{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:46:29Z","timestamp":1775231189524,"version":"3.50.1"},"reference-count":174,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundations of China","doi-asserted-by":"publisher","award":["61972262"],"award-info":[{"award-number":["61972262"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Project of China","award":["2020YFB1805404"],"award-info":[{"award-number":["2020YFB1805404"]}]},{"DOI":"10.13039\/501100003453","name":"Natural Science Foundation of Guangdong, China","doi-asserted-by":"publisher","award":["2016A030313046"],"award-info":[{"award-number":["2016A030313046"]}],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fundamental Research Programs of Shenzhen City","award":["JCYJ20180305124648757"],"award-info":[{"award-number":["JCYJ20180305124648757"]}]},{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"publisher","award":["201908440031"],"award-info":[{"award-number":["201908440031"]}],"id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/comst.2020.3042188","type":"journal-article","created":{"date-parts":[[2020,12,3]],"date-time":"2020-12-03T20:48:40Z","timestamp":1607028520000},"page":"282-310","source":"Crossref","is-referenced-by-count":268,"title":["A Survey of Physical-Layer Authentication in Wireless Communications"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6443-8111","authenticated-orcid":false,"given":"Ning","family":"Xie","sequence":"first","affiliation":[]},{"given":"Zhuoyuan","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6191-4450","authenticated-orcid":false,"given":"Haijun","family":"Tan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","author":"rappaport","year":"2015","journal-title":"Millimeter Wave Wireless Communications"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2683200"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107447981"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090109"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.012214.00007"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.101211.110045"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2172208"},{"key":"ref39","first-page":"4","article-title":"Detecting rogue devices in bluetooth networks using radio frequency fingerprinting","author":"hall","year":"2006","journal-title":"Proc Int Conf Commun Comput Netw (CCN)"},{"key":"ref38","first-page":"201","article-title":"Enhancing intrusion detection in wireless networks using radio frequency fingerprinting","author":"hall","year":"2004","journal-title":"Proc Int Conf Commun Internet Inf Technol (CIIT)"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2906699"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2958079"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2452893"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2516904"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2925418"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848060"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2010.5680394"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5198999"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.104"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.2967393"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2586472"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2988615"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364429"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-020-00799-8"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.145"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737463"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2009.6388408"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.070194"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2160170"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5601959"},{"key":"ref50","author":"kay","year":"1993","journal-title":"Fundamentals of Statistical Signal Processing"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.4324\/9781315806167"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2005.863506"},{"key":"ref153","first-page":"411","article-title":"Authentication theory\/coding theory","author":"simmons","year":"1984","journal-title":"Proc Adv Cryptol (CRYPTO)"},{"key":"ref156","first-page":"40","article-title":"Almost independence and secrecy capacity","volume":"32","author":"csisz","year":"1996","journal-title":"Problems Inf Transm"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.885027"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2800696"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2878333"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2850334"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962692"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660318"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996861"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422936"},{"key":"ref59","first-page":"504","article-title":"Novel identification of intercepted signals from unknown radio transmitters","author":"choe","year":"1995","journal-title":"Proc Int Soc Opt Photon (SPIE)"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364039"},{"key":"ref57","first-page":"1","article-title":"An RF-DNA verification process for ZigBee networks","author":"dubendorfer","year":"2013","journal-title":"Proc Military Commun Conf (MILCOM)"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2572725"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7036892"},{"key":"ref54","volume":"2","author":"rappaport","year":"1996","journal-title":"Wireless Communications Principles and Practice"},{"key":"ref53","author":"proakis","year":"2001","journal-title":"Digital Communications"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/584091.584093"},{"key":"ref40","first-page":"25","article-title":"Transient-based identification of wireless sensor nodes","author":"danev","year":"2009","journal-title":"Proc Int Conf Inf Process Sens Netw (IPSN)"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5684218"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/DYSPAN.2010.5457897"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2824583"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2016.7860562"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2018.5749"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2008.4594926"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4939-6601-1_5"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120016"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.767"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2014.032914.120921"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2134850"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2812202"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2398734"},{"key":"ref8","article-title":"Security model of authentication at the physical layer and performance analysis over fading channels","author":"xie","year":"2018","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2019.8693051"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.916273"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2469602"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2946252"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2797963"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998428"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/DYSPAN.2012.6478143"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2016.2645679"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.020712.111298"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409959"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2012.6167534"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/APCCAS.2002.1115320"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TBC.2004.834027"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.12.081544"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/99.372944"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.051512.111481"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2535442"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.26"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.749287"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590321"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2443794"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567061"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110812"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883440"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2718540"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7036875"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409958"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2013.040913.130419"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.3390\/a9020025"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-020-01736-y"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130914"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1126\/science.1074376"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2014.2375191"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2016.1088"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1049\/iet-spr.2016.0378"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2690437"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPCS.2018.8631754"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/WESCAN.1995.494069"},{"key":"ref139","first-page":"1","article-title":"Application of machine learning for channel based message authentication in mission critical machine type communication","author":"weinand","year":"2017","journal-title":"Proc Eur Wireless Conf (EW)"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1049\/el:20040160"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.1996.548038"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/CJECE.2007.364330"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOM.2007.4550352"},{"key":"ref140","author":"wang","year":"2018","journal-title":"Supervised and semi-supervised deep neural networks for CSI-based authentication"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.421"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2955128"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2015.2498163"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2007.4292831"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.05.028"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934926"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/NANA.2018.8648709"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2014.2318731"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2916180"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2010.5757798"},{"key":"ref145","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1145\/1161289.1161298"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/1859995.1860035"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2008.4558602"},{"key":"ref94","first-page":"199","article-title":"Physical-layer identification of RFID devices","author":"danev","year":"2009","journal-title":"Proc Conf USENIX Security Symp (USENIX)"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.239"},{"key":"ref93","author":"bishop","year":"2006","journal-title":"Pattern Recognition and Machine Learning"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2809779"},{"key":"ref92","first-page":"438","article-title":"Performance enhanced wireless device authentication using multiple weighted device-specific characteristics","author":"peng","year":"2015","journal-title":"Proc China Summit Int Conf Signal Inf Process (ChinaSIP)"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2009.5224969"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2400426"},{"key":"ref104","first-page":"801","article-title":"Arcing classifiers","volume":"26","author":"breiman","year":"1998","journal-title":"Ann Stat"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/NSS.2010.21"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2838071"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2871454"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814466"},{"key":"ref112","article-title":"Privacy-preserving location-based services for mobile users in wireless networks","author":"zhong","year":"2004"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74853-3_15"},{"key":"ref98","author":"theodoridis","year":"2009","journal-title":"Pattern Recognition"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2010.5680487"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2391300"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5683789"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2552146"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7498103"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2476338"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2598968"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.012314.00178"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/18.850674"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2015.7417078"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.850123"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2320516"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1137\/1026034"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.2009842"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/MCAS.2017.2713305"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"237","DOI":"10.23919\/JCIN.2020.9200889","article-title":"Physical layer authentication in wireless communication networks: A survey","volume":"5","author":"bai","year":"2020","journal-title":"J Commun Netw"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/VLSIC.2004.1346548"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2524258"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2878035"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.805"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.294"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2006.27"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2044904"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-5906-5_912"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.3390\/s17020289"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130912"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2008.291"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2010.5432018"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2011.6127727"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6655319"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2008.4519377"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2849324"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2006.255117"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/495070"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/9361471\/09279294.pdf?arnumber=9279294","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,2]],"date-time":"2022-12-02T06:35:11Z","timestamp":1669962911000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9279294\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":174,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/comst.2020.3042188","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}