An Ensemble Learning Method for Wireless Multimedia Device Identification
暂无分享,去创建一个
Chao Wang | Zhen Zhang | Jin Wang | Yibing Li | Ya Tu | Meiyu Wang | Yibing Li | Ya Tu | Jin Wang | Chao Wang | Zhen Zhang | Meiyu Wang
[1] Kui Ren,et al. Wireless Physical-Layer Identification: Modeling and Validation , 2015, IEEE Transactions on Information Forensics and Security.
[2] Baldini Gianmarco,et al. Identification of Wireless Devices From Their Physical Layer Radio-Frequency Fingerprints , 2017 .
[3] Michael A. Temple,et al. Improving ZigBee Device Network Authentication Using Ensemble Decision Tree Classifiers With Radio Frequency Distinct Native Attribute Fingerprinting , 2015, IEEE Transactions on Reliability.
[4] Wei Liu,et al. Tensor Robust Principal Component Analysis: Exact Recovery of Corrupted Low-Rank Tensors via Convex Optimization , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[5] Phivos Mylonas,et al. Real-Life Paradigms of Wireless Network Security Attacks , 2011, 2011 15th Panhellenic Conference on Informatics.
[6] Srdjan Capkun,et al. Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[7] Wei Wang,et al. A Game Theory Based Collaborative Security Detection Method for Internet of Things Systems , 2018, IEEE Transactions on Information Forensics and Security.
[8] Kristine L. Bell,et al. Bayesian Bounds for Parameter Estimation and Nonlinear Filtering/Tracking , 2007 .
[9] Rafik Chaabouni. Break WEP Faster with Statistical Analysis , 2013, IACR Cryptol. ePrint Arch..
[10] Yuhui Zheng,et al. Student’s t-Hidden Markov Model for Unsupervised Learning Using Localized Feature Selection , 2018, IEEE Transactions on Circuits and Systems for Video Technology.
[11] Srdjan Capkun,et al. Physical-Layer Identification of Wireless Devices , 2011 .
[12] Jong Hyuk Park,et al. An improved ant colony optimization-based approach with mobile sink for wireless sensor networks , 2017, The Journal of Supercomputing.
[13] Scott Shenker,et al. Overcoming the Internet impasse through virtualization , 2005, Computer.
[14] Michael A. Jensen,et al. Data-dependent transmitter fingerprints for radio authentication , 2014, 2014 IEEE Radio and Wireless Symposium (RWS).
[15] O. Ureten,et al. Bayesian detection of Wi-Fi transmitter RF fingerprints , 2005 .
[16] Sai Ji,et al. Energy-efficient cluster-based dynamic routes adjustment approach for wireless sensor networks with mobile sinks , 2017, The Journal of Supercomputing.
[17] Norsheila Fisal,et al. Proposed transport protocol for reliable data transfer in wireless sensor network (WSN) , 2011, 2011 Fourth International Conference on Modeling, Simulation and Applied Optimization.
[18] Trevor J. Bihl,et al. Feature Selection for RF Fingerprinting With Multiple Discriminant Analysis and Using ZigBee Device Emissions , 2016, IEEE Transactions on Information Forensics and Security.
[19] Michel Barbeau,et al. Enhancing intrusion detection in wireless networks using radio frequency fingerprinting , 2004, Communications, Internet, and Information Technology.
[20] Michael A. Temple,et al. Enhancing Critical Infrastructure and Key Resources (CIKR) Level-0 Physical Process Security Using Field Device Distinct Native Attribute Features , 2017, IEEE Transactions on Information Forensics and Security.
[21] Charalampos Konstantopoulos,et al. A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.
[22] Michael A. Temple,et al. Gabor-based RF-DNA fingerprinting for classifying 802.16e WiMAX Mobile Subscribers , 2012, 2012 International Conference on Computing, Networking and Communications (ICNC).
[23] Michael A. Temple,et al. Authorized and Rogue Device Discrimination Using Dimensionally Reduced RF-DNA Fingerprints , 2015, IEEE Transactions on Information Forensics and Security.
[24] Can Emre Koksal,et al. On the Basic Limits of RF-Fingerprint-Based Authentication , 2016, IEEE Transactions on Information Theory.
[25] Srdjan Capkun,et al. Physical-layer Identification of RFID Devices , 2009, USENIX Security Symposium.
[26] Richard Baraniuk,et al. The Dual-tree Complex Wavelet Transform , 2007 .
[27] Michael A. Temple,et al. Sensitivity Analysis of Burst Detection and RF Fingerprinting Classification Performance , 2009, 2009 IEEE International Conference on Communications.
[28] M.Kanchana,et al. VAMPIRE ATTACKS: DRAINING LIFE FROM WIRELESS AD HOC SENSOR NETWORKS , 2014 .
[29] Mianxiong Dong,et al. ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks , 2016, IEEE Transactions on Information Forensics and Security.
[30] Wei Xi,et al. GenePrint: Generic and Accurate Physical-Layer Identification for UHF RFID Tags , 2016, IEEE/ACM Transactions on Networking.
[31] Yu Cheng,et al. Ghost-in-ZigBee: Energy Depletion Attack on ZigBee-Based Wireless Networks , 2016, IEEE Internet of Things Journal.
[32] Massimo Merro,et al. A Semantic Analysis of Wireless Network Security Protocols , 2012, NASA Formal Methods.
[33] Xinyu Yang,et al. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.
[34] Lu Gan,et al. Radiometric Identification Based on Low-Rank Representation and Minimum Prediction Error Regularization , 2017, IEEE Communications Letters.
[35] In Lee,et al. The Internet of Things (IoT): Applications, investments, and challenges for enterprises , 2015 .
[36] Feiping Nie,et al. Robust Object Co-Segmentation Using Background Prior , 2018, IEEE Transactions on Image Processing.
[37] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[38] Samir Avdakovic,et al. Energy Distribution of EEG Signals: EEG Signal Wavelet-Neural Network Classifier , 2010, ArXiv.
[39] Oktay Ureten,et al. Wireless security through RF fingerprinting , 2007, Canadian Journal of Electrical and Computer Engineering.
[40] Robert F. Mills,et al. Using Spectral Fingerprints to Improve Wireless Network Security , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[41] Jianjun Lei,et al. Adaptive Fractional-Pixel Motion Estimation Skipped Algorithm for Efficient HEVC Motion Estimation , 2018, ACM Trans. Multim. Comput. Commun. Appl..
[42] Michael A. Temple,et al. Application of wavelet-based RF fingerprinting to enhance wireless network security , 2009, Journal of Communications and Networks.