A New Method of Secure Authentication Based on Electromagnetic Signatures of Chipless RFID Tags and Machine Learning Approaches
暂无分享,去创建一个
Cornel Ioana | Etienne Perret | Angela Digulescu | Nicolas Barbot | Romain Siragusa | Florin Popescu | Dragos Nastasiu | Razvan Scripcaru | Raymundo De Amorim | C. Ioana | A. Digulescu | E. Perret | N. Barbot | R. Siragusa | F. Popescu | Razvan Scripcaru | D. Nastasiu | R. Amorim
[1] Robert F. Mills,et al. Radio frequency fingerprinting commercial communication devices to enhance electronic security , 2008, Int. J. Electron. Secur. Digit. Forensics.
[2] Aboul Ella Hassanien,et al. Linear discriminant analysis: A detailed tutorial , 2017, AI Commun..
[3] Damon L. Woodard,et al. UCR: An Unclonable Environmentally Sensitive Chipless RFID Tag For Protecting Supply Chain , 2018, ACM Trans. Design Autom. Electr. Syst..
[4] A.R. Al-Ali,et al. Mobile RFID Tracking System , 2008, 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications.
[5] Chih-Ming Wang,et al. Identifying RF Identification Cards From Measurements of Resonance and Carrier Harmonics , 2010, IEEE Transactions on Microwave Theory and Techniques.
[6] Ali N. Akansu,et al. Emerging applications of wavelets: A review , 2010, Phys. Commun..
[7] Yoshua Bengio,et al. Random Search for Hyper-Parameter Optimization , 2012, J. Mach. Learn. Res..
[8] Etienne Perret,et al. Folded Multilayer C-Sections With Large Group Delay Swing for Passive Chipless RFID Applications , 2016, IEEE Transactions on Microwave Theory and Techniques.
[9] I.D. Robertson,et al. Capacitively-tuned split microstrip resonators for RFID barcodes , 2005, 2005 European Microwave Conference.
[10] Ramesh Sharda,et al. Artificial Neural Networks in Decision Support Systems , 2008 .
[11] L. Li. Technology designed to combat fakes in the global supply chain , 2013 .
[12] Etienne Perret,et al. Detection of Natural Randomness by Chipless RFID Approach and Its Application to Authentication , 2019, IEEE Transactions on Microwave Theory and Techniques.
[13] Etienne Perret,et al. Chipless RFID Tag Discrimination and the Performance of Resemblance Metrics to be used for it , 2018, 2018 IEEE/MTT-S International Microwave Symposium - IMS.
[14] Ganesh Vaidyanathan,et al. Effectiveness and Efficiency of RFID technology in Supply Chain Management: Strategic values and Challenges , 2008, J. Theor. Appl. Electron. Commer. Res..
[15] Etienne Perret,et al. Toward RCS Magnitude Level Coding for Chipless RFID , 2016, IEEE Transactions on Microwave Theory and Techniques.
[16] Bryan Nousain,et al. Wavelet Fingerprinting of Radio-Frequency Identification (RFID) Tags , 2012, IEEE Transactions on Industrial Electronics.
[17] Romain Tavenard,et al. Data Augmentation for Time Series Classification using Convolutional Neural Networks , 2016 .
[18] Anil K. Jain,et al. Artificial Neural Networks: A Tutorial , 1996, Computer.
[19] Lei Yang,et al. Anti-counterfeiting via federated RFID tags' fingerprints and geometric relationships , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[20] Shijie Jia,et al. Identification of Cloned HF RFID Proximity Cards Based on RF Fingerprinting , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.
[21] Ron Kohavi,et al. A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection , 1995, IJCAI.
[22] Srdjan Capkun,et al. Physical-layer Identification of RFID Devices , 2009, USENIX Security Symposium.
[23] Etienne Perret,et al. RFID chipless tag based on multiple phase shifters , 2011, 2011 IEEE MTT-S International Microwave Symposium.
[24] Gustavo E. A. P. A. Batista,et al. Speeding Up All-Pairwise Dynamic Time Warping Matrix Calculation , 2016, SDM.
[25] Nikhil Ketkar,et al. Introduction to Keras , 2017 .
[26] Etienne Perret,et al. A Depolarizing Chipless RFID Tag for Robust Detection and Its FCC Compliant UWB Reading System , 2013, IEEE Transactions on Microwave Theory and Techniques.
[27] Reinhard H. Knöchel,et al. On the physical robustness of RF on-chip nanostructured security , 2014, J. Inf. Secur. Appl..
[28] Mani Mina,et al. Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach , 2006, NDSS.
[29] Malek Al-Zewairi,et al. Privacy and security for RFID Access Control Systems: RFID Access Control Systems without back-end database , 2011, 2011 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT).
[30] Srdjan Capkun,et al. Towards Practical Identification of HF RFID Devices , 2012, TSEC.
[31] Mubeen Ghafoor,et al. Robust fingerprint classification with Bayesian convolutional networks , 2019, IET Image Process..
[32] Barbara Hammer,et al. Neural Smithing – Supervised Learning in Feedforward Artificial Neural Networks , 2001, Pattern Analysis & Applications.
[33] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[34] Nitish Srivastava,et al. Dropout: a simple way to prevent neural networks from overfitting , 2014, J. Mach. Learn. Res..
[35] Jia Di,et al. Fingerprinting RFID Tags , 2011, IEEE Transactions on Dependable and Secure Computing.
[36] David Girbau,et al. TIME-DOMAIN MEASUREMENT OF TIME-CODED UWB CHIPLESS RFID TAGS , 2011 .
[37] Chih-Ming Wang,et al. Electromagnetic Measurements for Counterfeit Detection of Radio Frequency Identification Cards , 2009, IEEE Transactions on Microwave Theory and Techniques.
[38] F. Burstein,et al. Handbook on Decision Support Systems 1 , 2008 .
[39] Etienne Perret,et al. Radio Frequency Identification and Sensors: From RFID to Chipless RFID , 2014 .
[40] Glauco Fontgalland,et al. Low cost folded chipless tag for millimeter-wave applications , 2018, 2018 IEEE International Symposium on Antennas and Propagation & USNC/URSI National Radio Science Meeting.