Author of the publication

Penetrating RF Fingerprinting-based Authentication with a Generative Adversarial Attack.

, , and . ICC, page 1-6. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep Learning Approaches for Open Set Wireless Transmitter Authorization., , and . SPAWC, page 1-5. IEEE, (2020)Self-Optimization of Wireless Systems With Knowledge Management: An Artificial Intelligence Approach., , , and . IEEE Trans. Vehicular Technology, 68 (10): 9682-9697 (2019)Artificial Intelligence Driven Optimization of Channel and Location in Wireless Networks., , , and . GLOBECOM Workshops, page 1-6. IEEE, (2018)Self-X Design of Wireless Networks: Exploiting Artificial Intelligence and Guided Learning., , , and . CoRR, (2018)Penetrating RF Fingerprinting-based Authentication with a Generative Adversarial Attack., , and . CoRR, (2020)WiSig: A Large-Scale WiFi Signal Dataset for Receiver and Channel Agnostic RF Fingerprinting., , and . IEEE Access, (2022)Real-time Wireless Transmitter Authorization: Adapting to Dynamic Authorized Sets with Information Retrieval., , and . DySPAN, page 302-308. IEEE, (2021)An Overview of Machine Learning Approaches in Wireless Mesh Networks., and . CoRR, (2018)Open Set RF Fingerprinting using Generative Outlier Augmentation., , and . GLOBECOM, page 1-7. IEEE, (2021)Penetrating RF Fingerprinting-based Authentication with a Generative Adversarial Attack., , and . ICC, page 1-6. IEEE, (2021)