{"id":"https://openalex.org/W4387869720","doi":"https://doi.org/10.1109/icc45041.2023.10278673","title":"Non-Inducible RF Fingerprint Hiding via Feature Perturbation","display_name":"Non-Inducible RF Fingerprint Hiding via Feature Perturbation","publication_year":2023,"publication_date":"2023-05-28","ids":{"openalex":"https://openalex.org/W4387869720","doi":"https://doi.org/10.1109/icc45041.2023.10278673"},"language":"en","primary_location":{"id":"doi:10.1109/icc45041.2023.10278673","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc45041.2023.10278673","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2023 - IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065289674","display_name":"Zhaoyi Lu","orcid":"https://orcid.org/0000-0003-4096-3322"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhaoyi Lu","raw_affiliation_strings":["School of Cyber Science and Engineering, Shanghai Jiao Tong University,Shanghai,China","School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Shanghai Jiao Tong University,Shanghai,China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108903744","display_name":"Jiazhong Bao","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiazhong Bao","raw_affiliation_strings":["School of Cyber Science and Engineering, Shanghai Jiao Tong University,Shanghai,China","School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Shanghai Jiao Tong University,Shanghai,China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101509697","display_name":"Xin Xie","orcid":"https://orcid.org/0000-0002-0945-969X"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Xie","raw_affiliation_strings":["School of Cyber Science and Engineering, Shanghai Jiao Tong University,Shanghai,China","School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Shanghai Jiao Tong University,Shanghai,China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063181504","display_name":"Wenchao Xu","orcid":"https://orcid.org/0000-0003-0983-387X"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Wenchao Xu","raw_affiliation_strings":["The Hong Kong Polytechnic University,Department of Computing,Hong Kong,China","Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"The Hong Kong Polytechnic University,Department of Computing,Hong Kong,China","institution_ids":["https://openalex.org/I14243506"]},{"raw_affiliation_string":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044004251","display_name":"Cunqing Hua","orcid":"https://orcid.org/0000-0003-0243-805X"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cunqing Hua","raw_affiliation_strings":["School of Cyber Science and Engineering, Shanghai Jiao Tong University,Shanghai,China","School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Shanghai Jiao Tong University,Shanghai,China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5065289674"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":0.5245,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.72046347,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"2388","last_page":"2393"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.988099992275238,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9858999848365784,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/preamble","display_name":"Preamble","score":0.7762027382850647},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7610955238342285},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.7257871627807617},{"id":"https://openalex.org/keywords/fingerprint-recognition","display_name":"Fingerprint recognition","score":0.6783173680305481},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.4985768795013428},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.492856502532959},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4571315050125122},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.44740724563598633},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.4388645887374878},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3742328882217407},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.324454665184021},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24431651830673218},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.16483643651008606},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.12791776657104492}],"concepts":[{"id":"https://openalex.org/C2780691134","wikidata":"https://www.wikidata.org/wiki/Q1129448","display_name":"Preamble","level":3,"score":0.7762027382850647},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7610955238342285},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.7257871627807617},{"id":"https://openalex.org/C168406668","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Fingerprint recognition","level":3,"score":0.6783173680305481},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.4985768795013428},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.492856502532959},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4571315050125122},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.44740724563598633},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.4388645887374878},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3742328882217407},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.324454665184021},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24431651830673218},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.16483643651008606},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.12791776657104492},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icc45041.2023.10278673","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc45041.2023.10278673","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2023 - IEEE International Conference on Communications","raw_type":"proceedings-article"},{"id":"pmh:oai:repository.hkust.edu.hk:1783.1-149634","is_oa":false,"landing_page_url":"http://repository.hkust.edu.hk/ir/Record/1783.1-149634","pdf_url":null,"source":{"id":"https://openalex.org/S4306401796","display_name":"Rare & Special e-Zone (The Hong Kong University of Science and Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I200769079","host_organization_name":"Hong Kong University of Science and Technology","host_organization_lineage":["https://openalex.org/I200769079"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference paper"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6899999976158142,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G1385369021","display_name":null,"funder_award_id":"62171278,62101327,UGC/IDS(R)11/19","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8498936045","display_name":null,"funder_award_id":"2020YFB1807504,2022YFB2702302","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W783893065","https://openalex.org/W1614669719","https://openalex.org/W1673923490","https://openalex.org/W1945616565","https://openalex.org/W2108139215","https://openalex.org/W2155886813","https://openalex.org/W2765424254","https://openalex.org/W2963542245","https://openalex.org/W3047279638","https://openalex.org/W3048094199","https://openalex.org/W3103557498","https://openalex.org/W3135656071","https://openalex.org/W3138207087","https://openalex.org/W3181667991","https://openalex.org/W3199812977","https://openalex.org/W3213282580","https://openalex.org/W4214569028","https://openalex.org/W4229368087","https://openalex.org/W6637162671","https://openalex.org/W6640425456","https://openalex.org/W6778082255"],"related_works":["https://openalex.org/W3056434754","https://openalex.org/W3014822659","https://openalex.org/W4362496757","https://openalex.org/W2051501574","https://openalex.org/W2117826006","https://openalex.org/W2050967184","https://openalex.org/W2566091814","https://openalex.org/W2114937328","https://openalex.org/W2148654711","https://openalex.org/W2608025327"],"abstract_inverted_index":{"Machine":[0],"learning":[1,108],"mechanisms":[2],"are":[3,196],"applied":[4],"to":[5,95,120,130,169,188],"detect":[6],"the":[7,11,24,32,54,58,67,97,100,111,116,122,131,136,142,150,159,176,185,191,202,208,213,218,226,235],"unique":[8,55],"characteristics":[9],"of":[10,57,152,173,234],"wireless":[12],"interface":[13],"or":[14],"signaler":[15],"that":[16,133,201],"can":[17,40,134,205],"distinguish":[18],"one":[19,220],"device's":[20,101,192],"signal":[21,60],"pattern":[22],"from":[23,61,81,110,211,221],"others,":[25],"which":[26,229],"has":[27],"been":[28],"widely":[29],"researched":[30],"as":[31,53],"fingerprint":[33,98,215],"for":[34,44],"user":[35],"identification.":[36],"However,":[37],"such":[38,82],"fingerprinting":[39,123,172],"also":[41],"be":[42,73,104],"used":[43],"malicious":[45],"purposes,":[46],"i.e.,":[47],"identification":[48,102,160,210],"tracking,":[49],"undesired":[50],"positioning,":[51],"etc.,":[52],"features":[56],"radio":[59,83],"a":[62,231],"device":[63,209],"is":[64],"determined":[65],"at":[66,155],"manufacturing":[68],"stage":[69],"and":[70,148,198,217],"often":[71],"cannot":[72,103],"easily":[74],"removed":[75],"afterward.":[76],"To":[77,140],"prevent":[78,170],"privacy":[79],"leakage":[80],"frequency":[84],"(RF)":[85],"fingerprinting,":[86],"in":[87],"this":[88],"paper,":[89],"we":[90,114,157,180,199],"propose":[91],"an":[92],"adversarial":[93,117,128,143],"mechanism":[94],"hide":[96,190,207],"whereby":[99],"induced":[105],"by":[106,125],"machine":[107],"models":[109],"preamble.":[112],"Specially,":[113],"apply":[115],"attack":[118,121],"method":[119,183,204],"model":[124,137,216],"adding":[126],"optimized":[127],"perturbation":[129],"preamble":[132,227],"mislead":[135],"classification":[138],"results.":[139],"alleviate":[141],"sample's":[144],"impact":[145],"on":[146],"communications":[147],"ensure":[149],"execution":[151],"packet":[153],"detection":[154],"receivers,":[156],"improve":[158],"protection":[161],"strategy":[162],"with":[163,184],"sparse":[164],"perturbed":[165,177,222],"features.":[166],"In":[167],"order":[168],"further":[171,189],"re-training":[174],"over":[175],"RF":[178],"feature,":[179],"extend":[181],"our":[182],"time-varying":[186],"perturbations":[187],"identity.":[193],"Extensive":[194],"experiments":[195],"conducted,":[197],"show":[200],"proposed":[203,236],"effectively":[206],"both":[212],"dedicated":[214],"re-trained":[219],"signals":[223],"without":[224],"disturbing":[225],"functionality,":[228],"provides":[230],"gratifying":[232],"confirmation":[233],"method.":[237]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
