2021
DOI: 10.1007/978-3-030-89814-4_3
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Wi-Fi Device Authentication Protocol Leveraging Channel State Information

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…Frigerio [8] proposed a DPGAN framework that utilizes differential privacy techniques to make GAN-based attacks inefficient. Both works by Hao [9] and Truex [10] combine secure multiparty computation and differential privacy to achieve a secure federated learning model. Triastcyn [11] proposes defense techniques for generating fake data at client nodes with minor modifications to allow data sharing instead of model sharing.…”
Section: Introductionmentioning
confidence: 99%
“…Frigerio [8] proposed a DPGAN framework that utilizes differential privacy techniques to make GAN-based attacks inefficient. Both works by Hao [9] and Truex [10] combine secure multiparty computation and differential privacy to achieve a secure federated learning model. Triastcyn [11] proposes defense techniques for generating fake data at client nodes with minor modifications to allow data sharing instead of model sharing.…”
Section: Introductionmentioning
confidence: 99%
“…Using federated learning technology, this model enables different participants to train models together without sharing their datasets, thus solving the problem of data islands. Participants can train the same model using their own data without sharing it with others to prevent privacy leaks [9] . Based on this foundation, in this model, parameter aggregation is not performed at the central server but at each participant's local device [10] .…”
Section: Introductionmentioning
confidence: 99%
“…At present, with the deepening of artificial intelligence, machine learning and graph theory, more and more researchers are trying to explore potential vulnerabilities through new technologies or methods [7], such as functional code similarity detection, vulnerability detection based on deep learning, and using code knowledge graph to locate vulnerabilities [8]. These new ideas and methods provide a direction for solving the problem of vulnerability mining technology, and make vulnerability mining technology more automatic and intelligent [9].…”
Section: Introductionmentioning
confidence: 99%