{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T09:25:47Z","timestamp":1743585947095,"version":"3.37.3"},"reference-count":96,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"University of Chattanooga (UC) Foundation Inc."},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1925603","2201497"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tifs.2024.3360851","type":"journal-article","created":{"date-parts":[[2024,1,31]],"date-time":"2024-01-31T18:32:41Z","timestamp":1706725961000},"page":"3194-3209","source":"Crossref","is-referenced-by-count":10,"title":["Improving RF-DNA Fingerprinting Performance in an Indoor Multipath Environment Using Semi-Supervised Learning"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4392-3385","authenticated-orcid":false,"given":"Mohamed K. M.","family":"Fadul","sequence":"first","affiliation":[{"name":"Electrical Engineering Department, The University of Tennessee at Chattanooga, Chattanooga, TN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9393-7104","authenticated-orcid":false,"given":"Donald R.","family":"Reising","sequence":"additional","affiliation":[{"name":"Electrical Engineering Department, The University of Tennessee at Chattanooga, Chattanooga, TN, USA"}]},{"given":"Lakmali P.","family":"Weerasena","sequence":"additional","affiliation":[{"name":"Department of Mathematics, The University of Tennessee at Chattanooga, Chattanooga, TN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9833-871X","authenticated-orcid":false,"given":"T. Daniel","family":"Loveless","sequence":"additional","affiliation":[{"name":"Department of Intelligent Systems Engineering, Indiana University, Bloomington, IN, USA"}]},{"given":"Mina","family":"Sartipi","sequence":"additional","affiliation":[{"name":"UTC Research Institute, The University of Tennessee at Chattanooga, Chattanooga, TN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-9566-8043","authenticated-orcid":false,"given":"Joshua H.","family":"Tyler","sequence":"additional","affiliation":[{"name":"Electrical Engineering Department, The University of Tennessee at Chattanooga, Chattanooga, TN, USA"}]}],"member":"263","reference":[{"volume-title":"The IoT Rundown for 2020: Stats, Risks, and Solutions","year":"2020","key":"ref1"},{"volume-title":"HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable To Attack","year":"2014","author":"Rawlinson","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CIC48465.2019.00034"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2910750"},{"volume-title":"A Smart Fish Tank Left a Casino Vulnerable To Hackers","year":"2017","author":"Larsen","key":"ref5"},{"volume-title":"Hacking Wireless Exposed: Wireless Security Secrets and Solutions","year":"2015","author":"Wright","key":"ref6"},{"key":"ref7","first-page":"1","article-title":"Hacking IoT: A case study on baby monitoring exposures and vulnerabilities","author":"Stanislav","year":"2015","journal-title":"Rapid7"},{"volume-title":"KillerBee: Practical ZigBee Exploitation Framework or \u2018Wireless Hacking and the Kinetic World\u2019","year":"2021","author":"Wright","key":"ref8"},{"volume-title":"\u2019Internet of Things\u2019 Hacking Attack Led To Widespread Outage Of Popular Websites","year":"2016","author":"Simon","key":"ref9"},{"volume-title":"Insteon: False Security and Deceptive Documentation","year":"2014","author":"Shipley","key":"ref10"},{"volume-title":"Tools for Insteon RF","year":"2015","key":"ref11"},{"volume-title":"Mirai IoT Botnet Co-Authors Plead Guilty","year":"2017","author":"Brook","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2011.6014631"},{"article-title":"Exploitation of RF-DNA for device classification and verification using GRLVQI processing","year":"2012","author":"Reising","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2962626"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3045305"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199451"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2134848"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISWCS.2010.5624371"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2010.01.002"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1049\/el:20040160"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1029\/2000RS002345"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/26.141456"},{"volume-title":"Interferometric Intrapulse Radar Receiver for Specific Emitter Identification and Direction-Finding","year":"2007","key":"ref24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2469-1"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2400426"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2017.7876111"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2913759"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3054524"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2019.8885421"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20936-9_22"},{"article-title":"The impact of Rayleigh fading channel effects on the RF-DNA fingerprinting process","year":"2018","author":"Fadul","key":"ref32"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/iThings\/GreenCom\/CPSCom\/SmartData.2019.00191"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3053491"},{"volume-title":"Spectrum Collaboration Challenge\u2014Using AI To Unlock the True Potential of the RF Spectrum","year":"2017","key":"ref35"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422168"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2017.2758370"},{"volume-title":"Radio Frequency Machine Learning Systems","year":"2019","key":"ref38"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3323679.3326503"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3397166.3409132"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2019.1800601"},{"key":"ref42","first-page":"36","article-title":"In the future, AIs-not humans-will design our wireless signals","volume":"5","author":"Downey","year":"2020","journal-title":"IEEE Spectr. Mag."},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM52596.2021.9652911"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2019.8766385"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1049\/el.2018.6229"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2018.2797022"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599847"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2019.2891155"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1800153"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2018.2796446"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599826"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2933242"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/JRFID.2018.2880457"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2019.8923325"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.0001.1900065"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC47524.2020.9031257"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2871465"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1049\/el.2020.0116"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2950670"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2021.3110775"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-25748-4_6"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2020.2985375"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2908759"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2021.12.005"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3018677"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2021.3135378"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2019.8927888"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/AUTEEE50969.2020.9315592"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2978620"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/AIID51893.2021.9456526"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3087243"},{"issue":"8","key":"ref72","doi-asserted-by":"crossref","first-page":"1481","DOI":"10.3390\/sym13081481","article-title":"Specific emitter identification based on multi-domain feature fusion and integrated learning","volume":"13","author":"Qu","year":"2021","journal-title":"Symmetry"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/FMEC.2019.8795319"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ICICSP54369.2021.9611854"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT52962.2021.9658077"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.23919\/CCC52363.2021.9549470"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/CIS2018.2018.00059"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45855.2022.9838884"},{"volume-title":"IEEE 802.11 Handbook: A Designer\u2019s Companion. Standard Information Network","year":"2005","author":"O\u2019Hara","key":"ref79"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685918"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737463"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3154790"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1002\/9780470711750"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/SARNOF.2008.4520119"},{"volume-title":"Top 6 IoT Communication Protocols","year":"2020","key":"ref85"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.1997.85951"},{"volume-title":"Agilent E3238 Signal Intercept and Collection Solutions: Family Overview","year":"2004","key":"ref87"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2008.923653"},{"key":"ref89","article-title":"Conditional generative adversarial nets","author":"Mirza","year":"2014","journal-title":"arXiv:1411.1784"},{"key":"ref90","article-title":"Generative adversarial nets","volume-title":"Advances in Neural Information Processing Systems","volume":"27","author":"Goodfellow","year":"2014"},{"key":"ref91","article-title":"Efficient estimation of word representations in vector space","author":"Mikolov","year":"2013","journal-title":"arXiv:1301.3781"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/3440840.3440847"},{"key":"ref93","article-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014","journal-title":"arXiv:1412.6980"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-12053-4_12"},{"key":"ref96","article-title":"Collaborative learning for deep neural networks","author":"Guocong","year":"2018","journal-title":"arXiv:1805.11761"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/10206\/10319981\/10417054-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/10319981\/10417054.pdf?arnumber=10417054","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T01:32:30Z","timestamp":1710379950000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10417054\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":96,"URL":"https:\/\/doi.org\/10.1109\/tifs.2024.3360851","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2024]]}}}