{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T16:49:15Z","timestamp":1765039755780},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,24]]},"DOI":"10.1109\/vtc2024-spring62846.2024.10683020","type":"proceedings-article","created":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T17:28:12Z","timestamp":1727285292000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["Hypersphere Projection-Guided Radio Frequency Fingerprinting Authentication in the Open World"],"prefix":"10.1109","author":[{"given":"Xue","family":"Fu","sequence":"first","affiliation":[{"name":"College of Telecommunications and Information Engineering, NJUPT,Nanjing,China"}]},{"given":"Yu","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Telecommunications and Information Engineering, NJUPT,Nanjing,China"}]},{"given":"Yun","family":"Lin","sequence":"additional","affiliation":[{"name":"College of Information and Communication Engineering, Harbin Engineering University,Harbin,China"}]},{"given":"Qianyun","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University,Beijing,China"}]},{"given":"Guan","family":"Gui","sequence":"additional","affiliation":[{"name":"College of Telecommunications and Information Engineering, NJUPT,Nanjing,China"}]},{"given":"Tomoaki","family":"Ohtsuki","sequence":"additional","affiliation":[{"name":"Keio University,Department of Information and Computer Science,Yokohama,Japan"}]},{"given":"Hikmet","family":"Sari","sequence":"additional","affiliation":[{"name":"College of Telecommunications and Information Engineering, NJUPT,Nanjing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3067354"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3042188"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409959"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2018.2796446"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2871465"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/rs14092226"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3176758"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2021.3135378"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/app13042151"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2021.3070186"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2022.3174035"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2023.3241388"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2021.3110775"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.173"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1979.4310076"},{"key":"ref16","first-page":"507","article-title":"Large-margin softmax loss for convolutional neural networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Liu"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2018.2822810"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3106743"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cja.2021.08.016"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737463"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3087243"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00293"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00552"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.2981604"},{"volume-title":"Deep CNN-based multi-task learning for open-set recognition","author":"Oza","key":"ref26"},{"volume-title":"L2-constrained softmax loss for discriminative face verification","author":"Ranjan","key":"ref27"}],"event":{"name":"2024 IEEE 99th Vehicular Technology Conference (VTC2024-Spring)","start":{"date-parts":[[2024,6,24]]},"location":"Singapore, Singapore","end":{"date-parts":[[2024,6,27]]}},"container-title":["2024 IEEE 99th Vehicular Technology Conference (VTC2024-Spring)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10682988\/10682819\/10683020.pdf?arnumber=10683020","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T06:31:52Z","timestamp":1727332312000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10683020\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,24]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/vtc2024-spring62846.2024.10683020","relation":{},"subject":[],"published":{"date-parts":[[2024,6,24]]}}}