{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:17:37Z","timestamp":1742991457371,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030695132"},{"type":"electronic","value":"9783030695149"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-69514-9_10","type":"book-chapter","created":{"date-parts":[[2021,3,5]],"date-time":"2021-03-05T21:02:40Z","timestamp":1614978160000},"page":"106-115","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Machine Learning-Based Security Authentication for IoT Networks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5585-5220","authenticated-orcid":false,"given":"Xiaoying","family":"Qiu","sequence":"first","affiliation":[]},{"given":"Xuan","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Xiameng","family":"Si","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,6]]},"reference":[{"issue":"4","key":"10_CR1","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","volume":"17","author":"A Al-Fuqaha","year":"2015","unstructured":"Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of Things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 17(4), 2347\u20132376 (2015). https:\/\/doi.org\/10.1109\/COMST.2015.2444095","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Xu, T., Darwazeh, I.: Design and prototyping of neural network compression for non-orthogonal IoT signals. In: IEEE Wireless Communications and Networking Conference (WCNC), Marrakesh, Morocco, vol. 2019, pp. 1\u20136 (2019)","DOI":"10.1109\/WCNC.2019.8885830"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Xu, T.: Waveform-defined security: a framework for secure communications. In: IEEE\/IET 12th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP2020), Porto, Portugal (2020)","DOI":"10.1109\/CSNDSP49049.2020.9249605"},{"issue":"5","key":"10_CR4","doi-asserted-by":"publisher","first-page":"8169","DOI":"10.1109\/JIOT.2019.2927379","volume":"6","author":"N Wang","year":"2019","unstructured":"Wang, N., Wang, P., Alipour-Fanid, A., Jiao, L., Zeng, K.: Physical-layer security of 5G wireless networks for IoT: challenges and opportunities. IEEE Internet Things J. 6(5), 8169\u20138181 (2019)","journal-title":"IEEE Internet Things J."},{"key":"10_CR5","doi-asserted-by":"publisher","first-page":"1363","DOI":"10.1109\/TIFS.2019.2939742","volume":"15","author":"N Wang","year":"2020","unstructured":"Wang, N., Jiao, L., Alipour-Fanid, A., Dabaghchian, M., Zeng, K.: Pilot contamination attack detection for NOMA in 5G mm-wave massive MIMO networks. IEEE Trans. Inf. Forensics Secur. 15, 1363\u20131378 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"10_CR6","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1109\/TVT.2019.2954094","volume":"69","author":"G Gui","year":"2020","unstructured":"Gui, G., Liu, F., Sun, J., Yang, J., Zhou, Z., Zhao, D.: Flight delay prediction based on aviation big data and machine learning. IEEE Trans. Veh. Technol. 69(1), 140\u2013150 (2020)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"1","key":"10_CR7","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1109\/MWC.2019.1900027","volume":"27","author":"H Huang","year":"2020","unstructured":"Huang, H., et al.: Deep learning for physical-layer 5G wireless techniques: opportunities, challenges and solutions. IEEE Wirel. Commun. 27(1), 214\u2013222 (2020)","journal-title":"IEEE Wirel. Commun."},{"issue":"7","key":"10_CR8","doi-asserted-by":"publisher","first-page":"1557","DOI":"10.1109\/LCOMM.2017.2690437","volume":"21","author":"N Wang","year":"2017","unstructured":"Wang, N., Jiang, T., Lv, S., Xiao, L.: Physical-layer authentication based on extreme learning machine. IEEE Commun. Lett. 21(7), 1557\u20131560 (2017)","journal-title":"IEEE Commun. Lett."},{"issue":"15","key":"10_CR9","doi-asserted-by":"publisher","first-page":"1805","DOI":"10.1049\/iet-com.2018.0059","volume":"12","author":"X Qiu","year":"2018","unstructured":"Qiu, X., Jiang, T., Wang, N.: Safeguarding multiuser communication using full-duplex jamming and Q-learning algorithm. IET Commun. 12(15), 1805\u20131811 (2018)","journal-title":"IET Commun."},{"issue":"5","key":"10_CR10","doi-asserted-by":"publisher","first-page":"640","DOI":"10.1049\/iet-spr.2016.0378","volume":"11","author":"N Wang","year":"2017","unstructured":"Wang, N., Li, W., Jiang, T., Lv, S.: Physical layer spoofing detection based on sparse signal processing and fuzzy recognition. IET Signal Process. 11(5), 640\u2013646 (2017)","journal-title":"IET Signal Process."},{"issue":"9","key":"10_CR11","doi-asserted-by":"publisher","first-page":"1431","DOI":"10.1049\/iet-com.2016.1088","volume":"11","author":"N Wang","year":"2017","unstructured":"Wang, N., Jiang, T., Li, W., Lv, S.: Physical-layer security in Internet of Things based on compressed sensing and frequency selection. IET Commun. 11(9), 1431\u20131437 (2017)","journal-title":"IET Commun."},{"key":"10_CR12","doi-asserted-by":"publisher","unstructured":"Moon, T., Choi, H., Lee, H., Song, I.: Rnndrop: a novel dropout for RNNs in ASR. In: ASRU, pp. 65\u201370 (2015). https:\/\/doi.org\/10.1109\/ASRU.2015.7404775","DOI":"10.1109\/ASRU.2015.7404775"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Qiu, X., et al: Wireless user authentication based on KLT and Gaussian mixture model. IEEE Wireless Communications and Networking Conference (WCNC), Marrakesh, Morocco, vol. 2019, pp. 1\u20135 (2019)","DOI":"10.1109\/WCNC.2019.8885922"},{"key":"10_CR14","doi-asserted-by":"publisher","first-page":"53583","DOI":"10.1109\/ACCESS.2018.2871514","volume":"6","author":"X Qiu","year":"2018","unstructured":"Qiu, X., Jiang, T., Wu, S., Hayes, M.: Physical layer authentication enhancement using a Gaussian mixture model. IEEE Access 6, 53583\u201353592 (2018)","journal-title":"IEEE Access"},{"key":"10_CR15","doi-asserted-by":"publisher","first-page":"26139","DOI":"10.1109\/ACCESS.2020.2971260","volume":"8","author":"X Qiu","year":"2020","unstructured":"Qiu, X., Dai, J., Hayes, M.: A learning approach for physical layer authentication using adaptive neural network. IEEE Access 8, 26139\u201326149 (2020)","journal-title":"IEEE Access"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Smart Grid and Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-69514-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,5]],"date-time":"2021-03-05T21:12:03Z","timestamp":1614978723000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-69514-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030695132","9783030695149"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-69514-9_10","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"6 March 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SGIoT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Smart Grid and Internet of Things","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"TaiChung","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sgiot2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sgiot.eai-conferences.org\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy+","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"159","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}