{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T18:41:47Z","timestamp":1772822507417,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,12,21]],"date-time":"2023-12-21T00:00:00Z","timestamp":1703116800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,12,21]],"date-time":"2023-12-21T00:00:00Z","timestamp":1703116800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100016808","name":"Natural Science Foundation of Xiamen City","doi-asserted-by":"publisher","award":["62001067"],"award-info":[{"award-number":["62001067"]}],"id":[{"id":"10.13039\/100016808","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EURASIP J. Adv. Signal Process."],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>\n                    RF fingerprints can be used for device identification and network access authentication. An RF fingerprint extraction and device identification algorithm based on multi-scale fractal features and APWOA-LSSVM is proposed. First, a Hilbert transform is performed on the original RF signal, and differential operations are performed on the\n                    <jats:italic>I<\/jats:italic>\n                    \/\n                    <jats:italic>Q<\/jats:italic>\n                    signal. Then, the variational modal decomposition is performed on the differentially processed\n                    <jats:italic>I<\/jats:italic>\n                    \/\n                    <jats:italic>Q<\/jats:italic>\n                    signals separately to obtain a number of band-limited Intrinsic Modal Function (IMF) components. The fractal box dimension of each IMF component is calculated separately as the first-dimensional RF fingerprint. The multi-fractal spectrum of the original RF signal is further computed by Multi-fractal Detrended Fluctuation Analysis (MFDFA) as the second-dimensional RF fingerprint. The RF fingerprint feature vector consists of a combination of the first- and second-dimensional RF fingerprints and is used to train the LSSVM model. Since the penalty factor and kernel parameter width directly affect the recognition accuracy and generalization ability of the LSSVM model, APWOA is used to optimize the hyperparameters of the LSSVM model. Finally, the LSSVM model is constructed using the optimal hyperparameters and the performance of the model is verified on a test dataset. The experimental results show that the proposed model achieves an average recognition accuracy of 99.13\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:tex-math>$$\\%$$<\/jats:tex-math>\n                        <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <mml:mo>%<\/mml:mo>\n                        <\/mml:math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    for 16 Bluetooth devices. Multi-scale fractal features consisting of fractal box dimensions and multiple fractal dimensions are more beneficial in the recognition of wireless devices as compared to single features. In addition, the proposed model possesses superior recognition capabilities when compared to classical machine learning algorithms.\n                  <\/jats:p>","DOI":"10.1186\/s13634-023-01098-9","type":"journal-article","created":{"date-parts":[[2023,12,21]],"date-time":"2023-12-21T09:02:21Z","timestamp":1703149341000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["RF fingerprint extraction and device recognition algorithm based on multi-scale fractal features and APWOA-LSSVM"],"prefix":"10.1186","volume":"2023","author":[{"given":"Wenjiang","family":"Feng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-1145-8444","authenticated-orcid":false,"given":"Yuan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Chongchong","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Juntao","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,21]]},"reference":[{"issue":"6","key":"1098_CR1","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1109\/TAI.2021.3108129","volume":"2","author":"A Jagannath","year":"2021","unstructured":"A. Jagannath, J. Jagannath, T. Melodia, Redefining wireless communication for 6g: signal processing meets deep learning with deep unfolding. IEEE Trans. Artif. Intell. 2(6), 528\u2013536 (2021)","journal-title":"IEEE Trans. Artif. Intell."