暂无分享,去创建一个
Mohamed R. Amer | Jason Polakis | Ioannis Agadakos | Nikolaos Agadakos | Jason Polakis | Ioannis Agadakos | Nikolaos Agadakos
[1] Thorsten Holz,et al. On the Robustness of Mobile Device Fingerprinting: Can Mobile Users Escape Modern Web-Tracking Mechanisms? , 2015, ACSAC 2015.
[2] Raheem Beyah,et al. GTID: A Technique for Physical Device and Device Type Fingerprinting , 2015, IEEE Transactions on Dependable and Secure Computing.
[3] Yu Zhang,et al. Very deep convolutional networks for end-to-end speech recognition , 2016, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[4] Geoffrey Ye Li,et al. Power of Deep Learning for Channel Estimation and Signal Detection in OFDM Systems , 2017, IEEE Wireless Communications Letters.
[5] Ahmad-Reza Sadeghi,et al. IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT , 2016, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[6] Ruslan Salakhutdinov,et al. Breaking the Softmax Bottleneck: A High-Rank RNN Language Model , 2017, ICLR.
[7] Nikita Borisov,et al. Do You Hear What I Hear?: Fingerprinting Smart Devices Through Embedded Acoustic Components , 2014, CCS.
[8] Michael A. Temple,et al. Application of wavelet-based RF fingerprinting to enhance wireless network security , 2009, Journal of Communications and Networks.
[9] Shahrokh Valaee,et al. Image Augmentation Using Radial Transform for Training Deep Neural Networks , 2017, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[10] Yoshua Bengio,et al. Gradient-based learning applied to document recognition , 1998, Proc. IEEE.
[11] Dit-Yan Yeung,et al. Convolutional LSTM Network: A Machine Learning Approach for Precipitation Nowcasting , 2015, NIPS.
[12] Stefan Zohren,et al. DeepLOB: Deep Convolutional Neural Networks for Limit Order Books , 2018, IEEE Transactions on Signal Processing.
[13] Barnard Kroon,et al. Steady State RF Fingerprinting for Identity Verification: One Class Classifier versus Customized Ensemble , 2009, AICS.
[14] Frank Piessens,et al. Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms , 2016, AsiaCCS.
[15] Angela Yao,et al. Gated Complex Recurrent Neural Networks , 2018, NIPS 2018.
[16] Akira Hirose,et al. Generalization Characteristics of Complex-Valued Feedforward Neural Networks in Relation to Signal Coherence , 2012, IEEE Transactions on Neural Networks and Learning Systems.
[17] Nick Nikiforakis,et al. XHOUND: Quantifying the Fingerprintability of Browser Extensions , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[18] Atanas Atanasov,et al. Security Vulnerabilities in Next Generation Air Transportation System , 2014 .
[19] Jürgen Schmidhuber,et al. Learning to forget: continual prediction with LSTM , 1999 .
[20] Rama Chellappa,et al. HyperFace: A Deep Multi-Task Learning Framework for Face Detection, Landmark Localization, Pose Estimation, and Gender Recognition , 2019, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[21] Tien Dang Vo-Huu,et al. Fingerprinting Wi-Fi Devices Using Software Defined Radios , 2016, WISEC.
[22] Wenyuan Xu,et al. AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable , 2014, NDSS.
[23] A. B. M. Musa,et al. Tracking unmodified smartphones using wi-fi monitors , 2012, SenSys '12.
[24] Song Li,et al. (Cross-)Browser Fingerprinting via OS and Hardware Level Features , 2017, NDSS.
[25] Masoud Salehi,et al. Fundamentals of Communication Systems , 2004 .
[26] Hongwei Liu,et al. Convolutional Neural Network With Data Augmentation for SAR Target Recognition , 2016, IEEE Geoscience and Remote Sensing Letters.
[27] H. Nyquist,et al. Certain Topics in Telegraph Transmission Theory , 1928, Transactions of the American Institute of Electrical Engineers.
[28] Chrisil Arackaparambil,et al. On the reliability of wireless fingerprinting using clock skews , 2010, WiSec '10.
[29] M. Riezenman. Cellular security: better, but foes still lurk , 2000 .
[30] Jian Sun,et al. Delving Deep into Rectifiers: Surpassing Human-Level Performance on ImageNet Classification , 2015, 2015 IEEE International Conference on Computer Vision (ICCV).
[31] Yan Liu,et al. Recurrent Neural Networks for Multivariate Time Series with Missing Values , 2016, Scientific Reports.
[32] Frank Piessens,et al. FPDetective: dusting the web for fingerprinters , 2013, CCS.
[33] Geoffrey E. Hinton,et al. Deep Learning , 2015, Nature.
[34] Srdjan Capkun,et al. Attacks on physical-layer identification , 2010, WiSec '10.
[35] Yoshua Bengio,et al. Understanding the difficulty of training deep feedforward neural networks , 2010, AISTATS.
