Spoofing Detection with Reinforcement Learning in Wireless Networks
暂无分享,去创建一个
Weihua Zhuang | Yan Li | Liang Xiao | Qiangda Li | Guolong Liu | W. Zhuang | Liang Xiao | Qiangda Li | Yan Li | Guolong Liu
[1] Xianbin Wang,et al. An enhanced cross-layer authentication mechanism for wireless communications based on PER and RSSI , 2013, 2013 13th Canadian Workshop on Information Theory.
[2] Larry J. Greenstein,et al. PHY-Authentication Protocol for Spoofing Detection in Wireless Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[3] Larry J. Greenstein,et al. Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.
[4] Prasant Mohapatra,et al. Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.
[5] Zhen Yang,et al. Physical-Layer Authentication for Multi-Carrier Transmission , 2015, IEEE Communications Letters.
[6] Eyal de Lara,et al. Ensemble: cooperative proximity-based authentication , 2010, MobiSys '10.
[7] Jitendra K. Tugnait,et al. Wireless User Authentication via Comparison of Power Spectral Densities , 2013, IEEE Journal on Selected Areas in Communications.
[8] Jie Yang,et al. Practical user authentication leveraging channel state information (CSI) , 2014, AsiaCCS.
[9] Xianbin Wang,et al. Physical Layer Authentication for Mobile Systems with Time-Varying Carrier Frequency Offsets , 2014, IEEE Transactions on Communications.
[10] Xiang-Yang Li,et al. Rejecting the attack: Source authentication for Wi-Fi management frames using CSI Information , 2012, 2013 Proceedings IEEE INFOCOM.
[11] Xianbin Wang,et al. Robust physical layer authentication using inherent properties of channel impulse response , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[12] J. Sobana,et al. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks , 2014 .
[13] Xianbin Wang,et al. A two dimensional quantization algorithm for CIR-based physical layer authentication , 2013, 2013 IEEE International Conference on Communications (ICC).
[14] Jitendra K. Tugnait,et al. A channel-based hypothesis testing approach to enhance user authentication in wireless networks , 2010, 2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010).