},{"issue":"4","key":"1098_CR2","doi-asserted-by":"publisher","first-page":"2566","DOI":"10.1109\/JIOT.2021.3050755","volume":"9","author":"C Iwendi","year":"2022","unstructured":"C. Iwendi, J.H. Anajemba, T. Yue, P. Chatterjee, W.S. Alnumay, A secure multiuser privacy technique for wireless IoT networks using stochastic privacy optimization. IEEE Internet Things J. 9(4), 2566\u20132577 (2022)","journal-title":"IEEE Internet Things J."},{"key":"1098_CR3","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1016\/j.neucom.2015.12.012","volume":"179","author":"RC Guido","year":"2016","unstructured":"R.C. Guido, A tutorial on signal energy and its applications. Neurocomputing 179, 264\u2013282 (2016)","journal-title":"Neurocomputing"},{"key":"1098_CR4","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1016\/j.knosys.2016.05.011","volume":"105","author":"RC Guido","year":"2016","unstructured":"R.C. Guido, ZCR-aided neurocomputing: a study with applications. Knowl.-Based Syst. 105, 248\u2013269 (2016)","journal-title":"Knowl.-Based Syst."},{"key":"1098_CR5","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/j.inffus.2017.09.006","volume":"41","author":"RC Guido","year":"2018","unstructured":"R.C. Guido, A tutorial review on entropy-based handcrafted feature extraction for information fusion. Inf. Fusion 41, 161\u2013175 (2018)","journal-title":"Inf. Fusion"},{"issue":"4","key":"1098_CR6","doi-asserted-by":"publisher","first-page":"2346","DOI":"10.1016\/j.jfranklin.2018.12.007","volume":"356","author":"RC Guido","year":"2019","unstructured":"R.C. Guido, Enhancing teager energy operator based on a novel and appealing concept: signal mass. J. Frankl. Inst. 356(4), 2346\u20132352 (2019)","journal-title":"J. Frankl. Inst."},{"key":"1098_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.physrep.2022.08.001","volume":"985","author":"RC Guido","year":"2022","unstructured":"R.C. Guido, Wavelets behind the scenes: practical aspects, insights, and perspectives. Phys. Rep. 985, 1\u201323 (2022)","journal-title":"Phys. Rep."},{"issue":"1","key":"1098_CR8","first-page":"1","volume":"2022","author":"E Guariglia","year":"2022","unstructured":"E. Guariglia, R.C. Guido, Chebyshev wavelet analysis. J. Funct. Spaces 2022(1), 1\u201317 (2022)","journal-title":"J. Funct. Spaces"},{"key":"1098_CR9","doi-asserted-by":"crossref","unstructured":"E. Guariglia, S. Silvestrov, Fractional-wavelet analysis of positive definite distributions and wavelets on d\u2019(c), Engineering Mathematics II, ed. by S. Silvestrov, M. Rancic (Springer, 2016) vol. 1, pp. 337\u2013353","DOI":"10.1007\/978-3-319-42105-6_16"},{"issue":"7","key":"1098_CR10","doi-asserted-by":"publisher","first-page":"674","DOI":"10.1109\/34.192463","volume":"11","author":"SG Mallat","year":"1989","unstructured":"S.G. Mallat, A theory for multiresolution signal decomposition: the wavelet representation. IEEE Trans. Pattern Anal. Mach. Intell. 11(7), 674\u2013693 (1989)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"1098_CR11","doi-asserted-by":"publisher","first-page":"1950050","DOI":"10.1142\/S0219691319500504","volume":"17","author":"E Guariglia","year":"2019","unstructured":"E. Guariglia, R.C. Guido, Hyperspectral image classification using wavelet transform-based smooth ordering. Int. J. Wavel. Multiresolut. Inf. Process 17, 1950050 (2019)","journal-title":"Int. J. Wavel. Multiresolut. Inf. Process"},{"issue":"7","key":"1098_CR12","doi-asserted-by":"publisher","first-page":"1696","DOI":"10.1109\/TSP.2019.2896246","volume":"67","author":"X Zheng","year":"2019","unstructured":"X. Zheng, Y.Y. Tang, J. Zhou, A framework of adaptive multiscale wavelet decomposition for signals on undirected graphs. IEEE Trans. Signal Process. 67(7), 1696\u20131711 (2019)","journal-title":"IEEE Trans. Signal Process."},{"issue":"9","key":"1098_CR13","doi-asserted-by":"publisher","first-page":"714","DOI":"10.3390\/e20090714","volume":"20","author":"E Guariglia","year":"2018","unstructured":"E. Guariglia, Harmonic sierpinski gasket and applications. Entropy 20(9), 714 (2018)","journal-title":"Entropy"},{"issue":"3","key":"1098_CR14","doi-asserted-by":"publisher","first-page":"304","DOI":"10.3390\/e21030304","volume":"21","author":"E Guariglia","year":"2019","unstructured":"E. Guariglia, Primality, fractality and image analysis. Entropy 21(3), 304 (2019)","journal-title":"Entropy"},{"issue":"12","key":"1098_CR15","doi-asserted-by":"publisher","first-page":"1064","DOI":"10.1049\/el:20000735","volume":"36","author":"N Serinken","year":"2000","unstructured":"N. Serinken, O. Ureten, Generalised dimension characterisation of radio transmitter turn-on transients. Electron. Lett. 36(12), 1064\u20131066 (2000)","journal-title":"Electron. Lett."