{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:46:49Z","timestamp":1743155209502,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030190859"},{"type":"electronic","value":"9783030190866"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-19086-6_50","type":"book-chapter","created":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T18:09:24Z","timestamp":1557598164000},"page":"452-460","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["The Physical Layer Identification of Communication Devices Based on RF-DNA"],"prefix":"10.1007","author":[{"given":"Ying","family":"Li","sequence":"first","affiliation":[]},{"given":"Xiang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Yun","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,12]]},"reference":[{"key":"50_CR1","unstructured":"Szu, H.H.: Novel identification of intercepted signals from unknown radio transmitters. In: Proceedings of SPIE - The International Society for Optical Engineering, vol. 2491, no. 1, pp. 504\u2013517 (1995)"},{"key":"50_CR2","unstructured":"Toonstra, J., Kinsner, W.: Transient analysis and genetic algorithms for classification. In: Conference Proceedings of the IEEE Communications, Power, and Computing IEEE 1995, WESCANEX 95, vol. 2, pp. 432\u2013437. IEEE (1995)"},{"key":"50_CR3","doi-asserted-by":"crossref","unstructured":"Desmond, L.C.C., Yuan, C.C., Tan, C.P., et al.: Identifying unique devices through wireless fingerprinting. In: ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, 31 March\u2013April, pp. 46\u201355. DBLP (2008)","DOI":"10.1145\/1352533.1352542"},{"key":"50_CR4","unstructured":"Gao, K., Corbett, C., Beyah, R.: A passive approach to wireless device fingerprinting. In: IEEE\/IFIP International Conference on Dependable Systems and Networks, IEEE 2010, pp. 383\u2013392. IEEE (2010)"},{"issue":"6","key":"50_CR5","doi-asserted-by":"publisher","first-page":"2179","DOI":"10.1109\/TMTT.2005.848801","volume":"53","author":"KG Gard","year":"2005","unstructured":"Gard, K.G., Larson, L.E., Steer, M.B.: The impact of RF front-end characteristics on the spectral regrowth of communications signals. IEEE Trans. Microw. Theory Tech. 53(6), 2179\u20132186 (2005)","journal-title":"IEEE Trans. Microw. Theory Tech."},{"issue":"7","key":"50_CR6","doi-asserted-by":"publisher","first-page":"1469","DOI":"10.1109\/JSAC.2011.110812","volume":"29","author":"AC Polak","year":"2011","unstructured":"Polak, A.C., Dolatshahi, S., Goeckel, D.L.: Identifying wireless users via transmitter imperfections. IEEE J. Sel. Areas Commun. 29(7), 1469\u20131479 (2011)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"50_CR7","unstructured":"Polak, A.C., Goeckel, D.L.: RF fingerprinting of users who actively mask their identities with artificial distortion. In: Signals, Systems and Computers, IEEE 2013, pp. 270\u2013274. IEEE (2013)"},{"issue":"5","key":"50_CR8","doi-asserted-by":"publisher","first-page":"3700","DOI":"10.1109\/TVT.2015.2440428","volume":"65","author":"N Zhao","year":"2016","unstructured":"Zhao, N., Yu, F.R., Sun, H., et al.: Adaptive power allocation schemes for spectrum sharing in interference-alignment-based cognitive radio networks. IEEE Trans. Veh. Technol. 65(5), 3700\u20133714 (2016)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"50_CR9","doi-asserted-by":"crossref","unstructured":"Nguyen, N.T., Zheng, G., Han, Z., et al.: Device fingerprinting to enhance wireless security using nonparametric Bayesian method. In: Proceedings IEEE, INFOCOM 2011, IEEE 2011, vol. 34, pp. 1404\u20131412. IEEE (2011)","DOI":"10.1109\/INFCOM.2011.5934926"},{"key":"50_CR10","unstructured":"Danev, B., Capkun, S.: Transient-based identification of wireless sensor nodes. In: International Conference on Information Processing in Sensor Networks IEEE 2009, pp. 25\u201336. IEEE (2009)"},{"key":"50_CR11","doi-asserted-by":"crossref","unstructured":"Polak, A.C., Goeckel, D.L.: Wireless device identification based on RF oscillator imperfections. In: IEEE International Conference on Acoustics, Speech and Signal Processing IEEE, vol. 10, pp. 2492\u20132501. IEEE (2014)","DOI":"10.1109\/TIFS.2015.2464778"},{"issue":"1","key":"50_CR12","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1109\/JSTSP.2018.2796446","volume":"12","author":"K Merchant","year":"2018","unstructured":"Merchant, K., Revay, S., Stantchev, G., et al.: Deep learning for RF device fingerprinting in cognitive communication networks. IEEE J. Sel. Top. Signal Process. 12(1), 160\u2013167 (2018)","journal-title":"IEEE J. Sel. Top. Signal Process."},{"key":"50_CR13","doi-asserted-by":"crossref","unstructured":"Li, Z., Xu, W., Miller, R., et al.: Securing wireless systems via lower layer enforcements. In: ACM Workshop on Wireless Security ACM, pp. 33\u201342. ACM (2006)","DOI":"10.1145\/1161289.1161297"},{"key":"50_CR14","unstructured":"Liang, X., Greenstein, L., Mandayam, N., et al.: Fingerprints in the ether: using the physical layer for wireless authentication. In: IEEE International Conference on Communications IEEE, pp. 4646\u20134651. IEEE (2009)"},{"issue":"2","key":"50_CR15","first-page":"243","volume":"55","author":"Y Tu","year":"2018","unstructured":"Tu, Y., Lin, Y., Wang, J., et al.: Semi-supervised learning with generative adversarial networks on digital signal modulation classification. CMC-Comput. Mater. Continua 55(2), 243\u2013254 (2018)","journal-title":"CMC-Comput. Mater. Continua"},{"issue":"12","key":"50_CR16","doi-asserted-by":"publisher","first-page":"6191","DOI":"10.1109\/TNNLS.2018.2827036","volume":"29","author":"JT Zhou","year":"2018","unstructured":"Zhou, J.T., Zhao, H., Peng, X., et al.: Transfer hashing: from shallow to deep. IEEE Trans. Neural Netw. Learn. Syst. 29(12), 6191\u20136201 (2018)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"issue":"1","key":"50_CR17","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1109\/MCOM.2017.1700323","volume":"56","author":"Z Zheng","year":"2018","unstructured":"Zheng, Z., Sangaiah, A.K., Wang, T.: Adaptive communication protocols in flying Ad Hoc network. IEEE Commun. Mag. 56(1), 136\u2013142 (2018)","journal-title":"IEEE Commun. Mag."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Advanced Hybrid Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-19086-6_50","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T09:11:42Z","timestamp":1562749902000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-19086-6_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030190859","9783030190866"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-19086-6_50","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"12 May 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ADHIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Hybrid Information Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Yiyang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"adhip2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/adhip2018.eai-conferences.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}