{"id":"https://openalex.org/W3047116099","doi":"https://doi.org/10.1109/tnse.2020.3013232","title":"Online Learning Aided Adaptive Multiple Attribute-Based Physical Layer Authentication in Dynamic Environments","display_name":"Online Learning Aided Adaptive Multiple Attribute-Based Physical Layer Authentication in Dynamic Environments","publication_year":2020,"publication_date":"2020-08-03","ids":{"openalex":"https://openalex.org/W3047116099","doi":"https://doi.org/10.1109/tnse.2020.3013232","mag":"3047116099"},"language":"en","primary_location":{"id":"doi:10.1109/tnse.2020.3013232","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2020.3013232","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108614594","display_name":"Xinyu Yin","orcid":null},"institutions":[{"id":"https://openalex.org/I4210164386","display_name":"Hebei Science and Technology Department","ror":"https://ror.org/05k812a28","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210164386"]},{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xinyu Yin","raw_affiliation_strings":["Department of Electronics and Information Engineering, Harbin Institute of Technology, Harbin, China","Science and Technology on Communication Networks Laboratory, Shijiazhuang, China"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Information Engineering, Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]},{"raw_affiliation_string":"Science and Technology on Communication Networks Laboratory, Shijiazhuang, China","institution_ids":["https://openalex.org/I4210164386"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060865895","display_name":"Xiaojie Fang","orcid":"https://orcid.org/0000-0003-3337-2241"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]},{"id":"https://openalex.org/I4210164386","display_name":"Hebei Science and Technology Department","ror":"https://ror.org/05k812a28","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210164386"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaojie Fang","raw_affiliation_strings":["Department of Electronics and Information Engineering, Harbin Institute of Technology, Harbin, China","Science and Technology on Communication Networks Laboratory, Shijiazhuang, China"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Information Engineering, Harbin Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]},{"raw_affiliation_string":"Science and Technology on Communication Networks Laboratory, Shijiazhuang, China","institution_ids":["https://openalex.org/I4210164386"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100404886","display_name":"Ning Zhang","orcid":"https://orcid.org/0000-0002-8781-4925"},"institutions":[{"id":"https://openalex.org/I74413500","display_name":"University of Windsor","ror":"https://ror.org/01gw3d370","country_code":"CA","type":"education","lineage":["https://openalex.org/I74413500"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Ning Zhang","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Windsor, Windsor, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Windsor, Windsor, ON, Canada","institution_ids":["https://openalex.org/I74413500"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039532881","display_name":"Peng Yang","orcid":"https://orcid.org/0000-0001-8964-0597"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peng Yang","raw_affiliation_strings":["School of Electronic Information and Communications, Huazhong University of Science and Technology, Hubei, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information and Communications, Huazhong University of Science and Technology, Hubei, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083179738","display_name":"Xuejun Sha","orcid":"https://orcid.org/0000-0002-6204-0839"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuejun Sha","raw_affiliation_strings":["Department of Electronics and Information Engineering, Institute of Technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Information Engineering, Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065146976","display_name":"Jinghui Qiu","orcid":"https://orcid.org/0000-0002-1133-2380"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinghui Qiu","raw_affiliation_strings":["Department of Electronics and Information Engineering, Institute of Technology, Harbin, China"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Information Engineering, Institute of Technology, Harbin, China","institution_ids":["https://openalex.org/I204983213"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5108614594"],"corresponding_institution_ids":["https://openalex.org/I204983213","https://openalex.org/I4210164386"],"apc_list":null,"apc_paid":null,"fwci":0.822,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.72574584,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"8","issue":"2","first_page":"1106","last_page":"1116"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8407924175262451},{"id":"https://openalex.org/keywords/phy","display_name":"PHY","score":0.7675566673278809},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.7224581837654114},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5331904888153076},{"id":"https://openalex.org/keywords/application-layer","display_name":"Application