{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:09:43Z","timestamp":1761581383923,"version":"3.44.0"},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2016,5,1]],"date-time":"2016-05-01T00:00:00Z","timestamp":1462060800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2016,5,1]],"date-time":"2016-05-01T00:00:00Z","timestamp":1462060800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2016,5,1]],"date-time":"2016-05-01T00:00:00Z","timestamp":1462060800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2016,5,1]],"date-time":"2016-05-01T00:00:00Z","timestamp":1462060800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1265886","1314598","1431244","1547241"],"award-info":[{"award-number":["1265886","1314598","1431244","1547241"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572051"],"award-info":[{"award-number":["61572051"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100024770","name":"Motorola Solutions","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100024770","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Industrial Affiliates of the Broadband Wireless Access and Applications Center and the Wireless@Virginia Tech Group"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/tifs.2016.2516904","type":"journal-article","created":{"date-parts":[[2016,1,12]],"date-time":"2016-01-12T15:46:36Z","timestamp":1452613596000},"page":"1027-1038","source":"Crossref","is-referenced-by-count":32,"title":["PHY-Layer Authentication Using Duobinary Signaling for Spectrum Enforcement"],"prefix":"10.1109","volume":"11","author":[{"given":"Vireshwar","family":"Kumar","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, VA, USA"}]},{"given":"Jung-Min Jerry","family":"Park","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, VA, USA"}]},{"given":"Kaigui","family":"Bian","sequence":"additional","affiliation":[{"name":"School of Electronics Engineering and Computer Science, Peking University, Beijing, China"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2466550"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1973.9030"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1972.1054829"},{"journal-title":"Digital Communications","year":"2008","author":"proakis","key":"ref30"},{"key":"ref34","first-page":"313","article-title":"A comparison of PHY layer on the Ecma-392 and IEEE 802.1 laf standards","author":"um","year":"2012","journal-title":"Proc 7th Int ICST Conf Cognit Radio Oriented Wireless Netw Commun (CROWNCOM)"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WCL.2012.050112.120059"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.1977.1089476"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2001.966001"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2248371.2248400"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1089761.1089775"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.906878"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660318"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.24"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998429"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.070194"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813602"},{"journal-title":"Enabling innovative small cell use in 3 5 GHz band NPRM & order","year":"2012","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030106"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2310883"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998428"},{"article-title":"Device, method, and system for secure trust anchor provisioning and protection using tamper-resistant hardware","year":"2012","author":"smith","key":"ref29"},{"key":"ref5","article-title":"Shared commercial operations in the 3550-3650 MHz band","volume":"80","year":"2015","journal-title":"Fed Register"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2008.4594926"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.916273"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2301972"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/DYSPAN.2010.5457897"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2013.6682687"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364429"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409959"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CJECE.2007.364330"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/5.771068"},{"key":"ref23","first-page":"25","article-title":"Transient-based identification of wireless sensor nodes","author":"danev","year":"2009","journal-title":"Proc IEEE Int Conf Inf Process Sensor Netw"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3233\/JCS-2007-15103","article-title":"Securing vehicular ad hoc networks","volume":"15","author":"raya","year":"2007","journal-title":"J Comput Secur"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TBC.2004.834027"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/10206\/7419279\/7378490-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/7419279\/07378490.pdf?arnumber=7378490","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:51:28Z","timestamp":1755910288000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7378490\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":34,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2016.2516904","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2016,5]]}}}