{"id":"https://openalex.org/W2554122433","doi":"https://doi.org/10.1109/iscit.2016.7751691","title":"Channel sparse representation based authentication for reconciliation of key generation","display_name":"Channel sparse representation based authentication for reconciliation of key generation","publication_year":2016,"publication_date":"2016-09-01","ids":{"openalex":"https://openalex.org/W2554122433","doi":"https://doi.org/10.1109/iscit.2016.7751691","mag":"2554122433"},"language":"en","primary_location":{"id":"doi:10.1109/iscit.2016.7751691","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscit.2016.7751691","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 16th International Symposium on Communications and Information Technologies (ISCIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100603261","display_name":"Ning Wang","orcid":"https://orcid.org/0000-0003-1381-7952"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ning Wang","raw_affiliation_strings":["Wireless Communication Ministry of Education, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Wireless Communication Ministry of Education, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090606731","display_name":"Ting Jiang","orcid":"https://orcid.org/0000-0003-3598-3804"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ting Jiang","raw_affiliation_strings":["Wireless Communication Ministry of Education, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Wireless Communication Ministry of Education, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100766470","display_name":"Zheng Zhou","orcid":"https://orcid.org/0000-0003-3096-7530"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zheng Zhou","raw_affiliation_strings":["Wireless Communication Ministry of Education, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Wireless Communication Ministry of Education, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100603261"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":0.4285,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.79667767,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"54","issue":null,"first_page":"547","last_page":"550"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7529853582382202},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.614413857460022},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.6067285537719727},{"id":"https://openalex.org/keywords/sparse-approximation","display_name":"Sparse approximation","score":0.5784472227096558},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5716989040374756},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.5530133247375488},{"id":"https://openalex.org/keywords/signal-to-noise-ratio","display_name":"Signal-to-noise ratio (imaging)","score":0.5512493848800659},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4782637357711792},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.416969358921051},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.41296637058258057},{"id":"https://openalex.org/keywords/signal","display_name":"SIGNAL (programming language)","score":0.41282719373703003},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3800884485244751},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.35303276777267456},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.27890729904174805},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21099629998207092},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.15624025464057922},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1173979640007019}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7529853582382202},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.614413857460022},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.6067285537719727},{"id":"https://openalex.org/C124066611","wikidata":"https://www.wikidata.org/wiki/Q28684319","display_name":"Sparse approximation","level":2,"score":0.5784472227096558},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5716989040374756},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.5530133247375488},{"id":"https://openalex.org/C13944312","wikidata":"https://www.wikidata.org/wiki/Q7512748","display_name":"Signal-to-noise ratio (imaging)","level":2,"score":0.5512493848800659},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4782637357711792},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.416969358921051},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.41296637058258057},{"id":"https://openalex.org/C2779843651","wikidata":"https://www.wikidata.org/wiki/Q7390335","display_name":"SIGNAL (programming language)","level":2,"score":0.41282719373703003},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3800884485244751},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.35303276777267456},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.27890729904174805},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21099629998207092},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.15624025464057922},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1173979640007019},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscit.2016.7751691","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscit.2016.7751691","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 16th International Symposium on Communications and Information Technologies (ISCIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5299999713897705,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1919042217","https://openalex.org/W1976709621","https://openalex.org/W1980257057","https://openalex.org/W1995524702","https://openalex.org/W2053745611","https://openalex.org/W2056380775","https://openalex.org/W2093000415","https://openalex.org/W2109631601","https://openalex.org/W2112447569","https://openalex.org/W2160547390","https://openalex.org/W2161455567","https://openalex.org/W2397798400","https://openalex.org/W6663808841","https://openalex.org/W6676727762","https://openalex.org/W6712219031"],"related_works":["https://openalex.org/W1975289146","https://openalex.org/W2105887828","https://openalex.org/W2122599759","https://openalex.org/W4236520801","https://openalex.org/W1537234410","https://openalex.org/W2130187411","https://openalex.org/W1995022398","https://openalex.org/W2484602794","https://openalex.org/W2387058352","https://openalex.org/W2242172122"],"abstract_inverted_index":{"We":[0],"propose":[1],"a":[2],"novel":[3],"authentication":[4],"method":[5],"based":[6],"on":[7],"sparse":[8,27,67],"representation":[9,28],"for":[10],"the":[11,22,25,37,72,75,84,109],"reconciliation":[12,54],"in":[13,47],"physical":[14],"layer":[15],"key":[16],"Generation.":[17],"In":[18,42,69],"order":[19],"to":[20,31,44,81],"protect":[21],"legitimation":[23],"of":[24,65,74,94],"channel,":[26],"is":[29,56,79,99],"considered":[30],"enhance":[32],"wireless":[33],"security":[34],"by":[35],"using":[36],"unique":[38],"channel":[39,55],"location":[40],"information.":[41],"contrast":[43],"traditional":[45],"approaches,":[46],"this":[48,53,61,70,95],"paper,":[49],"we":[50,59],"consider":[51],"that":[52,108],"unauthentic,":[57],"and":[58,103],"formulate":[60],"problem":[62],"as":[63],"one":[64],"improved":[66],"representation.":[68],"scheme,":[71],"position":[73],"primary":[76],"decomposition":[77],"coefficients":[78],"adopted":[80],"ascertain":[82],"whether":[83],"signal":[85],"comes":[86],"from":[87],"legitimate":[88],"devices":[89],"or":[90],"not.":[91],"The":[92],"effectiveness":[93],"new":[96],"process":[97],"model":[98],"validated":[100],"through":[101],"experiments":[102],"simulations.":[104],"These":[105],"results":[106],"shown":[107],"proposed":[110],"scheme":[111],"can":[112],"achieve":[113],"desired":[114],"identification":[115],"performance":[116],"even":[117],"at":[118],"lower":[119],"signal-to-noise":[120],"ratio":[121],"(SNR).":[122]},"counts_by_year":[{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
