{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T22:10:05Z","timestamp":1755900605667,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","funder":[{"name":"Swedish Research Council","award":["2018-05480,2021-04968,2024-05758"],"award-info":[{"award-number":["2018-05480,2021-04968,2024-05758"]}]},{"name":"Swedish Foundation for Strategic Research"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,30]]},"DOI":"10.1145\/3734477.3734723","type":"proceedings-article","created":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T21:11:01Z","timestamp":1751058661000},"page":"274-279","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Augmenting BLE Fingerprinting Using Instantaneous Frequency"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9984-8949","authenticated-orcid":false,"given":"George-Alexandru","family":"Stoian","sequence":"first","affiliation":[{"name":"Uppsala University, Uppsala, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2586-8573","authenticated-orcid":false,"given":"Thiemo","family":"Voigt","sequence":"additional","affiliation":[{"name":"Uppsala University, Uppsala, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2163-6713","authenticated-orcid":false,"given":"Christian","family":"Rohner","sequence":"additional","affiliation":[{"name":"Uppsala University, Uppsala, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2025,6,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Sensors","volume":"20","author":"Aghnaiya Alghannai","year":"2020","unstructured":"Alghannai Aghnaiya, Yaser Dalveren, and Ali Kara. 2020. On the Performance of Variational Mode Decomposition-Based Radio Frequency Fingerprinting of Bluetooth Devices. Sensors, Vol. 20, 6 (2020)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2911452"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409959"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2009.5224969"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2849324"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833758"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/FMEC49853.2020.9144756"},{"key":"e_1_3_2_1_8_1","article-title":"Deep Learning Methods for IoT Device Authentication Using Symbols Density Trace Plot","volume":"11","author":"Huang Da","year":"2024","unstructured":"Da Huang, Akram Al-Hourani, Kandeepan Sithamparanathan, and Wayne S. T. Rowe. 2024. Deep Learning Methods for IoT Device Authentication Using Symbols Density Trace Plot. IEEE Internet of Things Journal, Vol. 11, 10 (2024).","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_3_2_1_9_1","volume-title":"Deep Learning Methods for Device Authentication Using RF Fingerprinting. In 2021 15th International Conference on Signal Processing and Communication Systems (ICSPCS).","author":"Huang Da","year":"2021","unstructured":"Da Huang, Akram Al-Hourani, Kandeepan Sithamparanathan, Wayne S. T. Rowe, Luc Bulot, and Andrew Thompson. 2021. Deep Learning Methods for Device Authentication Using RF Fingerprinting. In 2021 15th International Conference on Signal Processing and Communication Systems (ICSPCS)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM52122.2024.10621247"},{"key":"e_1_3_2_1_11_1","volume-title":"Radio frequency fingerprint collaborative intelligent identification using incremental learning","author":"Liu Mingqian","year":"2021","unstructured":"Mingqian Liu, Jiakun Wang, Nan Zhao, Yunfei Chen, Hao Song, and F Richard Yu. 2021. Radio frequency fingerprint collaborative intelligent identification using incremental learning. IEEE Trans. on Network Science and Engineering, (2021)."},{"key":"e_1_3_2_1_12_1","volume-title":"proceedings of the 3rd IASTED International Conference on Communications and Computer Networks, CCN.","author":"Michel Barbeau","year":"2006","unstructured":"Barbeau Michel, Jeyanthi Hall, and Evangelos Kranakis. 2006. Detection of rogue devices in bluetooth networks using radio frequency fingerprinting. In proceedings of the 3rd IASTED International Conference on Communications and Computer Networks, CCN."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485730.3492880"},{"key":"e_1_3_2_1_14_1","volume-title":"Ricardo V\u00e1zquez-Mor\u00e1n, and Rub\u00e9n V\u00e1zquez-Medina.","author":"Santana-Cruz Rene Francisco","year":"2024","unstructured":"Rene Francisco Santana-Cruz, Martin Moreno-Guzman, C\u00e9sar Enrique Rojas-L\u00f3pez, Ricardo V\u00e1zquez-Mor\u00e1n, and Rub\u00e9n V\u00e1zquez-Medina. 2024. Bluetooth Device Identification Using RF Fingerprinting and Jensen-Shannon Divergence. Sensors, Vol. 24, 5 (2024)."},{"key":"e_1_3_2_1_15_1","volume-title":"Bluetooth SIG","author":"Woolley Martin","year":"2019","unstructured":"Martin Woolley. 2019. Bluetooth core specification v5. 1. Bluetooth SIG, (2019)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3507657.3528542"},{"key":"e_1_3_2_1_17_1","volume-title":"FID: Function Modeling-based Data-Independent and Channel-Robust Physical-Layer Identification. In IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.","author":"Zheng Tianhang","year":"2019","unstructured":"Tianhang Zheng, Zhi Sun, and Kui Ren. 2019. FID: Function Modeling-based Data-Independent and Channel-Robust Physical-Layer Identification. In IEEE INFOCOM 2019 - IEEE Conference on Computer Communications."}],"event":{"name":"WiSec 2025: 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Arlington VA USA","acronym":"WiSec 2025"},"container-title":["18th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3734477.3734723","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T21:46:45Z","timestamp":1755899205000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3734477.3734723"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,30]]},"references-count":17,"alternative-id":["10.1145\/3734477.3734723","10.1145\/3734477"],"URL":"https:\/\/doi.org\/10.1145\/3734477.3734723","relation":{},"subject":[],"published":{"date-parts":[[2025,6,30]]},"assertion":[{"value":"2025-06-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}