{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T17:25:47Z","timestamp":1725384347042},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/acssc.2018.8645253","type":"proceedings-article","created":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T20:31:40Z","timestamp":1552941100000},"page":"1699-1703","source":"Crossref","is-referenced-by-count":0,"title":["Fundamental Limits in Detecting Whether a Signal Has Been Quantized"],"prefix":"10.1109","author":[{"given":"Ke","family":"Li","sequence":"first","affiliation":[]},{"given":"Hossein","family":"Pishro-Nik","sequence":"additional","affiliation":[]},{"given":"Dennis L.","family":"Goeckel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110812"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2464778"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2443794"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130923"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2015.2507594"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2720736"},{"journal-title":"Testing Statistical Hypotheses","year":"2005","author":"lehmann","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2011.072011.100049"},{"journal-title":"Electronic warfare modeling and simulation","year":"2003","author":"adamy","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/APSIPA.2014.7041636"},{"key":"ref6","first-page":"1187","article-title":"Features and classifiers for replay spoofing attack detection","author":"hanili","year":"2017","journal-title":"2017 10th International Conference on Electrical and Electronics Engineering (ELECO)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1049\/ecej:19900035"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2007.909326"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICASID.2009.5277023"},{"key":"ref2","first-page":"2232","article-title":"Resisting relay attacks on vehicular Passive Keyless Entry and start systems","author":"francillon","year":"0","journal-title":"2012 9th International Conference on Fuzzy Systems and Knowledge Discovery"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2016.2570303"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPCC.2017.8242381"}],"event":{"name":"2018 52nd Asilomar Conference on Signals, Systems, and Computers","start":{"date-parts":[[2018,10,28]]},"location":"Pacific Grove, CA, USA","end":{"date-parts":[[2018,10,31]]}},"container-title":["2018 52nd Asilomar Conference on Signals, Systems, and Computers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8638648\/8645065\/08645253.pdf?arnumber=8645253","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T00:04:13Z","timestamp":1598227453000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8645253\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/acssc.2018.8645253","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}