Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning 2022
DOI: 10.1145/3522783.3529518
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Augmentation Methods for RF Fingerprinting under Impaired Channels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
24
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 22 publications
(24 citation statements)
references
References 13 publications
0
24
0
Order By: Relevance
“…Although they are not a part of the contribution of this paper, security and safety are very important in industrial networks in order to protect the data as well as the network infrastructure [ 43 ]. Successful malicious attacks can lead to the loss of revenue, loss of credibility, loss of production, etc., which can be devastating for a manufacturing company.…”
Section: Wireless Communicationmentioning
confidence: 99%
“…Although they are not a part of the contribution of this paper, security and safety are very important in industrial networks in order to protect the data as well as the network infrastructure [ 43 ]. Successful malicious attacks can lead to the loss of revenue, loss of credibility, loss of production, etc., which can be devastating for a manufacturing company.…”
Section: Wireless Communicationmentioning
confidence: 99%
“…The reference [ 40 ] investigated the effect of environmental changes on the effectiveness of RF fingerprint identification and the problem that it is not easy to collect samples from different environments; the tapped delay line and clustered delay line (TDL/CDL) models were trained to improve the accuracy of recognizing transmitters significantly from 74% to 87.94% on the unobserved data. The reference [ 41 ] optimized the solution for the reference [ 40 ] and proposed a fine-grained augmentation approach to improve the learning performance of the deep learning model, resulting in an accuracy of 96.61% for recognition.…”
Section: Related Workmentioning
confidence: 99%
“…According to the research in references [ 33 , 34 , 35 , 36 , 37 , 38 , 39 ], edge computing has been more frequently employed for equipment monitoring. The references [ 40 , 41 ] show that deep learning augmentation algorithms have better recognition results in the case of insufficient training data. It is critical to developing a current-based edge monitoring approach with solid adaptability, cheap costs, and high reliability to suit the real-time monitoring needs of traditional processing equipment.…”
Section: Related Workmentioning
confidence: 99%
“…With the explosive development of mobile Internet and deep learning (DL), intelligent edge computing services based on collaborative learning are widely used in various application scenarios [ 1 , 2 , 3 , 4 , 5 ]. For example, autonomous vehicles and face recognition cameras; these intelligent services put forward higher requirements on the privacy and security of models [ 6 , 7 , 8 ].…”
Section: Introductionmentioning
confidence: 99%