Physical Layer Authentication With High Compatibility Using an Encoding Approach
暂无分享,去创建一个
D. Niyato | Peichang Zhang | Lei Huang | N. Xie | Wei Xiong | Mingrui Sha | Tianxing Hu
[1] Jaewoo So,et al. Adaptive Lightweight CNN-Based CSI Feedback for Massive MIMO Systems , 2021, IEEE Wireless Communications Letters.
[2] Zhong Ming,et al. Security Model of Authentication at the Physical Layer and Performance Analysis over Fading Channels , 2021, IEEE Transactions on Dependable and Secure Computing.
[3] Debashis Ghosh,et al. Channel Assignment with Power Allocation for Sum Rate Maximization in NOMA Cellular Networks , 2020, 2020 5th International Conference on Computing, Communication and Security (ICCCS).
[4] Jinho Choi,et al. Physical layer authentication in wireless communication networks: A survey , 2020, Journal of Communications and Information Networks.
[5] Xiaohong Jiang,et al. Lightweight Tag-Based PHY-Layer Authentication for IoT Devices in Smart Cities , 2020, IEEE Internet of Things Journal.
[6] Alex X. Liu,et al. Physical-Layer Authentication in Non-Orthogonal Multiple Access Systems , 2020, IEEE/ACM Transactions on Networking.
[7] Andrei Gurtov,et al. Security for 5G and Beyond , 2019, IEEE Communications Surveys & Tutorials.
[8] Martin Johnston,et al. Physical layer authentication scheme with channel based tag padding sequence , 2019, IET Commun..
[9] Ning Xie,et al. Slope Authentication at the Physical Layer , 2018, IEEE Transactions on Information Forensics and Security.
[10] Shengli Zhang,et al. Blind Authentication at the Physical Layer Under Time-Varying Fading Channels , 2018, IEEE Journal on Selected Areas in Communications.
[11] Rick S. Blum,et al. Cryptographic Side-Channel Signaling and Authentication via Fingerprint Embedding , 2018, IEEE Transactions on Information Forensics and Security.
[12] Li Sun,et al. ICA-SBDC: A channel estimation and identification mechanism for MISO-OFDM systems under pilot spoofing attack , 2017, 2017 IEEE International Conference on Communications (ICC).
[13] Ning Wang,et al. Physical-Layer Authentication Based on Extreme Learning Machine , 2017, IEEE Communications Letters.
[14] Xianbin Wang,et al. Physical Layer Authentication Enhancement Using Two-Dimensional Channel Quantization , 2016, IEEE Transactions on Wireless Communications.
[15] Brian M. Sadler,et al. Wireless physical layer authentication via fingerprint embedding , 2015, IEEE Communications Magazine.
[16] Brian M. Sadler,et al. Physical Layer Authentication via Fingerprint Embedding Using Software-Defined Radios , 2015, IEEE Access.
[17] Kaigui Bian,et al. Blind Transmitter Authentication for Spectrum Security and Enforcement , 2014, CCS.
[18] Vincent K. N. Lau,et al. Interference Alignment With Partial CSI Feedback in MIMO Cellular Networks , 2014, IEEE Transactions on Signal Processing.
[19] K. J. Ray Liu,et al. Extrinsic Channel-Like Fingerprint Embedding for Authenticating MIMO Systems , 2011, IEEE Transactions on Wireless Communications.
[20] Brian M. Sadler,et al. MIMO Authentication via Deliberate Fingerprinting at the Physical Layer , 2011, IEEE Transactions on Information Forensics and Security.
[21] Xianbin Wang,et al. Continuous Physical Layer Authentication Using a Novel Adaptive OFDM System , 2011, 2011 IEEE International Conference on Communications (ICC).
[22] K. J. Ray Liu,et al. Authenticating MIMO Transmissions Using Channel-Like Fingerprinting , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[23] T. Charles Clancy,et al. Physical Layer Authentication Watermarks through Synthetic Channel Emulation , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).
[24] Larry J. Greenstein,et al. Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.
[25] John S. Baras,et al. Physical-Layer Authentication , 2008, IEEE Transactions on Information Forensics and Security.
[26] S. Kay. Fundamentals of statistical signal processing: estimation theory , 1993 .
[27] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[28] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[29] Mandy Eberhart,et al. Digital Communication Over Fading Channels , 2016 .