{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,21]],"date-time":"2026-05-21T17:35:01Z","timestamp":1779384901300,"version":"3.53.1"},"reference-count":189,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100006602","name":"U.S. Air Force Research Laboratory","doi-asserted-by":"publisher","award":["FA8750-20-2-0504"],"award-info":[{"award-number":["FA8750-20-2-0504"]}],"id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100002186","name":"Lockheed Martin Corporation","doi-asserted-by":"publisher","award":["M16-005-RPP010"],"award-info":[{"award-number":["M16-005-RPP010"]}],"id":[{"id":"10.13039\/100002186","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1564148"],"award-info":[{"award-number":["CNS-1564148"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3185124","type":"journal-article","created":{"date-parts":[[2022,6,21]],"date-time":"2022-06-21T19:41:15Z","timestamp":1655840475000},"page":"66238-66266","source":"Crossref","is-referenced-by-count":70,"title":["Interference Suppression Using Deep Learning: Current Approaches and Open Challenges"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1141-4922","authenticated-orcid":false,"given":"Taiwo","family":"Oyedare","sequence":"first","affiliation":[{"name":"Bradley Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, VA, USA"}],"role":[{"vocabulary":"crossref","role":"author"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4501-8170","authenticated-orcid":false,"given":"Vijay K.","family":"Shah","sequence":"additional","affiliation":[{"name":"Department of Cybersecurity Engineering, George Mason University, Fairfax, VA, USA"}],"role":[{"vocabulary":"crossref","role":"author"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6653-1005","authenticated-orcid":false,"given":"Daniel J.","family":"Jakubisin","sequence":"additional","affiliation":[{"name":"Bradley Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, VA, USA"}],"role":[{"vocabulary":"crossref","role":"author"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3494-1901","authenticated-orcid":false,"given":"Jeffrey H.","family":"Reed","sequence":"additional","affiliation":[{"name":"Bradley Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, VA, USA"}],"role":[{"vocabulary":"crossref","role":"author"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/9780470825631.ch8"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2017.2651698"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/DySPAN.2014.6817773"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSP.2017.8096078"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2019.2891147"},{"key":"ref6","first-page":"1","article-title":"Mitigation of narrowband interference using adaptive equalizers","volume-title":"Proc. 14th Eur. Signal Process. Conf.","author":"Batra"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1029\/2004RS003136"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/1152\/1\/012001"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1996.550116"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DYSPAN.2007.35"},{"key":"ref11","article-title":"The property-restoral approach to blind adaptive signal extraction","author":"Agee","year":"1989"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/VETEC.1993.507019"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2003.1215649"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/26.380033"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1049\/iet-rsn.2014.0058"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1049\/iet-rsn.2010.0102"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/78.489029"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2005.863698"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2884637"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-016-0736-8"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3119561"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2021.3117399"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICED.2014.7015839"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199098"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.2529\/PIERS050904035811"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/s150613805"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/RADAR.2019.8835681"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7293310"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2994374.2994402"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2002.806591"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2030613.2030647"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486033"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC.2018.8445987"},{"key":"ref34","article-title":"Multi-label wireless interference identification with convolutional neural networks","author":"Grunau","year":"2018","journal-title":"arXiv:1804.04395"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/APWiMob.2016.7811435"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/5.4455"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/26.57504"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6353683"},{"key":"ref39","article-title":"Coexistence gaps in space: Cross-technology interference-nulling for improving LTE-U\/WiFi coexistence","author":"Bayhan","year":"2017","journal-title":"arXiv:1710.07927"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2815585"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2593666"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2011.5779468"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1175\/BAMS-D-15-00048.1"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2132790"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057214"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2013.6737584"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2643230.2643235"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2016.7460663"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3412382.3458264"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9348010"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS47774.2020.00061"},{"key":"ref52","first-page":"1","article-title":"Security in 802.15. 4 and ZigBee networks","volume":"28","author":"Gasc\u00f3n","year":"2009"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-017-0808-4"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2014.7063527"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761524"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2517351.2517376"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2367580.2367582"},{"key":"ref58","first-page":"108","article-title":"Spectral interference study of Wi-Fi on wireless sensor networks","volume-title":"Proc. 8th UGent PhD Symp.","author":"Vanheel"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5502780"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/IMSCCS.2008.41"},{"key":"ref61","first-page":"3766","article-title":"Mitigating interference in a heterogeneous wireless network using channel selection","volume-title":"Proc. Special Issue Int. Conf. Adv. Mater. Eng. Technol.","author":"Hassan"},{"key":"ref62","volume-title":"Studies on the Interference Behavior of Automotive Radar Sensors","author":"Fischer","year":"2016"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.23919\/EURAD.2017.8249154"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ICTEL.2012.6221328"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2019.2908214"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1049\/cp:19971620"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1981.1163543"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2018.8351077"},{"key":"ref69","article-title":"CFAR-based interference mitigation for FMCW automotive radar systems","author":"Wang","year":"2021","journal-title":"arXiv:2101.01257"},{"key":"ref70","volume-title":"Fundamentals of Radar Signal Processing","author":"Richards","year":"2005"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2020-Fall49728.2020.9348690"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.23919\/FUSION43075.2019.9011164"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2021.3062452"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/RadarConf2147009.2021.9455296"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.23919\/PIERS.2018.8597902"},{"key":"ref76","first-page":"1","article-title":"Nonlinear interference mitigation via deep neural networks","volume-title":"Proc. Opt. Fiber Commun. Conf. Expo. (OFC)","author":"H\u00e4ger"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ECTI-CON51831.2021.9454889"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/s10291-015-0442-8"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMR.457-458.1111"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2021.3116188"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013521"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIS49662.2019.00015"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2018.8645295"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPCC.2018.8567617"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2010.5493820"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2018.8690848"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053013"},{"issue":"3","key":"ref88","first-page":"519","article-title":"GPS