{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:51:29Z","timestamp":1750308689960,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T00:00:00Z","timestamp":1557878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"http:\/\/dx.doi.org\/10.13039\/100000001","award":["CNS-1410000, CNS-1619728, CNS-1731164"],"award-info":[{"award-number":["CNS-1410000, CNS-1619728, CNS-1731164"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,15]]},"DOI":"10.1145\/3317549.3323405","type":"proceedings-article","created":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T12:52:21Z","timestamp":1558097541000},"page":"72-82","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Crowdsourced measurements for device fingerprinting"],"prefix":"10.1145","author":[{"given":"Seth","family":"Andrews","sequence":"first","affiliation":[{"name":"Virginia Tech"}]},{"given":"Ryan M.","family":"Gerdes","sequence":"additional","affiliation":[{"name":"Virginia Tech"}]},{"given":"Ming","family":"Li","sequence":"additional","affiliation":[{"name":"University of Arizona"}]}],"member":"320","published-online":{"date-parts":[[2019,5,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2017.8228658"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2009.5224969"},{"key":"e_1_3_2_1_3_1","volume-title":"3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications. IEEE, 1--8.","author":"Charles Clancy T","year":"2008","unstructured":"T Charles Clancy and Nathan Goergen . 2008 . Security in cognitive radio networks: Threats and mitigation . In 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications. IEEE, 1--8. T Charles Clancy and Nathan Goergen. 2008. Security in cognitive radio networks: Threats and mitigation. In 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications. IEEE, 1--8."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 2009 International Conference on Information Processing in Sensor Networks. IEEE Computer Society, 25--36","author":"Danev Boris","year":"2009","unstructured":"Boris Danev and Srdjan Capkun . 2009 . Transient-based identification of wireless sensor nodes . In Proceedings of the 2009 International Conference on Information Processing in Sensor Networks. IEEE Computer Society, 25--36 . Boris Danev and Srdjan Capkun. 2009. Transient-based identification of wireless sensor nodes. In Proceedings of the 2009 International Conference on Information Processing in Sensor Networks. IEEE Computer Society, 25--36."},{"volume-title":"Types and Origins of Fingerprints","author":"Danev Boris","key":"e_1_3_2_1_5_1","unstructured":"Boris Danev , Davide Zanetti , and Srdjan Capkun . 2016. Types and Origins of Fingerprints . In Digital Fingerprinting, Cliff Wang, Ryan M Gerdes, Yong Guan, and Sneha Kumar Kasera (Eds.). Springer , Chapter 1, 5--29. Boris Danev, Davide Zanetti, and Srdjan Capkun. 2016. Types and Origins of Fingerprints. In Digital Fingerprinting, Cliff Wang, Ryan M Gerdes, Yong Guan, and Sneha Kumar Kasera (Eds.). Springer, Chapter 1, 5--29."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2466550"},{"key":"e_1_3_2_1_7_1","volume-title":"Datasheet","author":"Research Ettus","year":"2017","unstructured":"Ettus Research . 2017. USRP B200\/B210 Specification Sheet . ( 2017 ). Datasheet . Ettus Research. 2017. USRP B200\/B210 Specification Sheet. (2017). Datasheet."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s002110050101"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Hans G Feichtinger and Karlheinz Gr\u00f6chenig. 1994. Theory and practice of irregular sampling. In Wavelets: mathematics and applications. 305--363.  Hans G Feichtinger and Karlheinz Gr\u00f6chenig. 1994. Theory and practice of irregular sampling. In Wavelets: mathematics and applications. 305--363.","DOI":"10.1201\/9781003210450-10"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2002.807005"},{"key":"e_1_3_2_1_11_1","volume-title":"Mar","author":"Guyon Isabelle","year":"2003","unstructured":"Isabelle Guyon and Andr\u00e9 Elisseeff . 2003. An introduction to variable and feature selection. Journal of machine learning research 3 , Mar ( 2003 ), 1157--1182. Isabelle Guyon and Andr\u00e9 Elisseeff. 2003. An introduction to variable and feature selection. Journal of machine learning research 3, Mar (2003), 1157--1182."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3117811.3117845"},{"key":"e_1_3_2_1_13_1","volume-title":"Enforcement in Spectrum Sharing: Crowd-sourced Blind Authentication of Co-channel Transmitters. In 2018 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN). IEEE, 1--10","author":"Kumar Vireshwar","year":"2018","unstructured":"Vireshwar Kumar , He Li , Jung-Min Jerry Park , and Kaigui Bian . 2018 . Enforcement in Spectrum Sharing: Crowd-sourced Blind Authentication of Co-channel Transmitters. In 2018 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN). IEEE, 1--10 . Vireshwar Kumar, He Li, Jung-Min Jerry Park, and Kaigui Bian. 2018. Enforcement in Spectrum Sharing: Crowd-sourced Blind Authentication of Co-channel Transmitters. In 2018 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN). IEEE, 1--10."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/81.915383"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.07.018"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2018.2796446"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2177834"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2013.0568"},{"volume-title":"Optimal Crowdsourced Channel Monitoring in Cognitive Radio Networks","author":"Salama Ahmed M","key":"e_1_3_2_1_19_1","unstructured":"Ahmed M Salama , Ming Li , and Dejun Yang . 2017. Optimal Crowdsourced Channel Monitoring in Cognitive Radio Networks . In GLOBECOM. IEEE , 1--6. Ahmed M Salama, Ming Li, and Dejun Yang. 2017. Optimal Crowdsourced Channel Monitoring in Cognitive Radio Networks. In GLOBECOM. IEEE, 1--6."},{"key":"e_1_3_2_1_20_1","unstructured":"Tektronix Inc. 2017. DPO7000 Series Datasheet. (2017). Datasheet.  Tektronix Inc. 2017. DPO7000 Series Datasheet. (2017). Datasheet."},{"volume-title":"Timing correction of time-interleaved ADCs. Master's thesis","author":"van Otten Ralf","key":"e_1_3_2_1_21_1","unstructured":"Ralf van Otten . 2009. Timing correction of time-interleaved ADCs. Master's thesis . Eindhoven University of Technology , Eindhoven, Netherlands . Ralf van Otten. 2009. Timing correction of time-interleaved ADCs. Master's thesis. Eindhoven University of Technology, Eindhoven, Netherlands."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/78.134430"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2476338"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348543.2348567"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCT.1956.1086325"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.1200149NM"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090109"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567059"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196521"}],"event":{"name":"WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Miami Florida","acronym":"WiSec '19"},"container-title":["Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3323405","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3317549.3323405","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:01:18Z","timestamp":1750276878000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3323405"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,15]]},"references-count":29,"alternative-id":["10.1145\/3317549.3323405","10.1145\/3317549"],"URL":"https:\/\/doi.org\/10.1145\/3317549.3323405","relation":{},"subject":[],"published":{"date-parts":[[2019,5,15]]},"assertion":[{"value":"2019-05-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}