A comprehensive survey on radio frequency (RF) fingerprinting: Traditional approaches, deep learning, and open challenges

A Jagannath, J Jagannath, PSPV Kumar - Computer Networks, 2022 - Elsevier
Fifth generation (5G) network and beyond envision massive Internet of Things (IoT) rollout to
support disruptive applications such as extended reality (XR), augmented/virtual reality …

Intrusion detection systems: A cross-domain overview

LN Tidjon, M Frappier… - … Communications Surveys & …, 2019 - ieeexplore.ieee.org
Nowadays, network technologies are essential for transferring and storing various
information of users, companies, and industries. However, the growth of the information …

Tutorial on practical tips of the most influential data preprocessing algorithms in data mining

S García, J Luengo, F Herrera - Knowledge-Based Systems, 2016 - Elsevier
Data preprocessing is a major and essential stage whose main goal is to obtain final data
sets that can be considered correct and useful for further data mining algorithms. This paper …

Adaptive relevance matrices in learning vector quantization

P Schneider, M Biehl, B Hammer - Neural computation, 2009 - ieeexplore.ieee.org
We propose a new matrix learning scheme to extend relevance learning vector quantization
(RLVQ), an efficient prototype-based classification algorithm, toward a general adaptive …

K nearest neighbours with mutual information for simultaneous classification and missing data imputation

PJ García-Laencina, JL Sancho-Gómez… - Neurocomputing, 2009 - Elsevier
Missing data is a common drawback in many real-life pattern classification scenarios. One of
the most popular solutions is missing data imputation by the K nearest neighbours (KNN) …

Authorized and rogue device discrimination using dimensionally reduced RF-DNA fingerprints

DR Reising, MA Temple… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Unauthorized network access and spoofing attacks at wireless access points (WAPs) have
been traditionally addressed using bit-centric security measures and remain a major …

A review of learning vector quantization classifiers

D Nova, PA Estévez - Neural Computing and Applications, 2014 - Springer
In this work, we present a review of the state of the art of learning vector quantization (LVQ)
classifiers. A taxonomy is proposed which integrates the most relevant LVQ approaches to …

A survey of techniques for the identification of mobile phones using the physical fingerprints of the built-in components

G Baldini, G Steri - IEEE Communications Surveys & Tutorials, 2017 - ieeexplore.ieee.org
In recent years, several research studies have investigated the identification of electronic
devices through their physical components and properties, both from a theoretical point of …

Method and system for predicting movement behavior of a target traffic object

J Schmüdderich, S Rebhan - US Patent 8,903,588, 2014 - Google Patents
The present invention relates to the field of automated, 5 computerized driver assistance in
air, land or sea vehicles, where a sensor of a host vehicle physically senses the envi …

Improving ZigBee device network authentication using ensemble decision tree classifiers with radio frequency distinct native attribute fingerprinting

HJ Patel, MA Temple… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
The popularity of ZigBee devices continues to grow in home automation, transportation,
traffic management, and Industrial Control System (ICS) applications given their low-cost …