Radio frequency fingerprinting identification for Zigbee via lightweight CNN
暂无分享,去创建一个
[1] Srdjan Capkun,et al. Physical-layer Identification of RFID Devices , 2009, USENIX Security Symposium.
[2] Saulius Japertas,et al. Identification technology of mobile phone devices using RFF , 2014, 2014 11th International Conference on Wireless Information Networks and Systems (WINSYS).
[3] O. Ureten,et al. Bayesian detection of Wi-Fi transmitter RF fingerprints , 2005 .
[4] Jie Yang,et al. Data-Driven Deep Learning for Automatic Modulation Recognition in Cognitive Radios , 2019, IEEE Transactions on Vehicular Technology.
[5] Xuelong Hu,et al. The intelligent parking lot based on ZigBee technology and SVM , 2017, 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[6] Zheng Hu,et al. Improving Convolutional Neural Network Using Pseudo Derivative ReLU , 2018, 2018 5th International Conference on Systems and Informatics (ICSAI).
[7] Fumiyuki Adachi,et al. Transfer Learning for Semi-Supervised Automatic Modulation Classification in ZF-MIMO Systems , 2020, IEEE Journal on Emerging and Selected Topics in Circuits and Systems.
[8] Guoru Ding,et al. Dynamic Spectrum Interaction of UAV Flight Formation Communication With Priority: A Deep Reinforcement Learning Approach , 2020, IEEE Transactions on Cognitive Communications and Networking.
[9] Marco Gruteser,et al. Wireless device identification with radiometric signatures , 2008, MobiCom '08.
[10] Michel Barbeau,et al. DETECTION OF TRANSIENT IN RADIO FREQUENCY FINGERPRINTING USING SIGNAL PHASE , 2003 .
[11] Burak ÖzÇakmak,et al. Neural and Quantum Cryptography in Big Data: A Review , 2019, 2019 IEEE International Conference on Big Data (Big Data).
[12] Srdjan Capkun,et al. Transient-based identification of wireless sensor nodes , 2009, 2009 International Conference on Information Processing in Sensor Networks.
[13] Jia Jia,et al. A novel approach for impulsive noise mitigation in ZigBee communication system , 2014, 2014 Global Information Infrastructure and Networking Symposium (GIIS).
[14] Guan Gui,et al. Deep Cognitive Perspective: Resource Allocation for NOMA-Based Heterogeneous IoT With Imperfect SIC , 2019, IEEE Internet of Things Journal.
[15] Marek R. Ogiela,et al. Cognitive information systems in secure information management and personalized cryptography , 2014, 2014 Joint 7th International Conference on Soft Computing and Intelligent Systems (SCIS) and 15th International Symposium on Advanced Intelligent Systems (ISIS).
[16] Boris Ginsburg,et al. Quartznet: Deep Automatic Speech Recognition with 1D Time-Channel Separable Convolutions , 2019, ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[17] Michel Barbeau,et al. Detecting Impersonation Attacks in Future Wireless and Mobile Networks , 2005, MADNES.
[18] Zheng Dou,et al. An Improved Neural Network Pruning Technology for Automatic Modulation Classification in Edge Devices , 2020, IEEE Transactions on Vehicular Technology.
[19] Hong Wen,et al. A RFF Access Authentication Technology Based on K-Nearest Neighbor Method , 2019, 2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS).
[20] Aydin Behnad,et al. Relay authentication by exploiting I/Q imbalance in amplify-and-forward system , 2014, 2014 IEEE Global Communications Conference.
[21] Bo Yuan,et al. Efficient hardware architecture of softmax layer in deep neural network , 2016, 2016 29th IEEE International System-on-Chip Conference (SOCC).
[22] Thomas Kunz,et al. Wireless Fingerprints Inside a Wireless Sensor Network , 2015, ACM Trans. Sens. Networks.
[23] Ho-Jin Choi,et al. Controlled dropout: A different approach to using dropout on deep neural network , 2017, 2017 IEEE International Conference on Big Data and Smart Computing (BigComp).
[24] Zetao Jiang,et al. Single Image Super-Resolution: Depthwise Separable Convolution Super-Resolution Generative Adversarial Network , 2020 .
[25] Robert F. Mills,et al. Using Spectral Fingerprints to Improve Wireless Network Security , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[26] Keith E. Nolan,et al. Radio Transmitter Fingerprinting: A Steady State Frequency Domain Approach , 2008, 2008 IEEE 68th Vehicular Technology Conference.
[27] Emre Deniz,et al. A New Model for Secure Joining to ZigBee 3.0 Networks in the Internet of Things , 2018, 2018 International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism (IBIGDELFT).
[28] Michael A. Temple,et al. Improving ZigBee Device Network Authentication Using Ensemble Decision Tree Classifiers With Radio Frequency Distinct Native Attribute Fingerprinting , 2015, IEEE Transactions on Reliability.
[29] Srdjan Capkun,et al. Attacks on physical-layer identification , 2010, WiSec '10.
[30] Suk-Ju Kang,et al. Gradient Prior-Aided CNN Denoiser With Separable Convolution-Based Optimization of Feature Dimension , 2019, IEEE Transactions on Multimedia.
[31] Fumiyuki Adachi,et al. Deep Learning for Physical-Layer 5G Wireless Techniques: Opportunities, Challenges and Solutions , 2019, IEEE Wireless Communications.
[32] Michael A. Temple,et al. Application of wavelet-based RF fingerprinting to enhance wireless network security , 2009, Journal of Communications and Networks.
[33] Yang Peng,et al. UL-CSI Data Driven Deep Learning for Predicting DL-CSI in Cellular FDD Systems , 2019, IEEE Access.
[34] Oktay Ureten,et al. Wireless security through RF fingerprinting , 2007, Canadian Journal of Electrical and Computer Engineering.