},{"issue":"3","key":"1098_CR16","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1109\/CJECE.2004.1532524","volume":"29","author":"O Tekbas","year":"2004","unstructured":"O. Tekbas, N. Serinken, O. Ureten, An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions. Can. J. Electr. Comput. Eng. 29(3), 203\u2013209 (2004)","journal-title":"Can. J. Electr. Comput. Eng."},{"key":"1098_CR17","first-page":"201","volume":"1","author":"J Hall","year":"2004","unstructured":"J. Hall, M. Barbeau, E. Kranakis, Enhancing intrusion detection in wireless networks using radio frequency fingerprinting. Commun. Internet Inf. Technol. 1, 201\u2013206 (2004)","journal-title":"Commun. Internet Inf. Technol."},{"key":"1098_CR18","first-page":"25","volume":"1","author":"B Danev","year":"2009","unstructured":"B. Danev, S. Capkun, Proceedings of 2009 international conference on information processing in sensor networks, San Francisco. Commun. Internet Inf. Technol. 1, 25\u201336 (2009)","journal-title":"Commun. Internet Inf. Technol."},{"key":"1098_CR19","doi-asserted-by":"publisher","first-page":"79165","DOI":"10.1109\/ACCESS.2022.3194124","volume":"10","author":"J Zhang","year":"2022","unstructured":"J. Zhang, Q. Wang, X. Guo, X. Zheng, D. Liu, Radio frequency fingerprint identification based on logarithmic power cosine spectrum. IEEE Access 10, 79165\u201379179 (2022)","journal-title":"IEEE Access"},{"key":"1098_CR20","doi-asserted-by":"crossref","unstructured":"J. Wei, L. Yu, L. Zhu, X. Zhou, Rf fingerprint extraction method based on ceemdan and multidomain joint entropy. Wirel. Commun. Mobile Comput. 5326892 (2022)","DOI":"10.1155\/2022\/5326892"},{"key":"1098_CR21","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/OJCOMS.2019.2955889","volume":"1","author":"M Ezuma","year":"2020","unstructured":"M. Ezuma, F. Erden, C.K. Anjinappa, O. Ozdemir, I. Guvenc, Detection and classification of UAVs using RF fingerprints in the presence of Wi-Fi and bluetooth interference. IEEE Open J. Commun. Soc. 1, 60\u201376 (2020)","journal-title":"IEEE Open J. Commun. Soc."},{"key":"1098_CR22","doi-asserted-by":"crossref","unstructured":"H.C. Choe, C.E. Poole, A.M. Yu, H.H. Szu, H.H. Szu, Novel identification of intercepted signals from unknown radio transmitters, in Proceedings of Wavelet Applications (1995), pp. 504\u2013517","DOI":"10.1117\/12.205415"},{"key":"1098_CR23","unstructured":"D. Shaw, W. Kinsner, Multifractal modelling of radio transmitter transients for classification, in IEEE WESCANEX 97 Communications, Power and Computing. Conference Proceedings (1997), pp. 306\u2013312"},{"key":"1098_CR24","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1109\/OJAP.2020.3008130","volume":"1","author":"Y Ma","year":"2020","unstructured":"Y. Ma, Y. Hao, Antenna classification using gaussian mixture models (GMM) and machine learning. IEEE Open J. Antennas Propag. 1, 320\u2013328 (2020)","journal-title":"IEEE Open J. Antennas Propag."},{"key":"1098_CR25","doi-asserted-by":"crossref","unstructured":"G. Bahle, V.F. Rey, S. Bian, H. Bello, P. Lukowicz, Using privacy respecting sound analysis to improve bluetooth based proximity detection for COVID-19 exposure tracing and social distancing. Sensors 21(16) (2021)","DOI":"10.3390\/s21165604"},{"key":"1098_CR26","doi-asserted-by":"crossref","unstructured":"T. Yang, S. Hu, W. Wu, L. Niu, D. Lin, J. Song, Conventional neural network-based radio frequency fingerprint identification using raw I\/Q data. Wirel. Commun. Mob. Comput. 8681599 (2022)","DOI":"10.1155\/2022\/8681599"},{"issue":"2","key":"1098_CR27","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1109\/TAFFC.2019.2947464","volume":"13","author":"S Zhang","year":"2022","unstructured":"S. Zhang, X. Zhao, Q. Tian, Spontaneous speech emotion recognition using multiscale deep convolutional LSTM. IEEE Trans. Affect. Comput. 13(2), 680\u2013688 (2022)","journal-title":"IEEE Trans. Affect. Comput."},{"issue":"2","key":"1098_CR28","doi-asserted-by":"publisher","first-page":"420","DOI":"10.3390\/rs14020420","volume":"14","author":"G Qi","year":"2022","unstructured":"G. Qi, Y. Zhang, K. Wang, N. Mazur, Y. Liu, D. Malaviya, Small object detection method based on adaptive spatial parallel convolution and fast multi-scale fusion. Remote Sens. 14(2), 420 (2022)","journal-title":"Remote Sens."