暂无分享,去创建一个
[1] Sheldon A. Munns,et al. RF-DNA Fingerprinting for Airport WiMax Communications Security , 2010, 2010 Fourth International Conference on Network and System Security.
[2] Igor Kononenko,et al. Estimating Attributes: Analysis and Extensions of RELIEF , 1994, ECML.
[3] Shauna Revay,et al. Deep Learning for RF Device Fingerprinting in Cognitive Communication Networks , 2018, IEEE Journal of Selected Topics in Signal Processing.
[4] Ziya Telatar,et al. RF Fingerprinting of IoT Devices Based on Transient Energy Spectrum , 2019, IEEE Access.
[5] Michael A. Temple,et al. Detecting rogue attacks on commercial wireless Insteon home automation systems , 2018, Comput. Secur..
[6] Dorin Comaniciu,et al. Real-time tracking of non-rigid objects using mean shift , 2000, Proceedings IEEE Conference on Computer Vision and Pattern Recognition. CVPR 2000 (Cat. No.PR00662).
[7] Larry A. Rendell,et al. A Practical Approach to Feature Selection , 1992, ML.
[8] John F. Doherty,et al. Nonlinearity estimation for Specific Emitter Identification in multipath environment , 2009, 2009 IEEE Sarnoff Symposium.
[9] Kevin W. Sowerby,et al. Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers , 2014, J. Comput. Syst. Sci..
[10] T. Charles Clancy,et al. Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).
[11] Hossein Jafari,et al. IoT Devices Fingerprinting Using Deep Learning , 2018, MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM).
[12] David G. Stork,et al. Pattern Classification (2nd ed.) , 1999 .
[13] Nello Cristianini,et al. An Introduction to Support Vector Machines and Other Kernel-based Learning Methods , 2000 .
[14] Daisuke Takahashi,et al. IEEE 802.11 user fingerprinting and its applications for intrusion detection , 2010, Comput. Math. Appl..
[15] Donald R. Reising,et al. Exploitation of RF-DNA for device classification and verification using GRLVQI processing , 2012 .
[16] T. Daniel Loveless,et al. RF-DNA Fingerprint Classification of OFDM Signals Using a Rayleigh Fading Channel Model , 2019, 2019 IEEE Wireless Communications and Networking Conference (WCNC).
[17] Anthony N. Mucciardi,et al. A Comparison of Seven Techniques for Choosing Subsets of Pattern Recognition Properties , 1971, IEEE Transactions on Computers.
[18] R.P.L. Durgabai,et al. Feature Selection using ReliefF Algorithm , 2014 .
[19] Michael A. Temple,et al. Authorized and Rogue Device Discrimination Using Dimensionally Reduced RF-DNA Fingerprints , 2015, IEEE Transactions on Information Forensics and Security.
[20] Welch Bl. THE GENERALIZATION OF ‘STUDENT'S’ PROBLEM WHEN SEVERAL DIFFERENT POPULATION VARLANCES ARE INVOLVED , 1947 .
[21] Benjamin W. P. Ramsey,et al. An RF-DNA verification process for ZigBee networks , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.
[22] John F. Doherty,et al. Nonlinearity Estimation for Specific Emitter Identification in Multipath Channels , 2011, IEEE Transactions on Information Forensics and Security.
[23] Robert F. Mills,et al. Radio frequency fingerprinting commercial communication devices to enhance electronic security , 2008, Int. J. Electron. Secur. Digit. Forensics.
[24] Aboul Ella Hassanien,et al. Linear discriminant analysis: A detailed tutorial , 2017, AI Commun..
[25] N. Serinken,et al. Characteristics of radio transmitter fingerprints , 2001 .
[26] Ryan M. Gerdes,et al. Crowdsourced measurements for device fingerprinting , 2019, WiSec.
[27] Marc Geilen,et al. On the discrete Gabor transform and the discrete Zak transform , 1996, Signal Process..
[28] Michael A. Temple,et al. Improved wireless security for GMSK-based devices using RF fingerprinting , 2010, Int. J. Electron. Secur. Digit. Forensics.
[29] James R. Ottewill,et al. Relief F-Based Feature Ranking and Feature Selection for Monitoring Induction Motors , 2018, 2018 23rd International Conference on Methods & Models in Automation & Robotics (MMAR).
[30] Ashutosh Kumar Singh,et al. The Elements of Statistical Learning: Data Mining, Inference, and Prediction , 2010 .
