Author of the publication

Automated Labeling and Learning for Physical Layer Authentication Against Clone Node and Sybil Attacks in Industrial Wireless Edge Networks.

, , , , , and . IEEE Trans. Ind. Informatics, 17 (3): 2041-2051 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Increasing the Accuracy of Secure Model for Medical Data Sharing in the Internet of Things., , , and . WASA (1), volume 13471 of Lecture Notes in Computer Science, page 40-51. Springer, (2022)Mapping The Evolution of Scientific Community Structures in Time., , , and . WWW (Companion Volume), page 1039-1044. ACM, (2015)Low jitter scheduling for Industrial Wireless Sensor and Actuator Networks., , , and . IECON, page 5594-5599. IEEE, (2013)Afraid of Niche, Tired of Mass: Atypical Idea Combination on Crowdfunding Platform., , and . ICIS, Association for Information Systems, (2022)Short-Packet Interleaver Against Impulse Interference in Practical Industrial Environments., , , , and . IEEE Trans. Wirel. Commun., 21 (12): 10257-10270 (2022)A Reassessment on Applying Protocol Interference Model Under Rayleigh Fading: From Perspective of Link Scheduling., , , and . IEEE/ACM Trans. Netw., 32 (1): 238-252 (February 2024)Realization and measurements of industrial wireless sensor and actuator networks., , , and . CASE, page 131-137. IEEE, (2015)Physical Layer Authentication Schemes Against Clone Node and Sybil Attacks in Wireless Industrial Internet., , , , and . ICII, page 381-386. IEEE, (2019)Towards reliable and lightweight communication in industrial wireless sensor networks., , , , and . INDIN, page 1218-1224. IEEE, (2012)Theoretical Analysis of Secrecy Transmission Capacity in Wireless Ad Hoc Networks., , , and . WCNC, page 1-6. IEEE, (2017)