Learning in Wireless Networks , 2014, GLOBECOM 2014.
[14] H. T. Kung,et al. Competing Mobile Network Game: Embracing antijamming and jamming strategies with reinforcement learning , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[15] Prasant Mohapatra,et al. Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.
[16] Jitendra K. Tugnait,et al. Wireless User Authentication via Comparison of Power Spectral Densities , 2013, IEEE Journal on Selected Areas in Communications.
[17] Jie Yang,et al. Practical user authentication leveraging channel state information (CSI) , 2014, AsiaCCS.
[18] Xianbin Wang,et al. Physical Layer Authentication for Mobile Systems with Time-Varying Carrier Frequency Offsets , 2014, IEEE Transactions on Communications.
[19] K. J. Ray Liu,et al. Anti-Jamming Games in Multi-Channel Cognitive Radio Networks , 2012, IEEE Journal on Selected Areas in Communications.
[20] Junbo Wang,et al. ORACLE: Mobility control in wireless sensor and actor networks , 2012, Comput. Commun..
[21] Larry J. Greenstein,et al. Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.
[22] J. Sobana,et al. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks , 2014 .
[23] Zhen Yang,et al. Physical-Layer Authentication for Multi-Carrier Transmission , 2015, IEEE Communications Letters.