{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T22:32:42Z","timestamp":1775514762411,"version":"3.50.1"},"reference-count":32,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.061869","type":"journal-article","created":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T02:59:11Z","timestamp":1741316351000},"page":"2025-2040","source":"Crossref","is-referenced-by-count":2,"title":["A Lightweight Convolutional Neural Network with Squeeze and Excitation Module for Security Authentication Using Wireless Channel"],"prefix":"10.32604","volume":"83","author":[{"given":"Xiaoying","family":"Qiu","sequence":"first","affiliation":[]},{"given":"Xiaoyu","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Guangxu","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Jinwei","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Wenbao","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Zhaozhong","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Maozhi","family":"Xu","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","series-title":"2020 3rd IEEE International Conference on Knowledge Innovation and Invention (ICKII)","first-page":"41","article-title":"Short survey on physical layer authentication by machine-learning for 5G-based Internet of Things","author":"Jiang","year":"2020"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1109\/COMST.2023.3327327","article-title":"Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks","volume":"26","author":"Illi","year":"2024","journal-title":"IEEE Commun Surv Tutor"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"100780","DOI":"10.1016\/j.iot.2023.100780","article-title":"Internet of things (IoT) security dataset evolution: challenges and future directions","volume":"22","author":"Kaur","year":"2023","journal-title":"Internet Things"},{"key":"ref4","first-page":"22","article-title":"Review of key technology and its application of blockchain","volume":"4","author":"Zhang F, Shi","year":"2018","journal-title":"Chin J Netw Inf Secur"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"8760","DOI":"10.1109\/TWC.2024.3354064","article-title":"Decentralized edge collaboration for seamless handover authentication in zero-trust IoV","volume":"23","author":"Fang","year":"2024","journal-title":"IEEE Trans Wirel Commun"},{"key":"ref6","first-page":"1","article-title":"Survey on blockchain networking: context, state-of-the-art","volume":"54","author":"Dotan","year":"2021","journal-title":"chall ACM Comput Surv (CSUR)"},{"key":"ref7","first-page":"1","article-title":"Physical layer security of 5G wireless networks for IoT: challenges and opportunities","volume":"PP","author":"Wang","year":"2019","journal-title":"IEEE Internet Things J"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/MNET.011.2000122","article-title":"Physical layer authentication for 5G communications: opportunities and road ahead","volume":"34","author":"Wang","year":"2020","journal-title":"IEEE Netw"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"4171","DOI":"10.1109\/TWC.2016.2535442","article-title":"Physical layer authentication enhancement using two-dimensional channel quantization","volume":"15","author":"Liu","year":"2016","journal-title":"IEEE Trans Wirel Commun"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"282","DOI":"10.1109\/COMST.2020.3042188","article-title":"A survey of physical layer authentication in wireless communications","volume":"23","author":"Xie","year":"2020","journal-title":"IEEE Commun Surv Tutor"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"7731","DOI":"10.1109\/JIOT.2021.3114348","article-title":"Channel-prediction-based one-class mobile IoT device authentication","volume":"9","author":"Wang","year":"2021","journal-title":"IEEE Internet Things J"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1109\/COMST.2015.2476338","article-title":"Device fingerprinting in wireless networks: challenges and opportunities","volume":"18","author":"Xu","year":"2016","journal-title":"IEEE Commun Surv Tutor"},{"key":"ref13","series-title":"GLOBECOM 2023\u20142023 IEEE Global Communications Conference","first-page":"826","article-title":"Deep learning-enhanced physical layer authentication for mobile devices","author":"Guo","year":"2023"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1830","DOI":"10.1109\/COMST.2024.3363639","article-title":"Physical layer authentication and security design in the machine learning era","volume":"26","author":"Hoang","year":"2024","journal-title":"IEEE Commun Surv Tutor"},{"key":"ref15","series-title":"2020 IEEE 9th Joint International Information Technology and Artificial Intelligence Conference (ITAIC)","first-page":"534","article-title":"The wireless IoT device identification based on channel state information