2019 IEEE International Workshop on Information Forensics and Security (WIFS) 2019
DOI: 10.1109/wifs47025.2019.9035105
|View full text |Cite
|
Sign up to set email alerts
|

Blind Physical Layer Authentication over Fading Wireless Channels through Machine Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…Indeed, there is no limit for combining the available information in the interest of creating helpful datasets. Having said that, the datasets built on the basis of channel measurements are commonly used as the input data, e.g., see [22], [24], [25].…”
Section: A Traditional Datamentioning
confidence: 99%
See 2 more Smart Citations
“…Indeed, there is no limit for combining the available information in the interest of creating helpful datasets. Having said that, the datasets built on the basis of channel measurements are commonly used as the input data, e.g., see [22], [24], [25].…”
Section: A Traditional Datamentioning
confidence: 99%
“…As a further development, the authors of [23] suggest using estimated channel matrices for generating features and then compare four different ML algorithms, i.e., the k-NN, SVM, decision tree and bagged tree, in terms of their accuracy and prediction time. Similar to [73], the training data considered in [25] contains only a single class under the assumption that there is no knowledge concerning any of the potential adversary. Also assuming that the prior knowledge of the CSI of illegitimate devices is unavailable, Du et al [169] utilize a CART decision tree for designing an authenticator that is trained on CSI-based datasets for differentiating legitimate devices from illegitimate ones.…”
Section: The Application Of ML In Phy Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…As a further development, the authors of [19] suggest using estimated channel matrices for generating features and then compare four different ML algorithms, i.e., the k-NN, SVM, decision tree and bagged tree, in terms of their accuracy and prediction time. Similar to [71], the training data considered in [21] contains only a single class under the assumption that there is no knowledge concerning any of the potential eavesdropper. In [21], single-class nearest neighbour classification is performed on the single-class data for finding both high-and low-density regions, thereby creating a predictive model for authentication.…”
Section: B Recent Advances and Future Directionsmentioning
confidence: 99%
“…Similar to [71], the training data considered in [21] contains only a single class under the assumption that there is no knowledge concerning any of the potential eavesdropper. In [21], single-class nearest neighbour classification is performed on the single-class data for finding both high-and low-density regions, thereby creating a predictive model for authentication. The authors of [23] propose a logistic regression model for authentication and estimate the coefficients of the model by using the popular Frank-Wolfe algorithm.…”
Section: B Recent Advances and Future Directionsmentioning
confidence: 99%