interference mitigation using derivative-free Kalman filter-based RNN","volume":"25","author":"Wei-Lung","year":"2016","journal-title":"Radioengineering"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/25.752570"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/WiCom.2008.433"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322340"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/RADAR42522.2020.9114641"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2017.2784180"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2017.2758370"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422339"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3025597"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45778-5_23"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9413619"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2018.2867068"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.12928\/telkomnika.v18i4.14879"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2017.8104767"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3026749"},{"key":"ref103","volume-title":"Deep Learning","author":"Goodfellow","year":"2016"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143865"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-84858-7_2"},{"key":"ref106","first-page":"17","article-title":"Deep learning of representations for unsupervised and transfer learning","volume-title":"Proc. ICML Workshop Unsupervised Transf. Learn.","author":"Bengio"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.1998.712192"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.2200\/s00196ed1v01y200906aim006"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2009.2015974"},{"key":"ref110","article-title":"MixMatch: A holistic approach to semi-supervised learning","author":"Berthelot","year":"2019","journal-title":"arXiv:1905.02249"},{"key":"ref111","first-page":"391","article-title":"Semi-supervised convolutional neural networks for identifying Wi-Fi interference sources","volume-title":"Proc. Asian Conf. Mach. Learn.","author":"Longi"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2018.2797022"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-25748-4_6"},{"key":"ref114","article-title":"Deep sensing: Cooperative spectrum sensing based on convolutional neural networks","author":"Lee","year":"2017","journal-title":"arXiv:1705.08164"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2899085"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2017.8262721"},{"key":"ref117","first-page":"2672","article-title":"Generative adversarial nets","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"27","author":"Goodfellow"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2018.8553233"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2018.8644250"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2017.2757490"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2018.2794062"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/ICEngTechnol.2017.8308186"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1016\/j.ascom.2017.01.002"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.3390\/rs11141654"},{"key":"ref125","article-title":"Quantized neural networks for radar interference mitigation","author":"Rock","year":"2020","journal-title":"arXiv:2011.12706"},{"key":"ref126","article-title":"An introduction to convolutional neural networks","author":"O\u2019Shea","year":"2015","journal-title":"arXiv:1511.08458"},{"key":"ref127","volume-title":"The MNIST Database of Handwritten Digits","author":"LeCun","year":"1998"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2004.03.008"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2018.2796446"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/JRFID.2018.2880457"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2850703"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2900460"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/DySPAN.2017.7920746"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2916833"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2020-Fall49728.2020.9348658"},{"key":"ref136","article-title":"Tutorial on variational autoencoders","author":"Doersch","year":"2016","journal-title":"arXiv:1606.05908"},{"key":"ref137","volume-title":"Deep inside: Autoencoders","author":"Hubens","year":"2017"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1088\/2632-2153\/abf3d0"},{"key":"ref139","volume-title":"Introduction to Autoencoders","year":"2021"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-016-0550-y"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.08.104"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098052"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/536\/1\/012020"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2654902"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966217"},{"key":"ref146","volume-title":"Automotive Radar Interference Mitigation Data Sets (ARIM)","year":"2021"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.3390\/app10196885"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-460X(02)01032-5"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1145\/1129582.1129588"},{"key":"ref150","volume-title":"CRAWDAD Dataset OWL\/Interference (V. 2019-02-12)","author":"Schmidt","year":"2019"},{"key":"ref151","volume-title":"CRAWDAD Dataset Kyutech\/Interference (V. 2015-06-16)","author":"Zhanikeev","year":"2015"},{"key":"ref152","volume-title":"CRAWDAD Dataset Rutgers\/Noise (V. 2007-04-20)","author":"Kaul","year":"2007"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2885893"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2012.6248110"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP49889.2020.9299700"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2818794"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2018.8343192"},{"key":"ref158","first-page":"448","article-title":"Batch normalization: Accelerating deep network training by reducing internal covariate shift","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Ioffe"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/DySPAN.2019.8935823"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/JRFID.2018.2880457"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/DySPAN53946.2021.9677275"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110812"},{"key":"ref163","volume-title":"The Wavelet Tutorial","year":"2021"},{"key":"ref164","article-title":"A critical review of recurrent neural networks for sequence learning","author":"Lipton","year":"2015","journal-title":"arXiv:1506.00019"},{"key":"ref165","volume-title":"Interference determination method and FMCW radar using the same","author":"Watanabe","year":"2007"},{"key":"ref166","first-page":"5998","article-title":"Attention is all you need","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Vaswani"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/72.279188"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/DySPAN.2019.8935684"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.940267"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2017.0911"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS51040.2020.00040"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1177\/1548512921991245"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.1984.1146031"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2009.090902"},{"issue":"1","key":"ref175","first-page":"220","article-title":"Understanding AUC-ROC curve","volume":"26","author":"Narkhede","year":"2018","journal-title":"Towards Data Sci."},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/LPT.2011.2172405"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"ref178","article-title":"Privacy in deep learning: A survey","author":"Mireshghallah","year":"2020","journal-title":"arXiv:2004.12254"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3045078"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/MACISE49704.2020.00039"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-021-01605-0"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2021.3112663"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1145\/3395352.3402901"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP45357.2019.8969222"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298640"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"},{"key":"ref187","volume-title":"Comparison of the IEEE 802.11, 802.15.1, 802.15.4 and 802.15.6 Wireless Standards","author":"Tjensvold","year":"2007"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.3390\/s120911734"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1109\/APCCAS.2006.342513"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/6287639\/9668973\/9802083-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09802083.pdf?arnumber=9802083","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T04:20:14Z","timestamp":1706761214000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9802083\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":189,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3185124","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}