{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T11:46:28Z","timestamp":1765453588435,"version":"3.46.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","funder":[{"DOI":"10.13039\/100018693","name":"HORIZON EUROPE Framework Programme","doi-asserted-by":"publisher","award":["01095759"],"award-info":[{"award-number":["01095759"]}],"id":[{"id":"10.13039\/100018693","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,9,3]]},"DOI":"10.1145\/3748699.3749788","type":"proceedings-article","created":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T07:01:29Z","timestamp":1765350089000},"page":"170-178","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Ethical Applications of the Invisible Identity in Wireless Device with Radio Frequency Fingerprint"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-3299-453X","authenticated-orcid":false,"given":"Thayheng","family":"Nhem","sequence":"first","affiliation":[{"name":"IDLab - Faculty of Applied Engineering, University of Antwerp - imec, Antwerpen, Belgium"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1152-6617","authenticated-orcid":false,"given":"Maarten","family":"Weyn","sequence":"additional","affiliation":[{"name":"IDLab - Faculty of Applied Engineering, University of Antwerp - imec, Antwerpen, Belgium"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1499-3782","authenticated-orcid":false,"given":"Michael","family":"Peeters","sequence":"additional","affiliation":[{"name":"imec, Leuven, Belgium"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0064-5020","authenticated-orcid":false,"given":"Rafael","family":"Berkvens","sequence":"additional","affiliation":[{"name":"IDLab - Faculty of Applied Engineering, University of Antwerp - imec, Antwerpen, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2025,12,9]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","unstructured":"Sohail Abbas Manar\u00a0Abu Talib Qassim Nasir Sally Idhis Mariam Alaboudi and Ali Mohamed. 2023. Radio frequency fingerprinting techniques for device identification: a survey. International Journal of Information Security (4 2023). 10.1007\/s10207-023-00801-z","DOI":"10.1007\/s10207-023-00801-z"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","unstructured":"Aqeel Ahmed Bruno Quoitin Alexander Gros and Veronique Moeyaert. 2024. A Comprehensive Survey on Deep Learning-Based LoRa Radio Frequency Fingerprinting Identification. Sensors 24 13 (2024). 10.3390\/s24134411","DOI":"10.3390\/s24134411"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","unstructured":"Shunsuke Aoki Takuro Yonezawa Nobuo Kawaguchi Peter Steenkiste and Ragunathan\u00a0Raj Rajkumar. 2022. Time-Sensitive Cooperative Perception for Real-Time Data Sharing over Vehicular Communications: Overview Challenges and Future Directions. IEEE Internet of Things Magazine 5 2 (2022) 108\u2013113. 10.1109\/IOTM.001.2100143","DOI":"10.1109\/IOTM.001.2100143"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","unstructured":"Komal Bajaj Dushyant\u00a0Kumar Singh and Mohd.\u00a0Aquib Ansari. 2020. Autoencoders Based Deep Learner for Image Denoising. Procedia Computer Science 171 (2020) 1535\u20131541. 10.1016\/j.procs.2020.04.164Third International Conference on Computing and Network Communications (CoCoNet\u201919).","DOI":"10.1016\/j.procs.2020.04.164"},{"key":"e_1_3_3_1_6_2","unstructured":"Nishant Bhaskar. [n. d.]. A survey of techniques in passive identification of wireless personal devices and the implications on user tracking. https:\/\/cseweb.ucsd.edu\/\u00a0nibhaska\/papers\/RE_paper_19.pdf"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM57956.2023.00027"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/JCS61227.2024.10646223"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","unstructured":"Vladimir Brik Suman Banerjee Marco Gruteser and Sangho Oh. 2008. Wireless device identification with radiometric signatures. Proceedings of the 14th ACM International Conference on Mobile Computing and Networking 116\u2013127. 