共 25 条
- [2] Chanerjee B, 2018, PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), P205, DOI 10.1109/HST.2018.8383916
- [3] Clustering Based Physical-Layer Authentication in Edge Computing Systems with Asymmetric Resources [J]. SENSORS, 2019, 19 (08):
- [4] Chen Z, 2018, 2018 21ST CONFERENCE ON INNOVATION IN CLOUDS, INTERNET AND NETWORKS AND WORKSHOPS (ICIN)
- [5] A STATISTICAL THEORY OF MOBILE-RADIO RECEPTION [J]. BELL SYSTEM TECHNICAL JOURNAL, 1968, 47 (06): : 957 - +
- [6] Deep Residual Learning for Image Recognition [J]. 2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, : 770 - 778
- [9] Multiuser Physical Layer Authentication in Internet of Things With Data Augmentation [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (03): : 2077 - 2088
- [10] Security Enhancement for Mobile Edge Computing Through Physical Layer Authentication [J]. IEEE ACCESS, 2019, 7 : 116390 - 116401