Contents
Academic literature on the topic 'Physical layer authentication'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Physical layer authentication.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Physical layer authentication"
Yu, Paul L., John S. Baras, and Brian M. Sadler. "Physical-Layer Authentication." IEEE Transactions on Information Forensics and Security 3, no. 1 (2008): 38–51. http://dx.doi.org/10.1109/tifs.2007.916273.
Full textLavanya, D. L., R. Ramaprabha, and K. Gunaseelan. "Privacy Preserving Physical Layer Authentication Scheme for LBS based Wireless Networks." Defence Science Journal 71, no. 2 (2021): 241–47. http://dx.doi.org/10.14429/dsj.71.15355.
Full textChen, Songlin, Hong Wen, Jinsong Wu, et al. "Physical-Layer Channel Authentication for 5G via Machine Learning Algorithm." Wireless Communications and Mobile Computing 2018 (October 2, 2018): 1–10. http://dx.doi.org/10.1155/2018/6039878.
Full textShi, Zhi Yuan, Chang Zheng Zhang, Cai Dan Zhao, Lian Fen Huang, and Yi Feng Zhao. "One Solution to Physical-Layer Authentication in Wireless Communication System." Advanced Materials Research 791-793 (September 2013): 2071–75. http://dx.doi.org/10.4028/www.scientific.net/amr.791-793.2071.
Full textXie, Ning, and Changsheng Chen. "Slope Authentication at the Physical Layer." IEEE Transactions on Information Forensics and Security 13, no. 6 (2018): 1579–94. http://dx.doi.org/10.1109/tifs.2018.2797963.
Full textChen, Yi, Hong Wen, Jinsong Wu, et al. "Clustering Based Physical-Layer Authentication in Edge Computing Systems with Asymmetric Resources." Sensors 19, no. 8 (2019): 1926. http://dx.doi.org/10.3390/s19081926.
Full textJing, Tao, Hongyan Huang, Yue Wu, Qinghe Gao, Yan Huo, and Jiayu Sun. "Threshold-free multi-attributes physical layer authentication based on expectation–conditional maximization channel estimation in Internet of Things." International Journal of Distributed Sensor Networks 18, no. 7 (2022): 155013292211078. http://dx.doi.org/10.1177/15501329221107822.
Full textQiu, Xiaoying, Xuan Sun, and Monson Hayes. "Enhanced Security Authentication Based on Convolutional-LSTM Networks." Sensors 21, no. 16 (2021): 5379. http://dx.doi.org/10.3390/s21165379.
Full textZhang, Xiaolong, Wei Wu, and Bin Zhou. "Secure Physical Layer Transmission and Authentication Mechanism Based on Compressed Sensing of Multiple Antenna Arrays." Journal of Sensors 2021 (November 10, 2021): 1–11. http://dx.doi.org/10.1155/2021/7022297.
Full textLiao, Run-Fa, Hong Wen, Jinsong Wu, et al. "Deep-Learning-Based Physical Layer Authentication for Industrial Wireless Sensor Networks." Sensors 19, no. 11 (2019): 2440. http://dx.doi.org/10.3390/s19112440.
Full text