{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T14:39:12Z","timestamp":1774449552485,"version":"3.50.1"},"reference-count":60,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2023YFB3107500"],"award-info":[{"award-number":["2023YFB3107500"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272241"],"award-info":[{"award-number":["62272241"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202354"],"award-info":[{"award-number":["62202354"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Research and Development Program of Shaanxi Province","award":["2024GX-YBXM-073"],"award-info":[{"award-number":["2024GX-YBXM-073"]}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20251877"],"award-info":[{"award-number":["BK20251877"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fund of National Key Laboratory of Electromagnetic Space Security"},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["QTZX25080"],"award-info":[{"award-number":["QTZX25080"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shaanxi Province Key Research and Development Program","award":["2024GX-YBXM-073"],"award-info":[{"award-number":["2024GX-YBXM-073"]}]},{"name":"Qinchuangyuan Innovation and Entrepreneurship Talent Project of Shaanxi","award":["QCYRCXM-2022-144"],"award-info":[{"award-number":["QCYRCXM-2022-144"]}]},{"name":"2024 Xinjiang Police College School Level Science and Technology Innovation Team Unmanned Aerial Vehicle Safety Technology Team","award":["XJKYKJTD202402"],"award-info":[{"award-number":["XJKYKJTD202402"]}]},{"name":"Natural Science Foundation of Xinjiang Uygur Autonomous Region, China","award":["2024D01A55"],"award-info":[{"award-number":["2024D01A55"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/tifs.2025.3618392","type":"journal-article","created":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T17:35:46Z","timestamp":1759772146000},"page":"10715-10729","source":"Crossref","is-referenced-by-count":1,"title":["Physical Layer Authentication Utilizing Cascaded Channel Signature for RIS-Assisted Communication Systems"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8310-7238","authenticated-orcid":false,"given":"Pinchang","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China"}]},{"given":"Runqing","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China"}]},{"given":"Ayinuer","family":"Nuertai","sequence":"additional","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3248-5909","authenticated-orcid":false,"given":"Yuanyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Xidian University, Xi&#x2019;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9739-1930","authenticated-orcid":false,"given":"Xiaohong","family":"Jiang","sequence":"additional","affiliation":[{"name":"School of Systems Information Science, Future University Hakodate, Hakodate, Hokkaido, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1815-2793","authenticated-orcid":false,"given":"Fu","family":"Xiao","sequence":"additional","affiliation":[{"name":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2922609"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2935192"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900107"},{"key":"ref4","article-title":"Filtering reconfigurable intelligent computational surface for RF spectrum purification","author":"Wang","year":"2024","journal-title":"arXiv:2406.18055"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2021.3130549"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.007.2100124"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2737630"},{"key":"ref8","article-title":"Reconfigurable intelligent surface-assisted cross-layer authentication for secure and efficient vehicular communications","author":"Shawky","year":"2023","journal-title":"arXiv:2303.08911"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3436885"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2883598"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5601959"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MeditCom55741.2022.9928604"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2737885"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/7393526"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2011.6127727"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3054534"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.767"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.421"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2011.2179276"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2019.2955889"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364429"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7036875"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1126\/science.1074376"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422832"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3304519"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3029894"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3233862"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICC51166.2024.10623110"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3471185"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2024.3411108"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3570118"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3552158"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3572043"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2535442"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3136304"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.3004330"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2022.3158024"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC.2019.8801961"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511841224"},{"key":"ref40","volume":"2","author":"Feller","year":"1991","journal-title":"An Introduction to Probability Theory and Its Applications"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2019.2947445"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.23919\/JCIN.2024.10494925"},{"key":"ref43","article-title":"Channel estimation for RIS-empowered multi-user MISO wireless communications","author":"Wei","year":"2020","journal-title":"arXiv:2008.01459"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2021.3091840"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1119\/1.15378"},{"key":"ref46","article-title":"CovertAuth: Joint covert communication and authentication in mmWave systems","author":"Teng","year":"2025","journal-title":"arXiv:2507.08904"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3390098"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2830345"},{"key":"ref49","volume-title":"Fundamentals of Statistical Signal Processing: Estimation Theory","author":"Kay","year":"1993"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3004197"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1967.5573"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2002.997120"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2003.1204119"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2011.071111.090349"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1115\/1.3452897"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1002\/0471715220"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2022.3169622"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2024.3477948"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC50174.2021.9569370"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2007.900621"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10810755\/11194240.pdf?arnumber=11194240","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T17:36:18Z","timestamp":1760549778000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11194240\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":60,"URL":"https:\/\/doi.org\/10.1109\/tifs.2025.3618392","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}