10.1145\/1409944.1409959","DOI":"10.1145\/1409944.1409959"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","unstructured":"Mostafa\u00a0Zaman Chowdhury Md. Shahjalal Shakil Ahmed and Yeong\u00a0Min Jang. 2020. 6G Wireless Communication Systems: Applications Requirements Technologies Challenges and Research Directions. IEEE Open Journal of the Communications Society 1 (2020) 957\u2013975. 10.1109\/OJCOMS.2020.3010270","DOI":"10.1109\/OJCOMS.2020.3010270"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2018.8500189"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC57260.2024.10570605"},{"key":"e_1_3_3_1_13_2","unstructured":"Abdurrahman Elmaghbub and Bechir Hamdaoui. 2020. Leveraging Hardware-Impaired Out-of-Band Information Through Deep Neural Networks for Robust Wireless Device Classification. arxiv:https:\/\/arXiv.org\/abs\/2004.11126\u00a0[eess.SP] https:\/\/arxiv.org\/abs\/2004.11126"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","unstructured":"Hua Fu Linning Peng Ming Liu and Aiqun Hu. 2023. Deep Learning-Based RF Fingerprint Identification With Channel Effects Mitigation. IEEE Open Journal of the Communications Society 4 (2023) 1668\u20131681. 10.1109\/OJCOMS.2023.3295379","DOI":"10.1109\/OJCOMS.2023.3295379"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","unstructured":"Pradipta Ghosh Jason\u00a0A. Tran and Bhaskar Krishnamachari. 2020. ARREST: A RSSI Based Approach for Mobile Sensing and Tracking of a Moving Object. IEEE Transactions on Mobile Computing 19 6 (2020) 1260\u20131273. 10.1109\/TMC.2019.2909020","DOI":"10.1109\/TMC.2019.2909020"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9014297"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","unstructured":"M. Hassanalian and A. Abdelkefi. 2017. Classifications applications and design challenges of drones: A review. Progress in Aerospace Sciences 91 (2017) 99\u2013131. 10.1016\/j.paerosci.2017.04.003","DOI":"10.1016\/j.paerosci.2017.04.003"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","unstructured":"Jiashuo He Sai Huang Shuo Chang Fanggang Wang Ba-Zhong Shen and Zhiyong Feng. 2023. Radio Frequency Fingerprint Identification With Hybrid Time-Varying Distortions. IEEE Transactions on Wireless Communications 22 10 (2023) 6724\u20136736. 10.1109\/TWC.2023.3245070","DOI":"10.1109\/TWC.2023.3245070"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS54753.2022.9798252"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","unstructured":"Elmehdi Illi Marwa Qaraqe Saud Althunibat Abdullah Alhasanat Moath Alsafasfeh Marcus de Ree Georgios Mantas Jonathan Rodriguez Waqas Aman and Saif Al-Kuwari. 2024. Physical Layer Security for Authentication Confidentiality and Malicious Node Detection: A Paradigm Shift in Securing IoT Networks. IEEE Communications Surveys & Tutorials 26 1 (2024) 347\u2013388. 10.1109\/COMST.2023.3327327","DOI":"10.1109\/COMST.2023.3327327"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","unstructured":"Anu Jagannath Jithin Jagannath and Prem Sagar Pattanshetty\u00a0Vasanth Kumar. 2022. A comprehensive survey on radio frequency (RF) fingerprinting: Traditional approaches deep learning and open challenges. Computer Networks 219 (2022) 109455. 10.1016\/j.comnet.2022.109455","DOI":"10.1016\/j.comnet.2022.109455"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/JCS64661.2025.10880631"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/3448300.3468255"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWorkshops57953.2023.10283484"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","unstructured":"Randall\u00a0W. Klein Michael\u00a0A. Temple and Michael\u00a0J. Mendenhall. 