{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T05:40:08Z","timestamp":1756532408956,"version":"3.44.0"},"reference-count":48,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T00:00:00Z","timestamp":1754265600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"DOI":"10.1109\/icccn65249.2025.11133814","type":"proceedings-article","created":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T17:39:20Z","timestamp":1756489160000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["Towards a Unified Few-Shot Learning Evaluation Framework for RF Fingerprinting"],"prefix":"10.1109","author":[{"given":"Sai","family":"Shi","sequence":"first","affiliation":[{"name":"Temple University,Computer and Information Science Department,Philadelphia,USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vahid","family":"Mahzoon","sequence":"additional","affiliation":[{"name":"Temple University,Computer and Information Science Department,Philadelphia,USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xuyu","family":"Wang","sequence":"additional","affiliation":[{"name":"Florida International University,Knight Foundation School of Computing and Information Sciences,Miami,USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shiwen","family":"Mao","sequence":"additional","affiliation":[{"name":"Auburn University,Department of Electrical and Computer Engineering,Auburn,USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jie","family":"Wu","sequence":"additional","affiliation":[{"name":"Temple University,Computer and Information Science Department,Philadelphia,USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Slobodan","family":"Vucetic","sequence":"additional","affiliation":[{"name":"Temple University,Computer and Information Science Department,Philadelphia,USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997522"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JRFID.2020.2968369"},{"key":"ref3","first-page":"109455","article-title":"A comprehensive survey on radio frequency (rf) fingerprinting: Traditional approaches, deep learning, and open challenges","volume-title":"Computer Networks","volume":"219","author":"Jagannath","year":"2022"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CJECE.2007.364330"},{"key":"ref5","article-title":"Enhancing intrusion detection in wireless networks using radio frequency fingerprinting","volume":"1","author":"Hall","year":"2004","journal-title":"Communications, internet, and information technology"},{"key":"ref6","first-page":"1","article-title":"Radio frequency fingerprinting for intrusion detection in wireless networks","volume":"12","author":"Hall","year":"2005","journal-title":"IEEE Transactions on Defendable and Secure Computing"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.003.2200974"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.21649"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/7068349"},{"key":"ref10","first-page":"100379","article-title":"A survey on deep learning and its applications","volume-title":"Computer Science Review","volume":"40","author":"Dong","year":"2021"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.0001.1900065"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1049\/el.2018.6404"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IEEECONF53345.2021.9723393"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3152404"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3121606"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3101845"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICECOME.2018.8644931"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICSIDP62679.2024.10868206"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.3004555"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01424-7_27"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2022.3175942"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10000595"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC49032.2021.9369550"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3560905.3568100"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3386252"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM52122.2024.10621423"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT59356.2023.10419722"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10279347"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90196-7_37"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1023\/A:1019956318069"},{"key":"ref32","first-page":"1126","article-title":"Model-agnostic meta-learning for fast adaptation of deep networks","volume-title":"International conference on machine learning","author":"Finn"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2020.107510"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-021-10004-4"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.5555\/3294996.3295163"},{"key":"ref36","article-title":"Matching networks for one shot learning","volume":"29","author":"Vinyals","year":"2016","journal-title":"Advances in neural information processing systems"},{"key":"ref37","article-title":"Few-shot adversarial domain adaptation","volume":"30","author":"Motiian","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.05.083"},{"issue":"25","key":"ref39","first-page":"723","article-title":"A kernel two-sample test","volume-title":"Journal of Machine Learning Research","volume":"13","author":"Gretton","year":"2012"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11784"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3389491"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3314491"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/LCN60385.2024.10639652"},{"article-title":"Deep domain confusion: Maximizing for domain invariance","year":"2014","author":"Tzeng","key":"ref44"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3154790"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2005.1424763"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2020.3043332"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA49011.2020.00096"}],"event":{"name":"2025 34th International Conference on Computer Communications and Networks (ICCCN)","start":{"date-parts":[[2025,8,4]]},"location":"Tokyo, Japan","end":{"date-parts":[[2025,8,7]]}},"container-title":["2025 34th International Conference on Computer Communications and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11133715\/11133717\/11133814.pdf?arnumber=11133814","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T05:14:15Z","timestamp":1756530855000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11133814\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,4]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/icccn65249.2025.11133814","relation":{},"subject":[],"published":{"date-parts":[[2025,8,4]]}}}