Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Modeling, Estimation, and Applications of Phase Noise in Wireless Communications: A Survey
Phase noise is inevitably present in wireless communications, arising from both hardware
impairments and imperfect channel estimation, and has substantial implications on the …
impairments and imperfect channel estimation, and has substantial implications on the …
A Comprehensive Survey on Physical Layer Authentication Techniques: Categorization and Analysis of Model-Driven and Data-Driven Approaches
The open and broadcast nature of wireless mediums introduces significant security
vulnerabilities, making authentication a critical concern in wireless networks. In recent years …
vulnerabilities, making authentication a critical concern in wireless networks. In recent years …
An enhanced indoor positioning algorithm based on fingerprint using fine-grained csi and rssi measurements of ieee 802.11 n wlan
J Wang, J Park - Sensors, 2021 - mdpi.com
Received signal strength indication (RSSI) obtained by Medium Access Control (MAC) layer
is widely used in range-based and fingerprint location systems due to its low cost and low …
is widely used in range-based and fingerprint location systems due to its low cost and low …
Exploiting carrier frequency offset and phase noise for physical layer authentication in UAV-aided communication systems
Y Teng, P Zhang, Y Liu, J Dong… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
This paper exploits two intrinsic hardware-specific fingerprints in terms of carrier frequency
offset (CFO) and phase noise (PHN) to propose a two-dimensional physical layer …
offset (CFO) and phase noise (PHN) to propose a two-dimensional physical layer …
Physical layer authentication based on channel polarization response in dual-polarized antenna communication systems
Y Wu, D Wei, C Guo, W Huang - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This study presents a novel approach for physical layer authentication based on channel
polarization response (CPR). CPR is sensitive to variation in the physical properties of …
polarization response (CPR). CPR is sensitive to variation in the physical properties of …
Detection of jamming attacks for the physical-layer authentication
This paper concerns the problem of defending against the jamming attack for the Physical-
Layer Authentication (PLA). The problem is important due to the fact that jamming attacks …
Layer Authentication (PLA). The problem is important due to the fact that jamming attacks …
Exploiting fine-grained channel/hardware features for PHY-layer authentication in mmwave MIMO systems
Y Liu, P Zhang, J Liu, Y Shen… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The communication channels in millimeter wave (mmWave) multiple-input multiple-output
(MIMO) systems possess some unique fine-grained angle domain features such as channel …
(MIMO) systems possess some unique fine-grained angle domain features such as channel …
Polarization fingerprint-based LoRaWAN physical layer authentication
J Xu, D Wei - IEEE Transactions on Information Forensics and …, 2023 - ieeexplore.ieee.org
Currently, radio frequency fingerprint (RFF), which describes the physical layer features of
wireless signals in time-frequency domain, has been intensively studied. However, the …
wireless signals in time-frequency domain, has been intensively studied. However, the …
A novel hybrid physical-layer authentication scheme for multiuser wireless communication systems
Guaranteeing decent secrecy levels in future wireless network generations has gained
crucial importance due to the unprecedented increase in wireless connectivity worldwide. In …
crucial importance due to the unprecedented increase in wireless connectivity worldwide. In …
Adaptive physical-layer authentication for IoT in MIMO communication systems using support vector machine
Internet of Things (IoT) devices have become ubiquitous due to the prevalence of the
Internet. However, the open nature of wireless networks makes them susceptible to spoofing …
Internet. However, the open nature of wireless networks makes them susceptible to spoofing …