layer","score":0.5062905550003052},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4775172770023346},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4637252688407898},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4187549352645874},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.1981237232685089},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.18037834763526917},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14416295289993286}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8407924175262451},{"id":"https://openalex.org/C41918916","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"PHY","level":4,"score":0.7675566673278809},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.7224581837654114},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5331904888153076},{"id":"https://openalex.org/C190793597","wikidata":"https://www.wikidata.org/wiki/Q189768","display_name":"Application layer","level":3,"score":0.5062905550003052},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4775172770023346},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4637252688407898},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4187549352645874},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.1981237232685089},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.18037834763526917},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14416295289993286},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnse.2020.3013232","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2020.3013232","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3722823188","display_name":null,"funder_award_id":"2019M650067","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G5449968737","display_name":null,"funder_award_id":"61901140","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6121147698","display_name":null,"funder_award_id":"254","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1565176535","https://openalex.org/W1957358593","https://openalex.org/W1970157653","https://openalex.org/W1995524702","https://openalex.org/W2024304958","https://openalex.org/W2071798481","https://openalex.org/W2100909350","https://openalex.org/W2101371787","https://openalex.org/W2154170045","https://openalex.org/W2168405694","https://openalex.org/W2185823609","https://openalex.org/W2295984818","https://openalex.org/W2335670295","https://openalex.org/W2344173564","https://openalex.org/W2509004749","https://openalex.org/W2585026988","https://openalex.org/W2601836945","https://openalex.org/W2621968521","https://openalex.org/W2735680672","https://openalex.org/W2765739766","https://openalex.org/W2776486137","https://openalex.org/W2776818420","https://openalex.org/W2808669017","https://openalex.org/W2887906137","https://openalex.org/W2892077825","https://openalex.org/W2895216609","https://openalex.org/W2963580435","https://openalex.org/W2963910109","https://openalex.org/W2968774960","https://openalex.org/W2969468102","https://openalex.org/W2981735416","https://openalex.org/W3105108969","https://openalex.org/W6686689322"],"related_works":["https://openalex.org/W2945523224","https://openalex.org/W4313639042","https://openalex.org/W2444418218","https://openalex.org/W2727597159","https://openalex.org/W4241709719","https://openalex.org/W1488909492","https://openalex.org/W4234133302","https://openalex.org/W2111773294","https://openalex.org/W2774037455","https://openalex.org/W1858159341"],"abstract_inverted_index":{"Exploiting":[0],"physical":[1],"(PHY)-layer":[2],"characteristics":[3],"for":[4,13,37],"authentication":[5,35,139],"has":[6],"great":[7],"potential":[8],"to":[9,62,108,133],"provision":[10],"underlying":[11],"trust":[12],"low-ended":[14],"Internet":[15],"of":[16,42,68,84,96,112,143,196],"things":[17],"(IoT)":[18],"devices":[19],"with":[20,49],"limited":[21],"computation":[22],"resources.":[23],"In":[24],"this":[25],"paper,":[26],"we":[27],"propose":[28],"an":[29,161],"online":[30],"learning":[31,120,170],"aided":[32,103],"adaptive":[33,110],"PHY-layer":[34,47,53,69,76,116],"framework":[36],"enhanced":[38],"authenticity":[39,123],"provisioning.":[40],"Instead":[41],"relying":[43],"on":[44,75],"some":[45],"preset":[46],"signatures":[48,77],"scenario-sensitive":[50],"\u201cthresholds,\u201d":[51],"multiple":[52],"attributes":[54,129],"are":[55,106,131,179],"jointly":[56],"considered":[57],"by":[58,157],"the":[59,64,81,91,97,113,128,138,158,168,194,197],"proposed":[60,169,198],"scheme":[61],"improve":[63],"reliability":[65],"and":[66,93,148],"robustness":[67],"authentication.":[70],"Such":[71],"a":[72,188],"dimension":[73],"extension":[74],"can":[78],"effectively":[79],"deteriorate":[80],"spoofing":[82],"capability":[83],"malicious":[85],"attackers.":[86],"However,":[87],"it":[88],"also":[89],"complicates":[90],"predicting":[92],"authenticating":[94],"procedure":[95],"legitimate":[98],"receiver.":[99],"Therefore,":[100],"artificial":[101],"intelligence":[102],"search":[104],"algorithms":[105],"formulated":[107],"facilitate":[109],"selection":[111],"Most":[114],"Effective":[115],"Attributes":[117],"(MEA)":[118],"through":[119],"their":[121],"historical":[122],"performance.":[124],"To":[125],"be":[126,134,154],"specific,":[127],"which":[130,191],"predicted":[132],"effective":[135],"in":[136,141,160,187],"maximizing":[137],"capability,":[140],"terms":[142],"low":[144,149],"false":[145],"alarm":[146],"rate":[147],"miss":[150],"detection":[151],"rate,":[152],"will":[153],"dynamically":[155],"selected":[156],"authenticator":[159],"autonomous":[162],"manner.":[163],"Theoretical":[164],"analysis":[165],"shows":[166],"that":[167],"algorithm":[171],"achieves":[172],"asymptotically":[173],"diminishing":[174],"regret.":[175],"Moreover,":[176],"extensive":[177],"experiments":[178],"conducted":[180],"using":[181],"Universal":[182],"Software":[183],"Radio":[184],"Peripherals":[185],"(USRPs)":[186],"laboratory":[189],"environment,":[190],"further":[192],"validates":[193],"efficiency":[195],"scheme.":[199]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
