Y Liu, J Wang, J Li, S Niu… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) is becoming an indispensable part of everyday life, enabling a variety of emerging services and applications. However, the presence of rogue IoT devices …
L Xie, L Peng, J Zhang, A Hu - Security and Safety, 2024 - sands.edpsciences.org
Radio frequency fingerprint (RFF) identification is a promising technique for identifying Internet of Things (IoT) devices. This paper presents a comprehensive survey on RFF …
The universal availability of unmanned aerial vehicles (UAVs) has resulted in many applications where the same make/model can be deployed by multiple parties. Thus …
Industrial IoT-enabled critical infrastructures are susceptible to cyber attacks due to their mission-critical deployment. To ensure security by design, radio frequency (RF)-based …
Cyber-physical systems such as autonomous vehicle networks are considered to be critical infrastructures in various applications. However, their mission critical deployment makes …
Generating high-quality, real-world, well-labeled datasets for radio frequency machine learning (RFML) applications often proves prohibitively cumbersome and expensive …
The performance of Radio Frequency (RF) Fingerprinting (RFF) techniques is negatively impacted when the training data is not temporally close to the testing data. This can limit the …
Y Sun, M Yu, L Wang, T Li, M Dong - Drones, 2023 - mdpi.com
The navigation of small unmanned aerial vehicles (UAVs) mainly depends on global positioning systems (GPSs). However, GPSs are vulnerable to attack by spoofing, which …
Critical infrastructures such as connected and au-tonomous vehicles, are susceptible to cyber attacks due to their mission-critical deployment. To ensure security by design, radio …