{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T16:33:39Z","timestamp":1771518819835,"version":"3.50.1"},"reference-count":26,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2011,12,1]],"date-time":"2011-12-01T00:00:00Z","timestamp":1322697600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/tifs.2011.2162949","type":"journal-article","created":{"date-parts":[[2011,8,3]],"date-time":"2011-08-03T21:16:37Z","timestamp":1312406197000},"page":"1346-1354","source":"Crossref","is-referenced-by-count":88,"title":["Improved Radiometric Identification of Wireless Devices Using MIMO Transmission"],"prefix":"10.1109","volume":"6","author":[{"given":"Yan","family":"Shi","sequence":"first","affiliation":[]},{"given":"Michael A.","family":"Jensen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CJECE.2007.364330"},{"key":"ref11","first-page":"167","article-title":"Passive data link layer 802.11 wireless device driver fingerprinting","author":"franklin","year":"2006","journal-title":"Proc 15th Usenix Security Symp"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409959"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.159"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CSB.2003.1227396"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CJECE.2004.1532524"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.1515\/9781400874668","author":"bellman","year":"1961","journal-title":"Adaptive Control Processes A Guided Tour"},{"key":"ref17","author":"bellman","year":"2003","journal-title":"Dynamic Programming"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1021\/ci00027a006"},{"key":"ref19","first-page":"134","article-title":"For valid generalization, the size of the weights is more important than the size of the network","volume":"9","author":"bartlett","year":"1996","journal-title":"Proc Advances in Neural Information Processing Systems (NIPS)"},{"key":"ref4","first-page":"80","article-title":"Detecting impersonation attacks in future wireless and mobile networks","volume":"4074","author":"barbeau","year":"2006","journal-title":"Proc Mobile Ad-hoc Networks and Sensors (MADNES)Workshop on Secure Mobile Ad-hoc Networks and Sensors (Singapore Sep 2022 2005)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/WIMOB.2005.1512853"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1161289.1161298"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.189"},{"key":"ref8","first-page":"201","article-title":"Enhancing intrusion detection in wireless networks using radio frequency fingerprinting","author":"hall","year":"2004","journal-title":"Proc IASTED Int Conf Communications Internet and Information Technology"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1117\/12.205415","article-title":"Novel identification of intercepted signals from unknown radio transmitters","volume":"2491","author":"choe","year":"1995","journal-title":"Proc SPIE Wavelet Applications II"},{"key":"ref2","author":"chen","year":"2010","journal-title":"Secret Key Establishment Using Wireless Channels as Common Randomness in Time-Variant MIMO Systems"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOM.2007.4550352"},{"key":"ref1","author":"stallings","year":"2003","journal-title":"Cryptography and Network Security Principles and Practice"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775131"},{"key":"ref22","author":"quinlan","year":"1993","journal-title":"C4 5 Programs for Machine Learning"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/BF00058655"},{"key":"ref24","first-page":"621","article-title":"Efficient algorithms for decision tree cross-validation","volume":"3","author":"blockeel","year":"2002","journal-title":"J Mach Learning Res"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1049\/el:20040160"},{"key":"ref25","author":"platt","year":"1998","journal-title":"Sequential minimal optimization A fast algorithm for training support vector machines"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10206\/6069499\/05961627.pdf?arnumber=5961627","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:47:46Z","timestamp":1633909666000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5961627\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":26,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2011.2162949","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,12]]}}}