Author of the publication

Penetrating RF Fingerprinting-based Authentication with a Generative Adversarial Attack.

, , and . ICC, page 1-6. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Penetrating RF Fingerprinting-based Authentication with a Generative Adversarial Attack., , and . CoRR, (2020)Self-X Design of Wireless Networks: Exploiting Artificial Intelligence and Guided Learning., , , and . CoRR, (2018)Self-Optimization of Wireless Systems With Knowledge Management: An Artificial Intelligence Approach., , , and . IEEE Trans. Vehicular Technology, 68 (10): 9682-9697 (2019)Deep Learning Approaches for Open Set Wireless Transmitter Authorization., , and . SPAWC, page 1-5. IEEE, (2020)Artificial Intelligence Driven Optimization of Channel and Location in Wireless Networks., , , and . GLOBECOM Workshops, page 1-6. IEEE, (2018)Open Set Wireless Transmitter Authorization: Deep Learning Approaches and Dataset Considerations., , and . IEEE Trans. Cogn. Commun. Netw., 7 (1): 59-72 (2021)An Overview of Machine Learning Approaches in Wireless Mesh Networks., and . IEEE Commun. Mag., 57 (4): 102-108 (2019)WiSig: A Large-Scale WiFi Signal Dataset for Receiver and Channel Agnostic RF Fingerprinting., , and . IEEE Access, (2022)Real-time Wireless Transmitter Authorization: Adapting to Dynamic Authorized Sets with Information Retrieval., , and . DySPAN, page 302-308. IEEE, (2021)An Overview of Machine Learning Approaches in Wireless Mesh Networks., and . CoRR, (2018)