Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey
Wireless networks are a key component of the telecommunications infrastructure in our
society, and wireless services become increasingly important as the applications of wireless …
society, and wireless services become increasingly important as the applications of wireless …
A survey of physical layer techniques for secure wireless communications in industry
The industrial environment poses strict requirements to the infrastructure of good and
service production and delivery. Communications are not an exception. Wired systems …
service production and delivery. Communications are not an exception. Wired systems …
Radio frequency fingerprint identification for narrowband systems, modelling and classification
Device authentication is essential for securing Internet of things. Radio frequency fingerprint
identification (RFFI) is an emerging technique that exploits intrinsic and unique hardware …
identification (RFFI) is an emerging technique that exploits intrinsic and unique hardware …
Deep learning based RF fingerprint identification using differential constellation trace figure
This paper proposes a novel deep learning-based radio frequency fingerprint (RFF)
identification method for internet of things (IoT) terminal authentications. Differential …
identification method for internet of things (IoT) terminal authentications. Differential …
A robust RF fingerprinting approach using multisampling convolutional neural network
With the increasing popularity of the Internet of Things (IoT), device identification, and
authentication has become a critical security issue. Recently, radio frequency (RF) …
authentication has become a critical security issue. Recently, radio frequency (RF) …
Privacy in the smart city—applications, technologies, challenges, and solutions
Many modern cities strive to integrate information technology into every aspect of city life to
create so-called smart cities. Smart cities rely on a large number of application areas and …
create so-called smart cities. Smart cities rely on a large number of application areas and …
Design of a hybrid RF fingerprint extraction and device classification scheme
Radio frequency (RF) fingerprint is the inherent hardware characteristics and has been
employed to classify and identify wireless devices in many Internet of Things applications …
employed to classify and identify wireless devices in many Internet of Things applications …
No Radio Left Behind: Radio Fingerprinting Through Deep Learning of Physical-Layer Hardware Impairments
K Sankhe, M Belgiovine, F Zhou… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Due to the unprecedented scale of the Internet of Things, designing scalable, accurate,
energy-efficient and tamper-proof authentication mechanisms has now become more …
energy-efficient and tamper-proof authentication mechanisms has now become more …
Cloud-fog automation: Vision, enabling technologies, and future research directions
The Industry 4.0 digital transformation envisages future industrial systems to be fully
automated, including the control, upgrade, and configuration processes of a large number of …
automated, including the control, upgrade, and configuration processes of a large number of …
A new frontier for IoT security emerging from three decades of key generation relying on wireless channels
The Internet of Things (IoT) is a transformative technology, which is revolutionizing our
everyday life by connecting everyone and everything together. The massive number of …
everyday life by connecting everyone and everything together. The massive number of …