[36] Andrei Sabelfeld,et al. Discovering Browser Extensions via Web Accessible Resources , 2017, CODASPY.
[37] Yasuhiro Fujiwara,et al. Sigsoftmax: Reanalysis of the Softmax Bottleneck , 2018, NeurIPS.
[38] Walter Rudametkin,et al. Beauty and the Beast: Diverting Modern Web Browsers to Build Unique Browser Fingerprints , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[39] Yann LeCun,et al. Signature Verification Using A "Siamese" Time Delay Neural Network , 1993, Int. J. Pattern Recognit. Artif. Intell..
[40] Nitzan Guberman,et al. On Complex Valued Convolutional Neural Networks , 2016, ArXiv.
[41] P. Werbos,et al. Beyond Regression : "New Tools for Prediction and Analysis in the Behavioral Sciences , 1974 .
[42] PAUL J. WERBOS,et al. Generalization of backpropagation with application to a recurrent gas market model , 1988, Neural Networks.
[43] Jakob Hoydis,et al. An Introduction to Deep Learning for the Physical Layer , 2017, IEEE Transactions on Cognitive Communications and Networking.
[44] Jont B. Allen,et al. Short term spectral analysis, synthesis, and modification by discrete Fourier transform , 1977 .
[45] T. Kohno,et al. Remote physical device fingerprinting , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[46] Mario Gerla,et al. GloMoSim: a library for parallel simulation of large-scale wireless networks , 1998 .
[47] Igor Bisio,et al. Unauthorized Amateur UAV Detection Based on WiFi Statistical Fingerprint Analysis , 2018, IEEE Communications Magazine.
[48] Xi Zhou,et al. Data augmentation for face recognition , 2017, Neurocomputing.
[49] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[50] A. Tikhonov,et al. Numerical Methods for the Solution of Ill-Posed Problems , 1995 .
[51] Sandeep Subramanian,et al. Deep Complex Networks , 2017, ICLR.
[52] Srdjan Capkun,et al. Physical-Layer Identification of Wireless Devices , 2011 .
[53] Aiko Pras,et al. Flow whitelisting in SCADA networks , 2013, Int. J. Crit. Infrastructure Prot..
[54] Stratis Ioannidis,et al. DeepRadioID: Real-Time Channel-Resilient Optimization of Deep Learning-based Radio Fingerprinting Algorithms , 2019, MobiHoc.
[55] Alexander Binder,et al. Layer-Wise Relevance Propagation for Neural Networks with Local Renormalization Layers , 2016, ICANN.
[56] Arvind Narayanan,et al. Online Tracking: A 1-million-site Measurement and Analysis , 2016, CCS.
[57] Peter C. Y. Chen,et al. LSTM network: a deep learning approach for short-term traffic forecast , 2017 .
[58] Matthew D. Zeiler. ADADELTA: An Adaptive Learning Rate Method , 2012, ArXiv.
[59] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[60] Geoffrey E. Hinton,et al. Speech recognition with deep recurrent neural networks , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[61] Samy Bengio,et al. Understanding deep learning requires rethinking generalization , 2016, ICLR.
[62] Razvan Pascanu,et al. On the difficulty of training recurrent neural networks , 2012, ICML.
[63] Peter Eckersley,et al. How Unique Is Your Web Browser? , 2010, Privacy Enhancing Technologies.
[64] Irwin O. Kennedy,et al. Feature extraction approaches to RF fingerprinting for device identification in femtocells , 2010, Bell Labs Technical Journal.
[65] Sneha Kumar Kasera,et al. On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews , 2008, IEEE Transactions on Mobile Computing.
[66] Yoshua Bengio,et al. Unitary Evolution Recurrent Neural Networks , 2015, ICML.
[67] Jasper Snoek,et al. Practical Bayesian Optimization of Machine Learning Algorithms , 2012, NIPS.
[68] Hovav Shacham,et al. Pixel Perfect : Fingerprinting Canvas in HTML 5 , 2012 .
[69] P. F. MacDoran,et al. Spoofing Mitigation, Robust Collision Avoidance, and Opportunistic Receiver Localisation Using a New Signal Processing Scheme for ADS-B or AIS , 2014 .
[70] Srdjan Capkun,et al. Transient-based identification of wireless sensor nodes , 2009, 2009 International Conference on Information Processing in Sensor Networks.
[71] Lutz Prechelt,et al. Early Stopping-But When? , 1996, Neural Networks: Tricks of the Trade.
[72] Marco Gruteser,et al. Wireless device identification with radiometric signatures , 2008, MobiCom '08.
[73] Radford M. Neal. Pattern Recognition and Machine Learning , 2007, Technometrics.
[74] Sofie Pollin,et al. Deep Learning Models for Wireless Signal Classification With Distributed Low-Cost Spectrum Sensors , 2017, IEEE Transactions on Cognitive Communications and Networking.
[75] Thorsten Holz,et al. Breaking LTE on Layer Two , 2019, 2019 IEEE Symposium on Security and Privacy (SP).