咨询与建议

限定检索结果

文献类型

  • 37 篇 期刊文献
  • 11 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 49 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 48 篇 工学
    • 38 篇 电气工程
    • 30 篇 信息与通信工程
    • 29 篇 计算机科学与技术...
    • 6 篇 仪器科学与技术
    • 5 篇 电子科学与技术(可...
    • 3 篇 控制科学与工程
    • 2 篇 材料科学与工程(可...
    • 1 篇 机械工程
    • 1 篇 交通运输工程
    • 1 篇 软件工程
    • 1 篇 网络空间安全
  • 9 篇 理学
    • 5 篇 化学
    • 3 篇 数学
    • 3 篇 物理学
    • 3 篇 生物学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 49 篇 physical-layer a...
  • 13 篇 authentication
  • 11 篇 security
  • 7 篇 wireless communi...
  • 7 篇 robustness
  • 6 篇 receivers
  • 5 篇 programmable log...
  • 5 篇 transmitters
  • 4 篇 channel state in...
  • 3 篇 universal softwa...
  • 3 篇 signal to noise ...
  • 3 篇 fading channels
  • 3 篇 physical layer
  • 3 篇 machine learning
  • 3 篇 channel training
  • 2 篇 internet of thin...
  • 2 篇 active
  • 2 篇 communication sy...
  • 2 篇 compatibility
  • 2 篇 anti-attack

机构

  • 7 篇 shenzhen univ co...
  • 5 篇 shenzhen univ co...
  • 4 篇 nanyang technol ...
  • 4 篇 shaanxi smart ne...
  • 3 篇 univ washington ...
  • 3 篇 shenzhen univ co...
  • 2 篇 shenzhen univ gu...
  • 2 篇 univ elect sci &...
  • 2 篇 jilin univ minis...
  • 2 篇 china southern p...
  • 2 篇 shenzhen univ co...
  • 2 篇 stevens inst tec...
  • 2 篇 xi an jiao tong ...
  • 2 篇 gwangju inst sci...
  • 2 篇 china acad infor...
  • 2 篇 guangdong xian j...
  • 1 篇 nantong research...
  • 1 篇 cnrs lab sticc e...
  • 1 篇 deakin univ sch ...
  • 1 篇 gwangju inst sci...

作者

  • 13 篇 xie ning
  • 7 篇 tan haijun
  • 4 篇 ren pinyi
  • 4 篇 liu alex x.
  • 4 篇 xu dongyang
  • 3 篇 niyato dusit
  • 3 篇 hwang euiseok
  • 3 篇 han seungnam
  • 3 篇 li hongbin
  • 3 篇 zhang jiaheng
  • 3 篇 zhang qihong
  • 3 篇 ritcey james a.
  • 3 篇 choi jinho
  • 3 篇 wen hong
  • 2 篇 wang jian
  • 2 篇 jiang yixin
  • 2 篇 xu yuntao
  • 2 篇 sha mingrui
  • 2 篇 li zhuoyuan
  • 2 篇 chen yicong

