Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of physical-layer authentication in wireless communications
N **e, Z Li, H Tan - IEEE Communications Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Authentication is an important issue in wireless communications because the open nature of
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …
Physical layer security for next generation wireless networks: Theories, technologies, and challenges
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …
of transmission media to achieve communication confidentiality and authentication. Wiretap …
The role of artificial intelligence and machine learning in wireless networks security: Principle, practice and challenges
Security is one of the biggest challenges concerning networks and communications. The
problem becomes aggravated with the proliferation of wireless devices. Artificial Intelligence …
problem becomes aggravated with the proliferation of wireless devices. Artificial Intelligence …
Principles of physical layer security in multiuser wireless networks: A survey
This paper provides a comprehensive review of the domain of physical layer security in
multiuser wireless networks. The essential premise of physical layer security is to enable the …
multiuser wireless networks. The essential premise of physical layer security is to enable the …
PHY-layer spoofing detection with reinforcement learning in wireless networks
L **ao, Y Li, G Han, G Liu… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In this paper, we investigate the PHY-layer authentication that exploits radio channel
information (such as received signal strength indicators) to detect spoofing attacks in …
information (such as received signal strength indicators) to detect spoofing attacks in …
PHY-layer authentication with multiple landmarks with reduced overhead
L **ao, X Wan, Z Han - IEEE Transactions on Wireless …, 2017 - ieeexplore.ieee.org
Physical (PHY)-layer authentication systems can exploit channel state information of radio
transmitters to detect spoofing attacks in wireless networks. The use of multiple landmarks …
transmitters to detect spoofing attacks in wireless networks. The use of multiple landmarks …
Enhancing information security via physical layer approaches in heterogeneous IoT with multiple access mobile edge computing in smart city
Heterogeneous Internet of Things (IoT) and multi-access mobile edge computing (MA-MEC)
are believed as supporting technologies for building a smart city. The advancement and …
are believed as supporting technologies for building a smart city. The advancement and …
An efficient cross-layer authentication scheme for secure communication in vehicular ad-hoc networks
Intelligent transportation systems contribute to improved traffic safety by facilitating real-time
communication between vehicles and infrastructures. In this context, message …
communication between vehicles and infrastructures. In this context, message …
[HTML][HTML] Deep-learning-based physical layer authentication for industrial wireless sensor networks
In this paper, a deep learning (DL)-based physical (PHY) layer authentication framework is
proposed to enhance the security of industrial wireless sensor networks (IWSNs). Three …
proposed to enhance the security of industrial wireless sensor networks (IWSNs). Three …
Physical-layer authentication based on extreme learning machine
N Wang, T Jiang, S Lv, L **ao - IEEE Communications Letters, 2017 - ieeexplore.ieee.org
Most physical-layer authentication techniques use hypothesis tests to compare the radio
channel information with the channel record of Alice to detect spoofer Eve in wireless …
channel information with the channel record of Alice to detect spoofer Eve in wireless …