Multiuser Physical Layer Security Mechanism in the Wireless Communication System of the IIOT
暂无分享,去创建一个
[1] Sherali Zeadally,et al. Physical Layer Security for the Smart Grid: Vulnerabilities, Threats, and Countermeasures , 2019, IEEE Transactions on Industrial Informatics.
[2] Hong Wen,et al. Threshold-Free Physical Layer Authentication Based on Machine Learning for Industrial Wireless CPS , 2019, IEEE Transactions on Industrial Informatics.
[3] R. Vijayanand,et al. Intrusion detection system for wireless mesh network using multiple support vector machine classifiers with genetic-algorithm-based feature selection , 2018, Comput. Secur..
[4] Hong Wen,et al. Lightweight one-time password authentication scheme based on radio-frequency fingerprinting , 2018, IET Commun..
[5] Songlin Chen,et al. Multiuser Physical Layer Authentication in Internet of Things With Data Augmentation , 2020, IEEE Internet of Things Journal.
[6] Richard Candell. Radio Frequency Measurements for Selected Manufacturing and Industrial Environments , 2016 .
[7] Farid García,et al. A comprehensive survey on support vector machine classification: Applications, challenges and trends , 2020, Neurocomputing.
[8] Zhixin Sun,et al. An Improved Intrusion Detection Algorithm Based on GA and SVM , 2018, IEEE Access.
[9] Zhi Chen,et al. A Parallel Genetic Algorithm Based Feature Selection and Parameter Optimization for Support Vector Machine , 2016, Sci. Program..
[10] Yushan Li,et al. Optimized Coherent Integration-Based Radio Frequency Fingerprinting in Internet of Things , 2018, IEEE Internet of Things Journal.
[11] Huichun Hua,et al. Parameter optimization of support vector machine based on improved grid algorithm , 2020, Journal of Physics: Conference Series.
[12] Hatem A. Fayed,et al. Speed up grid-search for parameter selection of support vector machines , 2019, Appl. Soft Comput..
[13] Zhibo Pang,et al. Automated Labeling and Learning for Physical Layer Authentication Against Clone Node and Sybil Attacks in Industrial Wireless Edge Networks , 2021, IEEE Transactions on Industrial Informatics.
[14] Eduard A. Jorswieck,et al. To avoid or not to avoid CSI leakage in physical layer secret communication systems , 2015, IEEE Communications Magazine.
[15] Ying Li,et al. Improved particle swarm optimization algorithm for fuzzy multi-class SVM , 2010 .
[16] Ning Wang,et al. Physical-Layer Authentication Based on Extreme Learning Machine , 2017, IEEE Communications Letters.
[17] L. A. Demidova,et al. The SVM Classifier Based on the Modified Particle Swarm Optimization , 2016, ArXiv.
[18] Stephan Berger,et al. Attacks on the Industrial Internet of Things - Development of a multi-layer Taxonomy , 2020, Comput. Secur..
[19] Xiaojun Jing,et al. Physical layer authentication under intelligent spoofing in wireless sensor networks , 2020, Signal Process..
[20] Lei Yang,et al. Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information , 2018, Sensors.
[21] Longfei Wu,et al. A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.
[22] Ming Xiao,et al. Physical-Layer Security for Industrial Wireless Control Systems: Basics and Future Directions , 2018, IEEE Industrial Electronics Magazine.
[23] Shih-Wei Lin,et al. Particle swarm optimization for parameter determination and feature selection of support vector machines , 2008, Expert Syst. Appl..
[24] Jie Zhang,et al. Find me a safe zone: A countermeasure for channel state information based attacks , 2019, Comput. Secur..
[25] Larry J. Greenstein,et al. Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.
[26] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[27] Hong Wen,et al. Physical-Layer Channel Authentication for 5G via Machine Learning Algorithm , 2018, Wirel. Commun. Mob. Comput..
[28] Feng Zhao,et al. Optimization Approaches for Parameters of SVM , 2020 .
[29] Ding-Xuan Zhou,et al. Theory of deep convolutional neural networks: Downsampling , 2020, Neural Networks.
[30] Mehdi Asadi,et al. Detecting botnet by using particle swarm optimization algorithm based on voting system , 2020, Future Gener. Comput. Syst..
[31] Jitendra K. Tugnait,et al. Wireless User Authentication via Comparison of Power Spectral Densities , 2013, IEEE Journal on Selected Areas in Communications.