{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T14:42:49Z","timestamp":1767969769584,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:00:00Z","timestamp":1624838400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,28]]},"DOI":"10.1145\/3468218.3469042","type":"proceedings-article","created":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T17:52:26Z","timestamp":1624297946000},"page":"61-66","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["Machine Learning-Assisted Wireless PHY Key Generation with Reconfigurable Intelligent Surfaces"],"prefix":"10.1145","author":[{"given":"Long","family":"Jiao","sequence":"first","affiliation":[{"name":"Wireless Innovation and Cybersecurity Lab (WICL), Electrical and Computer Engineering Department, George Mason University"}]},{"given":"Guohua","family":"Sun","sequence":"additional","affiliation":[{"name":"Wireless Innovation and Cybersecurity Lab (WICL), Electrical and Computer Engineering Department, George Mason University"}]},{"given":"Junqing","family":"Le","sequence":"additional","affiliation":[{"name":"Wireless Innovation and Cybersecurity Lab (WICL), Electrical and Computer Engineering Department, George Mason University"}]},{"given":"Kai","family":"Zeng","sequence":"additional","affiliation":[{"name":"Wireless Innovation and Cybersecurity Lab (WICL), Electrical and Computer Engineering Department, George Mason University"}]}],"member":"320","published-online":{"date-parts":[[2021,6,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-019-1438-9"},{"key":"e_1_3_2_1_2_1","volume-title":"Deyou Zhang, Gaojie Chen, Yan Zhang, Zunwen He, Hao Yin, and Yonghui Li.","author":"Ji Zijie","year":"2020","unstructured":"Zijie Ji , Phee Lep Yeoh , Deyou Zhang, Gaojie Chen, Yan Zhang, Zunwen He, Hao Yin, and Yonghui Li. 2020 . Secret Key Generation for Intelligent Reflecting Surface Assisted Wireless Communication Networks. IEEE Transactions on Vehicular Technology ( 2020). Zijie Ji, Phee Lep Yeoh, Deyou Zhang, Gaojie Chen, Yan Zhang, Zunwen He, Hao Yin, and Yonghui Li. 2020. Secret Key Generation for Intelligent Reflecting Surface Assisted Wireless Communication Networks. IEEE Transactions on Vehicular Technology (2020)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2018.8433175"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS48642.2020.9162261"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700659"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/4234.951380"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2021.3061301"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"e_1_3_2_1_9_1","volume-title":"Intelligent Reflecting Surface-Assisted Wireless Key Generation for Low-Entropy Environments. arXiv preprint arXiv:2010.06613","author":"Staat Paul","year":"2020","unstructured":"Paul Staat , Harald Elders-Boll , Markus Heinrichs , Rainer Kronberger , Christian Zenger , and Christof Paar . 2020. Intelligent Reflecting Surface-Assisted Wireless Key Generation for Low-Entropy Environments. arXiv preprint arXiv:2010.06613 ( 2020 ). Paul Staat, Harald Elders-Boll, Markus Heinrichs, Rainer Kronberger, Christian Zenger, and Christof Paar. 2020. Intelligent Reflecting Surface-Assisted Wireless Key Generation for Low-Entropy Environments. arXiv preprint arXiv:2010.06613 (2020)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.3004330"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.144"}],"event":{"name":"WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"Abu Dhabi United Arab Emirates","acronym":"WiSec '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468218.3469042","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3468218.3469042","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:07Z","timestamp":1750195687000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468218.3469042"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,28]]},"references-count":11,"alternative-id":["10.1145\/3468218.3469042","10.1145\/3468218"],"URL":"https:\/\/doi.org\/10.1145\/3468218.3469042","relation":{},"subject":[],"published":{"date-parts":[[2021,6,28]]},"assertion":[{"value":"2021-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}