[31] Chunyi Peng,et al. How Can IoT Services Pose New Security Threats In Operational Cellular Networks , 2020 .
[32] Barnard Kroon,et al. Steady State RF Fingerprinting for Identity Verification: One Class Classifier versus Customized Ensemble , 2009, AICS.
[33] Michael A. Temple,et al. Sensitivity Analysis of Burst Detection and RF Fingerprinting Classification Performance , 2009, 2009 IEEE International Conference on Communications.
[34] O. H. Tekbas,et al. Improvement of transmitter identification system for low SNR transients , 2004 .
[35] D. Toher,et al. Why Welch’s test is Type I error robust , 2016 .
[36] Witold Kinsner,et al. Transient analysis and genetic algorithms for classification , 1995, IEEE WESCANEX 95. Communications, Power, and Computing. Conference Proceedings.
[37] Anthony Skjellum,et al. A Hardware-Software Codesign Approach to Identity, Trust, and Resilience for IoT/CPS at Scale , 2019, 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[38] Jose A. Gonzalez,et al. Numerical Analysis for Relevant Features in Intrusion Detection (NARFid) , 2009 .
[39] Charles G. Wheeler,et al. Assessment of the impact of CFO on RF-DNA fingerprint classification performance , 2017, 2017 International Conference on Computing, Networking and Communications (ICNC).
[40] O. Ureten,et al. Detection of radio transmitter turn-on transients , 1999 .
[41] Baldini Gianmarco,et al. Physical Layer authentication and identification of wireless devices using the Synchrosqueezing transform , 2018 .
[42] Yu Bai,et al. Specific Emitter Identification Techniques for the Internet of Things , 2020, IEEE Access.
[43] T. Daniel Loveless,et al. Integration of Matched Filtering within the RF-DNA Fingerprinting Process , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).
[44] Shahid Mumtaz,et al. New Security Mechanisms of High-Reliability IoT Communication Based on Radio Frequency Fingerprint , 2019, IEEE Internet of Things Journal.
[45] Indrajit Ray,et al. Device Identity and Trust in IoT-sphere Forsaking Cryptography , 2019, 2019 IEEE 5th International Conference on Collaboration and Internet Computing (CIC).
[46] Samir S. Soliman,et al. Signal classification using statistical moments , 1992, IEEE Trans. Commun..
[47] Jin Wang,et al. An Identity Authentication Method of a MIoT Device Based on Radio Frequency (RF) Fingerprint Technology , 2020, Sensors.
[48] Walid Saad,et al. Device Fingerprinting in Wireless Networks: Challenges and Opportunities , 2015, IEEE Communications Surveys & Tutorials.
[49] Sneha Kumar Kasera,et al. On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews , 2010, IEEE Transactions on Mobile Computing.
[50] G. Ruxton. The unequal variance t-test is an underused alternative to Student's t-test and the Mann–Whitney U test , 2006 .
[51] Larry A. Rendell,et al. The Feature Selection Problem: Traditional Methods and a New Algorithm , 1992, AAAI.
[52] Wei Yang,et al. Neighborhood Component Feature Selection for High-Dimensional Data , 2012, J. Comput..
[53] J. Dudczyk,et al. Applying the radiated emission to the specific emitter identification , 2004, 15th International Conference on Microwaves, Radar and Wireless Communications (IEEE Cat. No.04EX824).
[54] Hua Peng,et al. Specific Emitter Identification Based on Deep Residual Networks , 2019, IEEE Access.
[55] Muazzam Ali Khan,et al. Automatic Modulation Recognition of Communication Signals. , 2012 .
[56] Michael A. Temple,et al. Improving ZigBee Device Network Authentication Using Ensemble Decision Tree Classifiers With Radio Frequency Distinct Native Attribute Fingerprinting , 2015, IEEE Transactions on Reliability.
[57] Lajos Hanzo,et al. Physical-layer authentication for wireless security enhancement: current challenges and future developments , 2016, IEEE Communications Magazine.
[58] Srinivasan Seshan,et al. 802.11 user fingerprinting , 2007, MobiCom '07.
[59] Srdjan Capkun,et al. Transient-based identification of wireless sensor nodes , 2009, 2009 International Conference on Information Processing in Sensor Networks.
[60] Alexandr M. Kuzminskiy,et al. RF Fingerprint detection in a wireless multipath channel , 2010, 2010 7th International Symposium on Wireless Communication Systems.
[61] Marco Gruteser,et al. Wireless device identification with radiometric signatures , 2008, MobiCom '08.