fingerprinting","volume":"9","author":"Liu","year":"2020"},{"key":"ref16","series-title":"2019 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA)","first-page":"231","article-title":"A novel physical layer authentication method with convolutional neural network","author":"Liao","year":"2019"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"129","DOI":"10.23919\/JCC.2021.00.014","article-title":"A physical layer authentication mechanism for IoT devices","volume":"19","author":"Li","year":"2021","journal-title":"China Commun"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"26139","DOI":"10.1109\/ACCESS.2020.2971260","article-title":"A learning approach for physical layer authentication using adaptive neural network","volume":"8","author":"Qiu","year":"2020","journal-title":"IEEE Access"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"1748","DOI":"10.1109\/LWC.2022.3180901","article-title":"CSI-based physical layer authentication via deep learning","volume":"11","author":"Wang","year":"2022","journal-title":"IEEE Wirel Commun Lett"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1109\/LWC.2023.3324981","article-title":"Environment semantics enabled physical layer authentication","volume":"13","author":"Gao","year":"2024","journal-title":"IEEE Wirel Commun Lett"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"8616","DOI":"10.1109\/TIFS.2024.3460373","article-title":"A novel PHY-layer spoofing attack detection scheme based on WGAN-encoder model","volume":"19","author":"Xie","year":"2024","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"15633","DOI":"10.1109\/JIOT.2023.3347603","article-title":"Physical layer authentication for industrial control based on convolutional denoising autoencoder","volume":"11","author":"Chen","year":"2024","journal-title":"IEEE Internet Things J"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"2041","DOI":"10.1109\/TII.2020.2963962","article-title":"Automated labeling and learning for physical layer authentication against clone node and sybil attacks in industrial wireless edge networks","volume":"17","author":"Chen","year":"2020","journal-title":"IEEE Trans Ind Inform"},{"key":"ref24","series-title":"2024 IEEE International Mediterranean Conference on Communications and Networking (MeditCom)","first-page":"114","article-title":"Deep learning-based channel prediction for wireless physical layer security","author":"Martins","year":"2024"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"5379","DOI":"10.3390\/s21165379","article-title":"Enhanced security authentication based on convolutional-LSTM networks","volume":"21","author":"Qiu","year":"2021","journal-title":"Sensors"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"15501329221107822","DOI":"10.1177\/15501329221107822","article-title":"Threshold-free multi-attributes physical layer authentication based on expectation\u2013conditional maximization channel estimation in Internet of Things","volume":"18","author":"Jing","year":"2022","journal-title":"Int J Distrib Sens Netw"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"4236","DOI":"10.1109\/TII.2023.3316178","article-title":"Spatiotemporal gradient-based physical-layer authentication enhanced by CSI-to-image transformation for industrial mobile devices","volume":"20","author":"Wang","year":"2024","journal-title":"IEEE Trans Ind Inform"},{"key":"ref28","first-page":"4368","author":"Pan","year":"2020","journal-title":"Physical layer authentication based on residual network for industrial wireless CPSs"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"1896","DOI":"10.1109\/TIFS.2023.3340090","article-title":"Multi-user physical layer authentication based on CSI using ResNet in mobile IIoT","volume":"19","author":"Jing","year":"2024","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref30","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"770","article-title":"Deep residual learning for image recognition","author":"He","year":"2016"},{"key":"ref31","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"7132","article-title":"Squeeze-and-excitation networks","author":"Hu","year":"2018"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"3242","DOI":"10.1109\/TAP.2014.2310220","article-title":"QuaDRiGa: a 3-D multi-cell channel model with time evolution for enabling virtual field trials","volume":"62","author":"Jaeckel","year":"2014","journal-title":"IEEE Trans Antennas Propag"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-2\/TSP_CMC_61869\/TSP_CMC_61869.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:07:30Z","timestamp":1763341650000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n2\/60564"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":32,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.061869","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}