{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:58:31Z","timestamp":1729627111386,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1109\/gcwkshps52748.2021.9681934","type":"proceedings-article","created":{"date-parts":[[2022,1,24]],"date-time":"2022-01-24T21:06:05Z","timestamp":1643058365000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Practical Training for RF Fingerprinting of Commercial Transmitters at the Edge"],"prefix":"10.1109","author":[{"given":"Silvija","family":"Kokalj-Filipovic","sequence":"first","affiliation":[]},{"given":"Luke","family":"Boegner","sequence":"additional","affiliation":[]},{"given":"Robert D.","family":"Miller","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Trust in 5G Open RANs through Machine Learning: RF Fingerprinting on the POWDER PAWR Platform","author":"muns","year":"2020","journal-title":"IEEE GLOBECOM"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2019.2949308"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2016.2598655"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1038\/srep14945"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2019.03.005"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1063\/1.5120788"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CSE-EUC-DCABES.2016.229"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1515\/nanoph-2016-0132"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.2307\/1267351"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/29.45547"},{"key":"ref4","article-title":"Open set wireless transmitter authorization: Deep learning approaches and dataset considerations","author":"hanna","year":"2020","journal-title":"arXiv preprint 2005 00954"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2849324"},{"key":"ref6","article-title":"Detecting Rogue Devices in Bluetooth Networks Using Radio Frequency Fingerprinting","author":"hall","year":"2006","journal-title":"Conf on Computer Communications and Networks"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2018.2796446"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP52413.2021.00023"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CJECE.2004.1532524"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.23919\/JCIN.2020.9200889","article-title":"Physical Layer Authentication in Wireless Communication Networks: A Survey","volume":"5","author":"bai","year":"2020","journal-title":"Journal of Communications and Information Networks"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2552146"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/j.cosrev.2009.03.005","article-title":"Reservoir computing approaches to recurrent neural network training","volume":"3","author":"lukosevicius","year":"2009","journal-title":"Comput Sci Rev"},{"key":"ref20","article-title":"Deep delay loop reservoir computing for specific emitter identification","author":"kokalj-filipovic","year":"2020","journal-title":"Arxiv preprint 2010"},{"key":"ref22","first-page":"2532","article-title":"Correcting IQ Imbalance in Direct Conversion Receivers","author":"ellingson","year":"2003","journal-title":"Virginia Polytechnic Institute and State University"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM52596.2021.9653098"}],"event":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","start":{"date-parts":[[2021,12,7]]},"location":"Madrid, Spain","end":{"date-parts":[[2021,12,11]]}},"container-title":["2021 IEEE Globecom Workshops (GC Wkshps)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9681915\/9681831\/09681934.pdf?arnumber=9681934","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T14:07:19Z","timestamp":1674569239000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9681934\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/gcwkshps52748.2021.9681934","relation":{},"subject":[],"published":{"date-parts":[[2021,12]]}}}