{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T04:22:29Z","timestamp":1775708549793,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","funder":[{"name":"JST","award":["JPMJMS2215"],"award-info":[{"award-number":["JPMJMS2215"]}]},{"name":"JSPS","award":["JP24K07482"],"award-info":[{"award-number":["JP24K07482"]}]},{"name":"JSPS","award":["JP25K03107"],"award-info":[{"award-number":["JP25K03107"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,3]]},"DOI":"10.1145\/3680207.3765665","type":"proceedings-article","created":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T13:20:32Z","timestamp":1763731232000},"page":"1296-1298","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Poster: Evaluating Effectiveness of Temporal Features and DTW Distance for Radio Frequency Fingerprinting"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1546-062X","authenticated-orcid":false,"given":"Takamasa","family":"Kikuchi","sequence":"first","affiliation":[{"name":"Nara Institute of Science and Technology, Ikoma, Nara, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-9955-1028","authenticated-orcid":false,"given":"Koki","family":"Shibata","sequence":"additional","affiliation":[{"name":"Nara Institute of Science and Technology, Ikoma, Nara, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1579-3237","authenticated-orcid":false,"given":"Keiichi","family":"Yasumoto","sequence":"additional","affiliation":[{"name":"Nara Institute of Science and Technology (NAIST), Ikoma, Nara, Japan"},{"name":"RIKEN Center for Advanced Intelligence Project (RIKEN AIP), Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8654-8461","authenticated-orcid":false,"given":"Jinxiao","family":"Zhu","sequence":"additional","affiliation":[{"name":"Tokyo Denki University, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2652-8941","authenticated-orcid":false,"given":"Yin","family":"Chen","sequence":"additional","affiliation":[{"name":"Reitaku University, Kashiwa, Japan"}]}],"member":"320","published-online":{"date-parts":[[2025,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155259"},{"key":"e_1_3_2_1_2_1","volume-title":"DIRAC: Dynamic-IRregulAr Clustering Algorithm with Incremental Learning for RF-Based Trust Augmentation in IoT Device Authentication.. In ISCAS. 1\u20135.","author":"Bari Md Faizul","year":"2021","unstructured":"Md Faizul Bari, Baibhab Chatterjee, and Shreyas Sen. 2021. DIRAC: Dynamic-IRregulAr Clustering Algorithm with Incremental Learning for RF-Based Trust Augmentation in IoT Device Authentication.. In ISCAS. 1\u20135."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 14th ACM international conference on Mobile computing and networking. 116\u2013127","author":"Brik Vladimir","year":"2008","unstructured":"Vladimir Brik, Suman Banerjee, Marco Gruteser, and Sangho Oh. 2008. Wireless device identification with radiometric signatures. In Proceedings of the 14th ACM international conference on Mobile computing and networking. 116\u2013127."},{"key":"e_1_3_2_1_4_1","volume-title":"RF-PUF: Enhancing IoT security through authentication of wireless nodes using in-situ machine learning","author":"Chatterjee Baibhab","year":"2018","unstructured":"Baibhab Chatterjee, Debayan Das, Shovan Maity, and Shreyas Sen. 2018. RF-PUF: Enhancing IoT security through authentication of wireless nodes using in-situ machine learning. IEEE internet of things journal 6, 1 (2018), 388\u2013398."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2948888"},{"key":"e_1_3_2_1_6_1","volume-title":"2018 IEEE international conference on communications (ICC). IEEE, 1\u20136.","author":"Das Rajshekhar","year":"2018","unstructured":"Rajshekhar Das, Akshay Gadre, Shanghang Zhang, Swarun Kumar, and Jose MF Moura. 2018. A deep learning approach to IoT authentication. In 2018 IEEE international conference on communications (ICC). IEEE, 1\u20136."},{"key":"e_1_3_2_1_7_1","volume-title":"2020 14th International Conference on Signal Processing and Communication Systems (ICSPCS). IEEE, 1\u20138.","author":"Germain Ken St","year":"2020","unstructured":"Ken St Germain and Frank Kragh. 2020. Physical-layer authentication using channel state information and machine learning. In 2020 14th International Conference on Signal Processing and Communication Systems (ICSPCS). IEEE, 1\u20138."},{"key":"e_1_3_2_1_8_1","first-page":"344","article-title":"An Experimental Study on Radio Frequency Fingerprinting-based Authentication in IEEE 802.11 g. IEICE Technical Report; IEICE","volume":"124","author":"Jia Zhen","year":"2024","unstructured":"Zhen Jia, Zewei Guo, Wenhao Huang, Yin Chen, Jinxiao Zhu, and Xiaohong Jiang. 2024. An Experimental Study on Radio Frequency Fingerprinting-based Authentication in IEEE 802.11 g. IEICE Technical Report; IEICE Tech. Rep. 124, 122 (2024), 344\u2013349.","journal-title":"Tech. Rep."},{"key":"e_1_3_2_1_9_1","volume-title":"Deep-learning-based physical layer authentication for industrial wireless sensor networks. sensors 19, 11","author":"Liao Run-Fa","year":"2019","unstructured":"Run-Fa Liao, Hong Wen, Jinsong Wu, Fei Pan, Aidong Xu, Yixin Jiang, Feiyi Xie, and Minggui Cao. 2019. Deep-learning-based physical layer authentication for industrial wireless sensor networks. sensors 19, 11 (2019), 2440."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737455"},{"key":"e_1_3_2_1_11_1","volume-title":"Deep learning for RF device fingerprinting in cognitive communication networks","author":"Merchant Kevin","year":"2018","unstructured":"Kevin Merchant, Shauna Revay, George Stantchev, and Bryan Nousain. 2018. Deep learning for RF device fingerprinting in cognitive communication networks. IEEE journal of selected topics in signal processing 12, 1 (2018), 160\u2013167."},{"key":"e_1_3_2_1_12_1","volume-title":"IECON 2018-44th Annual Conference of the IEEE Industrial Electronics Society. IEEE, 4125\u20134130","author":"Pan Fei","year":"2018","unstructured":"Fei Pan, Zhibo Pang, Michele Luvisotto, Xiaolin Jiang, Roger N Jansson, Ming Xiao, and Hong Wen. 2018. Authentication based on channel state information for industrial wireless communications. In IECON 2018-44th Annual Conference of the IEEE Industrial Electronics Society. IEEE, 4125\u20134130."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3323679.3326503"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2019.2949308"}],"event":{"name":"ACM MOBICOM '25: 31st Annual International Conference on Mobile Computing and Networking","location":"Kerry Hotel, Hong Kong Hong Kong China","acronym":"ACM MOBICOM '25","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 31st Annual International Conference on Mobile Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3680207.3765665","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T13:24:07Z","timestamp":1763731447000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3680207.3765665"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,3]]},"references-count":14,"alternative-id":["10.1145\/3680207.3765665","10.1145\/3680207"],"URL":"https:\/\/doi.org\/10.1145\/3680207.3765665","relation":{},"subject":[],"published":{"date-parts":[[2025,11,3]]},"assertion":[{"value":"2025-11-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}