{"id":"https://openalex.org/W4413392548","doi":"https://doi.org/10.1109/tifs.2025.3601397","title":"MRIS-SAD: Malicious RIS Spoofing Attack Detection Based on Hybrid Deep Autoencoder","display_name":"MRIS-SAD: Malicious RIS Spoofing Attack Detection Based on Hybrid Deep Autoencoder","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4413392548","doi":"https://doi.org/10.1109/tifs.2025.3601397"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2025.3601397","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3601397","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112683590","display_name":"Pengyu Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Pengyu Chen","raw_affiliation_strings":["College of Computer Science, Chongqing University, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101306303","display_name":"Long Jiao","orcid":"https://orcid.org/0009-0008-1367-5249"},"institutions":[{"id":"https://openalex.org/I100633361","display_name":"University of Massachusetts Dartmouth","ror":"https://ror.org/00fzmm222","country_code":"US","type":"education","lineage":["https://openalex.org/I100633361"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Long Jiao","raw_affiliation_strings":["Department of Computer and Information Science, University of Massachusetts Dartmouth, Dartmouth North, MA, USA","Department of Computer and Information Science, University of Massachusetts Dartmouth, North Dartmouth, MA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Science, University of Massachusetts Dartmouth, Dartmouth North, MA, USA","institution_ids":["https://openalex.org/I100633361"]},{"raw_affiliation_string":"Department of Computer and Information Science, University of Massachusetts Dartmouth, North Dartmouth, MA, USA","institution_ids":["https://openalex.org/I100633361"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100603261","display_name":"Ning Wang","orcid":"https://orcid.org/0000-0003-1381-7952"},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ning Wang","raw_affiliation_strings":["College of Computer Science, Chongqing University, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079461118","display_name":"Tao Xiang","orcid":"https://orcid.org/0000-0002-9439-4623"},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Xiang","raw_affiliation_strings":["College of Computer Science, Chongqing University, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I158842170"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5112683590"],"corresponding_institution_ids":["https://openalex.org/I158842170"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.28004213,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"20","issue":null,"first_page":"9343","last_page":"9356"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10751","display_name":"Forensic and Genetic Research","score":0.8745999932289124,"subfield":{"id":"https://openalex.org/subfields/1311","display_name":"Genetics"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},"topics":[{"id":"https://openalex.org/T10751","display_name":"Forensic and Genetic Research","score":0.8745999932289124,"subfield":{"id":"https://openalex.org/subfields/1311","display_name":"Genetics"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.8090999722480774,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.8827734589576721},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8122344017028809},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.7281906604766846},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5918306112289429},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4950982630252838},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48223432898521423},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.36313948035240173},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3303454518318176},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.2604072690010071}],"concepts":[{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.8827734589576721},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8122344017028809},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.7281906604766846},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5918306112289429},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4950982630252838},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48223432898521423},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.36313948035240173},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3303454518318176},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.2604072690010071}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3601397","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3601397","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4399999976158142,"display_name":"Climate action","id":"https://metadata.un.org/sdg/13"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W2036533317","https://openalex.org/W2115735006","https://openalex.org/W2592430333","https://openalex.org/W2606332932","https://openalex.org/W2743138268","https://openalex.org/W2776818420","https://openalex.org/W2787700610","https://openalex.org/W2791659887","https://openalex.org/W2978495917","https://openalex.org/W3009816315","https://openalex.org/W3014187232","https://openalex.org/W3016634017","https://openalex.org/W3033393151","https://openalex.org/W3035529916","https://openalex.org/W3036818015","https://openalex.org/W3047322466","https://openalex.org/W3062183366","https://openalex.org/W3120254830","https://openalex.org/W3121000819","https://openalex.org/W3123476713","https://openalex.org/W3172553205","https://openalex.org/W3207020621","https://openalex.org/W4206296593","https://openalex.org/W4226061238","https://openalex.org/W4250320454","https://openalex.org/W4285128464","https://openalex.org/W4285142094","https://openalex.org/W4313591198","https://openalex.org/W4317936092","https://openalex.org/W4322576964","https://openalex.org/W4323794388","https://openalex.org/W4385062305","https://openalex.org/W4387935021","https://openalex.org/W4389923921","https://openalex.org/W4392114339","https://openalex.org/W4393140585","https://openalex.org/W4394896997","https://openalex.org/W4401990779","https://openalex.org/W4402401867","https://openalex.org/W4402568261","https://openalex.org/W4405270682","https://openalex.org/W4407247086","https://openalex.org/W4409130030","https://openalex.org/W7084070418"],"related_works":["https://openalex.org/W3013693939","https://openalex.org/W2566616303","https://openalex.org/W2159052453","https://openalex.org/W3131327266","https://openalex.org/W2734887215","https://openalex.org/W2803255133","https://openalex.org/W4297051394","https://openalex.org/W2752972570","https://openalex.org/W4386815338","https://openalex.org/W4388934690"],"abstract_inverted_index":{"Reconfigurable":[0],"Intelligent":[1],"Surfaces":[2],"(RIS)":[3],"can":[4,37,125],"optimize":[5],"spectrum":[6],"and":[7,35,52,87,101,114,146],"energy":[8],"efficiency":[9],"in":[10],"the":[11,50,119,123,129,136,147],"sixth-generation":[12],"(6G)":[13],"wireless":[14,84],"communication":[15],"system":[16],"through":[17],"dynamic":[18,70],"electromagnetic":[19,27],"wave":[20],"manipulation.":[21],"The":[22,108],"programmable":[23],"control":[24],"of":[25,54,122,138],"spatial":[26],"signals":[28],"by":[29,41],"RIS":[30,115],"presents":[31],"a":[32,64,75],"double-edged":[33],"sword,":[34],"it":[36],"also":[38],"be":[39],"exploited":[40],"malicious":[42,56],"attackers.":[43],"However,":[44],"few":[45],"studies":[46],"have":[47],"focused":[48],"on":[49],"detection":[51,67],"identification":[53],"such":[55],"RIS.":[57],"To":[58],"fill":[59],"this":[60],"gap,":[61],"we":[62],"propose":[63],"novel":[65],"spoofing":[66],"framework":[68],"combining":[69],"key-embedded":[71],"phase":[72],"codebooks":[73],"with":[74],"dual-channel":[76],"feature":[77],"extraction":[78],"mechanism.":[79],"This":[80],"approach":[81],"jointly":[82],"decodes":[83],"channel":[85],"fingerprints":[86],"cryptographic":[88],"signatures":[89],"from":[90],"received":[91],"signals.":[92],"A":[93],"hybrid":[94],"discriminator,":[95],"integrating":[96],"autoencoder-based":[97],"signal":[98],"reconstruction":[99],"fidelity":[100],"key-matching":[102],"validation,":[103],"enables":[104],"robust":[105],"legitimacy":[106],"verification.":[107],"prototype":[109],"experiments":[110],"using":[111],"USRP":[112],"SDR":[113],"hardware":[116],"show":[117],"that":[118],"verification":[120],"accuracy":[121],"scheme":[124],"reach":[126],"100%,":[127],"when":[128],"signal-to-noise":[130],"ratio":[131],"(SNR)":[132],"is":[133,142,150],"above":[134],"10dB,":[135],"number":[137],"training":[139],"sample":[140],"points":[141],"more":[143],"than":[144],"128,":[145],"codebook":[148],"dimension":[149],"near":[151],"32.":[152]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