2009. Application of wavelet-based RF fingerprinting to enhance wireless network security. Journal of Communications and Networks 11 6 (2009) 544\u2013555. 10.1109\/JCN.2009.6388408","DOI":"10.1109\/JCN.2009.6388408"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity.2017.50"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCWorkshops57813.2023.10233791"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","unstructured":"Zhaoyi Lu Ming Tu Xin Xie Wenchao Xu Cunqing Hua and Weihua Zhuang. 2025. Concealing Radio Frequency Fingerprints via Active Adversarial Perturbation. IEEE Transactions on Network Science and Engineering (2025) 1\u201316. 10.1109\/TNSE.2025.3568824","DOI":"10.1109\/TNSE.2025.3568824"},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/NNICE58320.2023.10105692"},{"key":"e_1_3_3_1_30_2","unstructured":"Scott Lundberg and Su-In Lee. 2017. A Unified Approach to Interpreting Model Predictions. arxiv:https:\/\/arXiv.org\/abs\/1705.07874\u00a0[cs.AI] https:\/\/arxiv.org\/abs\/1705.07874"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"publisher","unstructured":"Noem\u00ed Migu\u00e9lez-G\u00f3mez and Eduardo\u00a0A. Rojas-Nastrucci. 2022. Antenna Additively Manufactured Engineered Fingerprinting for Physical-Layer Security Enhancement for Wireless Communications. IEEE Open Journal of Antennas and Propagation 3 (2022) 637\u2013651. 10.1109\/OJAP.2022.3181325","DOI":"10.1109\/OJAP.2022.3181325"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/ANTS63515.2024.10898735"},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/JCS64661.2025.10880647"},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287866"},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"publisher","unstructured":"Anita Patil Sridhar Iyer Onel\u00a0L.A. L\u00f3pez Rahul\u00a0J. Pandya Krishna Pai Anshuman Kalla and Rakhee Kallimani. 2024. A comprehensive survey on spectrum sharing techniques for 5G\/B5G intelligent wireless networks: Opportunities challenges and future research directions. Computer Networks 253 (2024) 110697. 10.1016\/j.comnet.2024.110697","DOI":"10.1016\/j.comnet.2024.110697"},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC\/6GSummit51104.2021.9482609"},{"key":"e_1_3_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPIT.2005.1577145"},{"key":"e_1_3_3_1_38_2","doi-asserted-by":"publisher","unstructured":"Kunal Sankhe Mauro Belgiovine Fan Zhou Luca Angioloni Frank Restuccia Salvatore D\u2019Oro Tommaso Melodia Stratis Ioannidis and Kaushik Chowdhury. 2020. No Radio Left Behind: Radio Fingerprinting Through Deep Learning of Physical-Layer Hardware Impairments. IEEE Transactions on Cognitive Communications and Networking 6 (2020) 165\u2013178. Issue 1. 10.1109\/TCCN.2019.2949308","DOI":"10.1109\/TCCN.2019.2949308"},{"key":"e_1_3_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737463"},{"key":"e_1_3_3_1_40_2","doi-asserted-by":"publisher","unstructured":"Ramprasaath\u00a0R. Selvaraju Michael Cogswell Abhishek Das Ramakrishna Vedantam Devi Parikh and Dhruv Batra. 2019. Grad-CAM: Visual Explanations from Deep Networks via Gradient-Based Localization. International Journal of Computer Vision 128 2 (Oct. 2019) 336\u2013359. 10.1007\/s11263-019-01228-7","DOI":"10.1007\/s11263-019-01228-7"},{"key":"e_1_3_3_1_41_2","doi-asserted-by":"publisher","unstructured":"Guanxiong Shen Junqing Zhang Alan Marshall Linning Peng and Xianbin Wang. 2021. Radio Frequency Fingerprint Identification for LoRa Using Deep Learning. IEEE Journal on Selected Areas in Communications 39 (2021) 2604\u20132616. Issue 8. 