A comprehensive survey on radio frequency (RF) fingerprinting: Traditional approaches, deep learning, and open challenges
Fifth generation (5G) network and beyond envision massive Internet of Things (IoT) rollout to
support disruptive applications such as extended reality (XR), augmented/virtual reality …
support disruptive applications such as extended reality (XR), augmented/virtual reality …
Intrusion detection systems: A cross-domain overview
Nowadays, network technologies are essential for transferring and storing various
information of users, companies, and industries. However, the growth of the information …
information of users, companies, and industries. However, the growth of the information …
Tutorial on practical tips of the most influential data preprocessing algorithms in data mining
Data preprocessing is a major and essential stage whose main goal is to obtain final data
sets that can be considered correct and useful for further data mining algorithms. This paper …
sets that can be considered correct and useful for further data mining algorithms. This paper …
Adaptive relevance matrices in learning vector quantization
We propose a new matrix learning scheme to extend relevance learning vector quantization
(RLVQ), an efficient prototype-based classification algorithm, toward a general adaptive …
(RLVQ), an efficient prototype-based classification algorithm, toward a general adaptive …
K nearest neighbours with mutual information for simultaneous classification and missing data imputation
Missing data is a common drawback in many real-life pattern classification scenarios. One of
the most popular solutions is missing data imputation by the K nearest neighbours (KNN) …
the most popular solutions is missing data imputation by the K nearest neighbours (KNN) …
Authorized and rogue device discrimination using dimensionally reduced RF-DNA fingerprints
DR Reising, MA Temple… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Unauthorized network access and spoofing attacks at wireless access points (WAPs) have
been traditionally addressed using bit-centric security measures and remain a major …
been traditionally addressed using bit-centric security measures and remain a major …
A review of learning vector quantization classifiers
D Nova, PA Estévez - Neural Computing and Applications, 2014 - Springer
In this work, we present a review of the state of the art of learning vector quantization (LVQ)
classifiers. A taxonomy is proposed which integrates the most relevant LVQ approaches to …
classifiers. A taxonomy is proposed which integrates the most relevant LVQ approaches to …
A survey of techniques for the identification of mobile phones using the physical fingerprints of the built-in components
In recent years, several research studies have investigated the identification of electronic
devices through their physical components and properties, both from a theoretical point of …
devices through their physical components and properties, both from a theoretical point of …
Method and system for predicting movement behavior of a target traffic object
J Schmüdderich, S Rebhan - US Patent 8,903,588, 2014 - Google Patents
The present invention relates to the field of automated, 5 computerized driver assistance in
air, land or sea vehicles, where a sensor of a host vehicle physically senses the envi …
air, land or sea vehicles, where a sensor of a host vehicle physically senses the envi …
Improving ZigBee device network authentication using ensemble decision tree classifiers with radio frequency distinct native attribute fingerprinting
HJ Patel, MA Temple… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
The popularity of ZigBee devices continues to grow in home automation, transportation,
traffic management, and Industrial Control System (ICS) applications given their low-cost …
traffic management, and Industrial Control System (ICS) applications given their low-cost …