{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,15]],"date-time":"2024-10-15T04:08:47Z","timestamp":1728965327361},"reference-count":33,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62171120"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Physical Communication"],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1016\/j.phycom.2024.102444","type":"journal-article","created":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T23:29:24Z","timestamp":1721518164000},"page":"102444","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["A channel resilient RFF extraction scheme for cyclic prefix contained systems"],"prefix":"10.1016","volume":"66","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-3381-4310","authenticated-orcid":false,"given":"Zhen","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0398-4899","authenticated-orcid":false,"given":"Aiqun","family":"Hu","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5304-2170","authenticated-orcid":false,"given":"Xinyu","family":"Qi","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5690-6472","authenticated-orcid":false,"given":"Tianshu","family":"Chen","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.phycom.2024.102444_b1","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1109\/COMST.2015.2476338","article-title":"Device fingerprinting in wireless networks: Challenges and opportunities","volume":"18","author":"Xu","year":"2016","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"9","key":"10.1016\/j.phycom.2024.102444_b2","doi-asserted-by":"crossref","first-page":"1727","DOI":"10.1109\/JPROC.2016.2558521","article-title":"A survey on wireless security: Technical challenges, recent advances, and future trends","volume":"104","author":"Zou","year":"2016","journal-title":"Proc. IEEE"},{"issue":"1","key":"10.1016\/j.phycom.2024.102444_b3","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/COMST.2020.3029723","article-title":"Challenges and solutions for cellular based V2X communications","volume":"23","author":"Gyawali","year":"2021","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"10.1016\/j.phycom.2024.102444_b4","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/CJECE.2007.364330","article-title":"Wireless security through RF fingerprinting","volume":"32","author":"Ureten","year":"2007","journal-title":"Can. J. Electr. Comput. Eng."},{"key":"10.1016\/j.phycom.2024.102444_b5","doi-asserted-by":"crossref","first-page":"774","DOI":"10.1109\/TIFS.2022.3152404","article-title":"Towards scalable and Channel-Robust radio frequency fingerprint identification for LoRa","volume":"17","author":"Shen","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.phycom.2024.102444_b6","series-title":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","first-page":"4897","article-title":"DFSNet: Deep fractional scattering network for LoRa fingerprinting","author":"Zhang","year":"2022"},{"issue":"14","key":"10.1016\/j.phycom.2024.102444_b7","doi-asserted-by":"crossref","first-page":"11276","DOI":"10.1109\/JIOT.2021.3051402","article-title":"A robust radio-frequency fingerprint extraction scheme for practical device recognition","volume":"8","author":"Zhou","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.phycom.2024.102444_b8","series-title":"2018 IEEE 18th International Conference on Communication Technology","first-page":"683","article-title":"Wireless device identification based on improved convolutional neural network model","author":"Yuan","year":"2018"},{"key":"10.1016\/j.phycom.2024.102444_b9","series-title":"IEEE WESCANEX 97 Communications, Power and Computing. Conference Proceedings","first-page":"306","article-title":"Multifractal modelling of radio transmitter transients for classification","author":"Shaw","year":"1997"},{"key":"10.1016\/j.phycom.2024.102444_b10","series-title":"MILCOM 2012 - 2012 IEEE Military Communications Conference","first-page":"1","article-title":"An RF-DNA verification process for ZigBee networks","author":"Dubendorfer","year":"2012"},{"key":"10.1016\/j.phycom.2024.102444_b11","series-title":"2014 IEEE Global Communications Conference","first-page":"613","article-title":"Relay authentication by exploiting I\/Q imbalance in amplify-and-forward system","author":"Hao","year":"2014"},{"key":"10.1016\/j.phycom.2024.102444_b12","series-title":"IEEE INFOCOM 2019 - IEEE Conference on Computer Communications","first-page":"370","article-title":"ORACLE: Optimized Radio clAssification through Convolutional neuraL nEtworks","author":"Sankhe","year":"2019"},{"issue":"5","key":"10.1016\/j.phycom.2024.102444_b13","doi-asserted-by":"crossref","first-page":"1658","DOI":"10.1109\/TCOMM.2014.032914.120921","article-title":"Physical layer authentication for mobile systems with time-varying carrier frequency offsets","volume":"62","author":"Hou","year":"2014","journal-title":"IEEE Trans. Commun."},{"key":"10.1016\/j.phycom.2024.102444_b14","series-title":"2021 IEEE Texas Symposium on Wireless and Microwave Circuits and Systems","first-page":"1","article-title":"Power amplifier enabled RF fingerprint identification","author":"Li","year":"2021"},{"key":"10.1016\/j.phycom.2024.102444_b15","doi-asserted-by":"crossref","first-page":"4435","DOI":"10.1109\/TIFS.2021.3106166","article-title":"A generalizable model-and-data driven approach for open-set rff authentication","volume":"16","author":"Xie","year":"2021","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"10.1016\/j.phycom.2024.102444_b16","doi-asserted-by":"crossref","first-page":"2743","DOI":"10.1109\/JIOT.2022.3213892","article-title":"Toward novel time representations for RFF identification using imperfect data sets","volume":"10","author":"Qi","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.phycom.2024.102444_b17","series-title":"2022 IEEE\/CIC International Conference on