10.1109\/JSAC.2021.3087250","DOI":"10.1109\/JSAC.2021.3087250"},{"key":"e_1_3_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/IEEECONF53345.2021.9723287"},{"key":"e_1_3_3_1_43_2","doi-asserted-by":"publisher","unstructured":"Utkarsh Singh Jean-Fran\u00e7ois Determe Fran\u00e7ois Horlin and Philippe De\u00a0Doncker and. 2021. Crowd Monitoring: State-of-the-Art and Future Directions. IETE Technical Review 38 6 (2021) 578\u2013594. 10.1080\/02564602.2020.1803152 arXiv:10.1080\/02564602.2020.1803152","DOI":"10.1080\/02564602.2020.1803152"},{"key":"e_1_3_3_1_44_2","doi-asserted-by":"publisher","unstructured":"Naeimeh Soltanieh Yaser Norouzi Yang Yang and Nemai\u00a0Chandra Karmakar. 2020. A Review of Radio Frequency Fingerprinting Techniques. IEEE Journal of Radio Frequency Identification 4 (9 2020) 222\u2013233. Issue 3. 10.1109\/JRFID.2020.2968369","DOI":"10.1109\/JRFID.2020.2968369"},{"key":"e_1_3_3_1_45_2","doi-asserted-by":"crossref","unstructured":"Oktay Ureten and Nur Serinken. 2005. Bayesian detection of Wi-Fi transmitter RF fingerprints. Electronics Letters 41 (2005) 373\u2013374. https:\/\/api.semanticscholar.org\/CorpusID:110064988","DOI":"10.1049\/el:20057769"},{"key":"e_1_3_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346855"},{"key":"e_1_3_3_1_47_2","doi-asserted-by":"publisher","unstructured":"Lingnan Xie Linning Peng Junqing Zhang and Aiqun Hu. 2024. Radio frequency fingerprint identification for Internet of Things: A survey. Security and Safety 3 (2024) 2023022. 10.1051\/sands\/2023022","DOI":"10.1051\/sands\/2023022"},{"key":"e_1_3_3_1_48_2","doi-asserted-by":"publisher","unstructured":"Biao Xu and Guanci Yang. 2025. Interpretability research of deep learning: A literature survey. Information Fusion 115 (2025) 102721. 10.1016\/j.inffus.2024.102721","DOI":"10.1016\/j.inffus.2024.102721"},{"key":"e_1_3_3_1_49_2","doi-asserted-by":"publisher","unstructured":"Qiang Xu Rong Zheng Walid Saad and Zhu Han. 2016. Device Fingerprinting in Wireless Networks: Challenges and Opportunities. IEEE Communications Surveys & Tutorials 18 (2016) 94\u2013104. Issue 1. 10.1109\/COMST.2015.2476338","DOI":"10.1109\/COMST.2015.2476338"},{"key":"e_1_3_3_1_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/3507657.3528542"},{"key":"e_1_3_3_1_51_2","doi-asserted-by":"publisher","unstructured":"Junqing Zhang Guanxiong Shen Walid Saad and Kaushik Chowdhury. 2023. Radio Frequency Fingerprint Identification for Device Authentication in the Internet of Things. IEEE Communications Magazine 61 (2023) 110\u2013115. Issue 10. 10.1109\/MCOM.003.2200974","DOI":"10.1109\/MCOM.003.2200974"},{"key":"e_1_3_3_1_52_2","doi-asserted-by":"publisher","unstructured":"Xiaoqiang Zhu Wenyu Qu Tie Qiu Laiping Zhao Mohammed Atiquzzaman and Dapeng\u00a0Oliver Wu. 2020. Indoor Intelligent Fingerprint-Based Localization: Principles Approaches and Challenges. IEEE Communications Surveys & Tutorials 22 4 (2020) 2634\u20132657. 10.1109\/COMST.2020.3014304","DOI":"10.1109\/COMST.2020.3014304"}],"event":{"name":"GoodIT '25: International Conference on Information Technology for Social Good","sponsor":["SIGCAS ACM Special Interest Group on Computers and Society"],"location":"Antwerp Belgium","acronym":"GoodIT '25"},"container-title":["Proceedings of the 2025 International Conference on Information Technology for Social Good"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3748699.3749788","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T11:00:59Z","timestamp":1765450859000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3748699.3749788"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,3]]},"references-count":51,"alternative-id":["10.1145\/3748699.3749788","10.1145\/3748699"],"URL":"https:\/\/doi.org\/10.1145\/3748699.3749788","relation":{},"subject":[],"published":{"date-parts":[[2025,9,3]]},"assertion":[{"value":"2025-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}