语言

  • 48 篇 英文
  • 1 篇 其他
检索条件"主题词=physical-layer authentication"
49 条 记 录,以下是1-10 订阅
排序:
physical-layer authentication in the Presence of Cooperative Adversarial Attacks
收藏 引用
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 2025年 第4期24卷 2910-2924页
作者: Liang, Jinquan Li, Yu Cai, Yufeng Chen, Yicong Xie, Ning Sun, Weize Li, Hongbin Shenzhen Univ Coll Elect & Informat Engn State Key Lab Radio Frequency Heterogeneous Integr Shenzhen 518060 Peoples R China Shenzhen Univ Coll Elect & Informat Engn Guangdong Key Lab Intelligent Informat Proc Shenzhen 518060 Peoples R China Stevens Inst Technol Dept Elect & Comp Engn Hoboken NJ 07030 USA
This paper tackles a notable security loophole in tag-based physical-layer authentication (PLA) when faced with cooperative attacks, highlighting its significance due to two main reasons. First, while attackers may on... 详细信息
来源: 评论
physical-layer authentication for Ambient Backscatter-Aided NOMA Symbiotic Systems
收藏 引用
IEEE TRANSACTIONS ON COMMUNICATIONS 2023年 第4期71卷 2288-2303页
作者: Li, Xingwang Wang, Qunshu Zeng, Ming Liu, Yuanwei Dang, Shuping Tsiftsis, Theodoros A. Dobre, Octavia A. Henan Polytech Univ Sch Phys & Elect Informat Engn Jiaozuo 454000 Peoples R China Univ Laval Dept Elect Engn & Comp Engn Quebec City PQ G1V 0A6 Canada Queen Mary Univ London Sch Elect Engn & Comp Sci London E1 4NS England Univ Bristol Dept Elect & Elect Engn Bristol BS8 1UB England Univ Thessaly Dept Informat & Telecommun Lamia 35100 Greece Mem Univ Fac Engn & Appl Sci St John NF A1B 3X9 Canada
Ambient backscatter communication (AmBC) and non-orthogonal multiple access (NOMA) are two promising technologies for the future wireless communication networks owing to their high energy and spectral efficiencies. Th... 详细信息
来源: 评论
physical-layer authentication Over Spatially Correlated MIMO Channels  26
Physical-Layer Authentication Over Spatially Correlated MIMO...
收藏 引用
26th International Symposium on Wireless Personal Multimedia Communications (WPMC)
作者: Miwa, Kenta Ando, Kengo de Abreu, Giuseppe Thadeu Freitas Ishibashi, Koji Univ Elect Commun Adv Wireless & Commun Res Ctr Tokyo 1828585 Japan Constructor Univ Sch Comp Sci & Engn D-28759 Bremen Germany
We propose a novel physical-layer authentication (PLA) method that exploits spatio-temporal correlation features of multiple-input multiple-output (MIMO) channels. In particular, in the proposed method, the correlatio... 详细信息
来源: 评论
A survey of Machine Learning-based physical-layer authentication in wireless communications
收藏 引用
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS 2025年 235卷
作者: Meng, Rui Xu, Bingxuan Xu, Xiaodong Sun, Mengying Wang, Bizhu Han, Shujun Lv, Suyu Zhang, Ping Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China Peng Cheng Lab Dept Broadband Commun Shenzhen 518066 Guangdong Peoples R China Beijing Univ Technol Sch Informat Sci & Technol Beijing 100124 Peoples R China
To ensure secure and reliable communication in wireless systems, authenticating the identities of numerous nodes is imperative. Traditional cryptography-based authentication methods suffer from issues such as low comp... 详细信息
来源: 评论
Privacy-Preserving physical-layer authentication Under Cooperative Attacks
收藏 引用
IEEE-ACM TRANSACTIONS ON NETWORKING 2024年 第2期32卷 1171-1186页
作者: Li, Yu Zhang, Jiaheng Chen, Junjie Chen, Yicong Xie, Ning Li, Hongbin Shenzhen Univ Coll Elect & Informat Engn State Key Lab Radio Frequency Heterogeneous Integr Shenzhen 518060 Peoples R China Shenzhen Univ Coll Elect & Informat Engn Guangdong Key Lab Intelligent Informat Proc Shenzhen 518060 Peoples R China Stevens Inst Technol Dept Elect & Comp Engn Hoboken NJ 07030 USA
In this paper, we are concerned about the problem of guaranteeing both privacy and security in a Location-Based Service (LBS) system, where a challenging scenario involving cooperative attack is considered. Since prio... 详细信息
来源: 评论
Hybrid physical-layer authentication
收藏 引用
IEEE TRANSACTIONS ON MOBILE COMPUTING 2024年 第2期23卷 1295-1311页
作者: Xie, Ning Zhang, Jiaheng Zhang, Qihong Tan, Haijun Liu, Alex X. Niyato, Dusit Shenzhen Univ Coll Elect & Informat Engn Guangdong Key Lab Intelligent Informat Proc Shenzhen Key Lab Media Secur Shenzhen 518060 Guangdong Peoples R China Midea Grp Software Engn Inst Foshan 528311 Guangdong Peoples R China Nanyang Technol Univ Sch Comp Sci & Engn Singapore 639798 Singapore
physical-layer authentication (PLA) attracts a lot of research interests because of its significant advantages over upper-layer authentication mechanisms: high security and low complexity. The PLA schemes can be categ... 详细信息
来源: 评论
An Optimization Framework for Active physical-layer authentication
收藏 引用
IEEE TRANSACTIONS ON MOBILE COMPUTING 2024年 第1期23卷 164-179页
作者: Tan, Haijun Xie, Ning Liu, Alex X. Shenzhen Univ Coll Informat Engn Guangdong Key Lab Intelligent Informat Proc Shenzhen 518060 Guangdong Peoples R China Midea Grp Foshan 528311 Guangdong Peoples R China
This paper concerns the problem of the parameter optimization of an active physical-layer authentication (PLA) scheme, which is crucial for minimizing the distortion on the base signal carrying the original message ca... 详细信息
来源: 评论
Improving Wireless Security With Phase-Tag physical-layer authentication
收藏 引用
IEEE TRANSACTIONS ON MOBILE COMPUTING 2025年 第6期24卷 4716-4732页
作者: Chang, Zikai Xiong, Wei Xie, Ning Niyato, Dusit Shenzhen Univ Coll Elect & Informat Engn State Key Lab Radio Frequency Heterogeneous Integr Shenzhen 518060 Peoples R China Shenzhen Univ Coll Elect & Informat Engn Guangdong Key Lab Intelligent Informat Proc Shenzhen 518060 Peoples R China Nanyang Technol Univ Sch Comp Sci & Engn Singapore 639798 Singapore
authentication is a fundamental requirement and a crucial topic in wireless communications. This paper focuses on improving the security of the prior tag-based physical-layer authentication (PLA) schemes. We propose t... 详细信息
来源: 评论
Machine Learning and Deep Learning-Based Multi-Attribute physical-layer authentication for Spoofing Detection in LoRaWAN
收藏 引用
FUTURE INTERNET 2025年 第2期17卷 68-68页
作者: Pourghasem, Azita Kirner, Raimund Tsokanos, Athanasios Mporas, Iosif Mylonas, Alexios Univ Hertfordshire Dept Comp Sci Cybersecur & Comp Syst Res Grp Hatfield AL10 9AB England
The use of wireless sensor networks (WSNs) in critical applications such as environmental monitoring, smart agriculture, and industrial automation has created significant security concerns, particularly due to the bro... 详细信息
来源: 评论
PLAP-PCPE:physical-layer authentication Protocol Based on PUF and Channel Pre-Equalization for the Internet of Things
收藏 引用
China Communications 2025年 第3期22卷 234-253页
作者: Guo Dengke Gao Yuwei Cao Kuo Xiong Jun Ma Dongtang College of Electronic Science and Technology National University of Defense TechnologyChangsha 410073China
How to ensure the security of device access is a common concern in the Internet of Things(IoT)scenario with extremely high device connection *** achieve efficient and secure network access for IoT devices with constra... 详细信息
来源: 评论