{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:07:39Z","timestamp":1730225259917,"version":"3.28.0"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1109\/hpcc-dss-smartcity-dependsys53884.2021.00068","type":"proceedings-article","created":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T19:07:23Z","timestamp":1653937643000},"page":"327-335","source":"Crossref","is-referenced-by-count":2,"title":["RF Transmitter Identification and Classification Based on Deep Residual Shrinkage Network"],"prefix":"10.1109","author":[{"given":"Xiuhua","family":"Wen","sequence":"first","affiliation":[{"name":"Hainan University,School of Cryptography,Haikou,China"}]},{"given":"Chunjie","family":"Cao","sequence":"additional","affiliation":[{"name":"Hainan University,School of Cryptography,Haikou,China"}]},{"given":"Yang","family":"Sun","sequence":"additional","affiliation":[{"name":"Hainan University,School of Cryptography,Haikou,China"}]},{"given":"Yifan","family":"Li","sequence":"additional","affiliation":[{"name":"Hainan University,School of Cryptography,Haikou,China"}]},{"given":"Haifeng","family":"Peng","sequence":"additional","affiliation":[{"name":"Hainan University,School of Cryptography,Haikou,China"}]},{"given":"Mengnan","family":"Wang","sequence":"additional","affiliation":[{"name":"Hainan University,School of Computer Science and Technology,Haikou,China"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2991052"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2019.2908982"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2871465"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2978620"},{"key":"ref31","first-page":"370","volume":"2019","author":"sankhe","year":"2019","journal-title":"ORACLE Optimized radio classification through convolutional neural networks"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2943898"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3001721"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2911347"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2838071"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3054524"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2520908"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2020.3023145"},{"key":"ref11","first-page":"2146","volume":"2018","author":"zhu","year":"2018","journal-title":"Compressed sensing mask feature in time-frequency domain for civil flight radar emitter recognition"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2552146"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2855665"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2908759"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2950670"},{"journal-title":"A convo-lutional neural network-based rf fingerprinting identification scheme for mobile phones","first-page":"115","year":"0","author":"wang","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2000180"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3045318"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2019.1800455"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2020.3043332"},{"volume":"2020","journal-title":"Wireless device identification based on radio frequency fingerprint features","year":"2020","author":"lin","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2019.2948919"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2876865"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3234150"},{"key":"ref29","first-page":"770","volume":"2016","author":"he","year":"2016","journal-title":"Deep residual learning for image recognition"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2929166"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2949815"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2979670"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2916183"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2561902"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"282","DOI":"10.1109\/COMST.2020.3042188","article-title":"A survey of physicallayer authentication in wireless communications","volume":"23","author":"xie","year":"2021","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"ref20","first-page":"2932","volume":"2020","author":"xu","year":"2020","journal-title":"Augmentation data synthesis via gans Boosting latent fingerprint reconstruction"},{"volume":"2019","journal-title":"Wireless physicallayer identification assisted 5g network security","year":"2019","author":"chang","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2948283"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2400426"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3078491"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.2000322"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2913627"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2018.2796446"}],"event":{"name":"2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC\/DSS\/SmartCity\/DependSys)","start":{"date-parts":[[2021,12,20]]},"location":"Haikou, Hainan, China","end":{"date-parts":[[2021,12,22]]}},"container-title":["2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC\/DSS\/SmartCity\/DependSys)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9780876\/9780861\/09781182.pdf?arnumber=9781182","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T16:58:01Z","timestamp":1656349081000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9781182\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/hpcc-dss-smartcity-dependsys53884.2021.00068","relation":{},"subject":[],"published":{"date-parts":[[2021,12]]}}}