Communications in China","first-page":"908","article-title":"Deep learning based RFF recognition with differential constellation trace figure towards closed and open set","author":"Yang","year":"2022"},{"issue":"1","key":"10.1016\/j.phycom.2024.102444_b18","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1109\/JIOT.2018.2838071","article-title":"Design of a hybrid RF fingerprint extraction and device classification scheme","volume":"6","author":"Peng","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.phycom.2024.102444_b19","doi-asserted-by":"crossref","first-page":"3974","DOI":"10.1109\/TIFS.2021.3088008","article-title":"Radio frequency fingerprint identification for narrowband systems, modelling and classification","volume":"16","author":"Zhang","year":"2021","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"11","key":"10.1016\/j.phycom.2024.102444_b20","doi-asserted-by":"crossref","first-page":"2524","DOI":"10.1109\/LWC.2021.3106396","article-title":"A data-independent radio frequency fingerprint extraction scheme","volume":"10","author":"Yang","year":"2021","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"10.1016\/j.phycom.2024.102444_b21","series-title":"2021 IEEE Global Communications Conference","first-page":"1","article-title":"LTE device identification based on RF fingerprint with Multi-Channel convolutional neural network","author":"Yin","year":"2021"},{"key":"10.1016\/j.phycom.2024.102444_b22","series-title":"2014 12th International Conference on Optical Internet 2014","first-page":"1","article-title":"LS channel estimation performance analysis for RoF channel environment in the OFDM system","author":"Lee","year":"2014"},{"key":"10.1016\/j.phycom.2024.102444_b23","series-title":"2007 International Symposium on Intelligent Signal Processing and Communication Systems","first-page":"248","article-title":"Channel estimation with timing offset based on PSD & LS estimation for wireless OFDM systems","author":"Qin","year":"2007"},{"key":"10.1016\/j.phycom.2024.102444_b24","series-title":"2011 International Conference on Communication Systems and Network Technologies","first-page":"601","article-title":"A spectrally efficient ML estimation method for OFDM systems over sparse multipath channels","author":"Gupta","year":"2011"},{"issue":"12","key":"10.1016\/j.phycom.2024.102444_b25","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/CC.2015.7385531","article-title":"ML and MAP channel estimation for distributed one-way relay networks with orthogonal training","volume":"12","author":"Yao","year":"2015","journal-title":"China Commun."},{"key":"10.1016\/j.phycom.2024.102444_b26","series-title":"2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering","first-page":"1003","article-title":"Performance of channel estimation and equalization in OFDM system","author":"Bhimsing","year":"2017"},{"key":"10.1016\/j.phycom.2024.102444_b27","doi-asserted-by":"crossref","first-page":"1668","DOI":"10.1109\/OJCOMS.2023.3295379","article-title":"Deep learning-based RF fingerprint identification with channel effects mitigation","volume":"4","author":"Fu","year":"2023","journal-title":"IEEE Open J. Commun. Soc."},{"key":"10.1016\/j.phycom.2024.102444_b28","doi-asserted-by":"crossref","first-page":"1855","DOI":"10.1109\/TIFS.2023.3343079","article-title":"LED-RFF: LTE DMRS-based channel robust radio frequency fingerprint identification scheme","volume":"19","author":"Yang","year":"2024","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"year":"2016","author":"ETSI 3rd Generation Partnership Project","series-title":"LTE; Evolved Universal Terrestrial Radio Access (E-UTRA); Physical channels and modulation (Release 14)","key":"10.1016\/j.phycom.2024.102444_b29"},{"key":"10.1016\/j.phycom.2024.102444_b30","series-title":"2022 IEEE Silchar Subsection Conference","first-page":"1","article-title":"Raw waveform based speaker identification using deep neural networks","author":"Saritha","year":"2022"},{"issue":"5","key":"10.1016\/j.phycom.2024.102444_b31","doi-asserted-by":"crossref","first-page":"7359","DOI":"10.1109\/JIOT.2023.3328025","article-title":"Carrier frequency offset in internet of things radio frequency fingerprint identification: An experimental review","volume":"11","author":"Huan","year":"2024","journal-title":"IEEE Internet Things J."},{"year":"2017","author":"ETSI 3rd Generation Partnership Project","series-title":"Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio Access (E-UTRA); Base Station (BS) radio transmission and reception (Release 14)","key":"10.1016\/j.phycom.2024.102444_b32"},{"key":"10.1016\/j.phycom.2024.102444_b33","first-page":"1","article-title":"Channel-robust radio frequency fingerprint identification for cellular uplink LTE devices","author":"Peng","year":"2024","journal-title":"IEEE Internet Things J."}],"container-title":["Physical Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1874490724001629?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1874490724001629?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,10,14]],"date-time":"2024-10-14T12:37:55Z","timestamp":1728909475000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1874490724001629"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10]]},"references-count":33,"alternative-id":["S1874490724001629"],"URL":"https:\/\/doi.org\/10.1016\/j.phycom.2024.102444","relation":{},"ISSN":["1874-4907"],"issn-type":[{"type":"print","value":"1874-4907"}],"subject":[],"published":{"date-parts":[[2024,10]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A channel resilient RFF extraction scheme for cyclic prefix contained systems","name":"articletitle","label":"Article Title"},{"value":"Physical Communication","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.phycom.2024.102444","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"102444"}}