},{"issue":"5","key":"1098_CR29","doi-asserted-by":"publisher","first-page":"2550","DOI":"10.1109\/TCSVT.2020.3042178","volume":"32","author":"G Gao","year":"2022","unstructured":"G. Gao, Y. Yu, J. Yang, G.-J. Qi, M. Yang, Hierarchical deep CNN feature set-based representation learning for robust cross-resolution face recognition. IEEE Trans. Circuits Syst. Video Technol. 32(5), 2550\u20132560 (2022)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"4","key":"1098_CR30","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1109\/JRFID.2018.2880457","volume":"2","author":"K Youssef","year":"2018","unstructured":"K. Youssef, L. Bouchard, K. Haigh, J. Silovsky, B. Thapa, C.V. Valk, Machine learning approach to RF transmitter identification. IEEE J Radio Freq. Identif. 2(4), 197\u2013205 (2018)","journal-title":"IEEE J Radio Freq. Identif."},{"issue":"5","key":"1098_CR31","first-page":"138814","volume":"69","author":"Q Lingzhi","year":"2021","unstructured":"Q. Lingzhi, J.-A. Yang, K. Huang, H. Liu, Specific emitter identification based on one-dimensional complex-valued residual networks with an attention mechanism. Bull. Polish Acad. Sci. Tech. Sci. 69(5), 138814 (2021)","journal-title":"Bull. Polish Acad. Sci. Tech. Sci."},{"key":"1098_CR32","doi-asserted-by":"crossref","unstructured":"K. Huang, X. Li, S. Wang, Z. Geng, G. Niu, Rfid scheme for IoT devices based on LSTM-CNN. J. Sens. 8122815 (2022)","DOI":"10.1155\/2022\/8122815"},{"issue":"2","key":"1098_CR33","doi-asserted-by":"publisher","first-page":"55","DOI":"10.3390\/data5020055","volume":"5","author":"E Uzundurukan","year":"2020","unstructured":"E. Uzundurukan, Y. Dalveren, A. Kara, A database for the radio frequency fingerprinting of bluetooth devices. Data 5(2), 55 (2020)","journal-title":"Data"},{"issue":"1","key":"1098_CR34","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1109\/TSP.1993.193131","volume":"41","author":"P Maragos","year":"1993","unstructured":"P. Maragos, F.-K. Sun, Measuring the fractal dimension of signals: morphological covers and iterative optimization. IEEE Trans. Signal Process. 41(1), 108\u2013121 (1993)","journal-title":"IEEE Trans. Signal Process."},{"key":"1098_CR35","doi-asserted-by":"crossref","unstructured":"J.W. Kantelhardt, S.A. Zschiegner, E. Koscielny-Bunde, S. Havlin, A. Bunde, H. Stanley, Multifractal detrended fluctuation analysis of nonstationary time series. Phys. A Stat. Mech. 316(1\u20134) (2002)","DOI":"10.1016\/S0378-4371(02)01383-3"},{"issue":"3","key":"1098_CR36","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1109\/TSP.2013.2288675","volume":"62","author":"K Dragomiretskiy","year":"2014","unstructured":"K. Dragomiretskiy, D. Zosso, Variational mode decomposition. IEEE Trans. Signal Process. 62(3), 531\u2013544 (2014)","journal-title":"IEEE Trans. Signal Process."},{"key":"1098_CR37","doi-asserted-by":"crossref","unstructured":"X. Li, S. Zeng, W. Tong, Enhancing carrier frequency offset authentication via fractal dimension, in International Conference on Networking and Network Applications (NaNA), vol. 2018, 137\u2013142 (2018)","DOI":"10.1109\/NANA.2018.8648734"},{"key":"1098_CR38","unstructured":"H.I. Fawaz, G. Forestier, J. Weber, L. Idoumghar, P.A. Muller, Data augmentation using synthetic data for time series classification with deep residual networks (2018)"}],"container-title":["EURASIP Journal on Advances in Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13634-023-01098-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13634-023-01098-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13634-023-01098-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,21]],"date-time":"2023-12-21T09:04:46Z","timestamp":1703149486000},"score":1,"resource":{"primary":{"URL":"https:\/\/asp-eurasipjournals.springeropen.com\/articles\/10.1186\/s13634-023-01098-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,21]]},"references-count":38,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["1098"],"URL":"https:\/\/doi.org\/10.1186\/s13634-023-01098-9","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-3229559\/v1","asserted-by":"object"}]},"ISSN":["1687-6180"],"issn-type":[{"value":"1687-6180","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,21]]},"assertion":[{"value":"16 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 December 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 December 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"131"}}