{"id":"https://openalex.org/W4229080651","doi":"https://doi.org/10.1145/3507657.3528542","title":"RRF","display_name":"RRF","publication_year":2022,"publication_date":"2022-05-07","ids":{"openalex":"https://openalex.org/W4229080651","doi":"https://doi.org/10.1145/3507657.3528542"},"language":"en","primary_location":{"id":"doi:10.1145/3507657.3528542","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3507657.3528542","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3507657.3528542","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3507657.3528542","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087024140","display_name":"Wenqing Yan","orcid":"https://orcid.org/0000-0003-3889-9579"},"institutions":[{"id":"https://openalex.org/I123387679","display_name":"Uppsala University","ror":"https://ror.org/048a87296","country_code":"SE","type":"education","lineage":["https://openalex.org/I123387679"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Wenqing Yan","raw_affiliation_strings":["Uppsala University, Uppsala, Sweden"],"affiliations":[{"raw_affiliation_string":"Uppsala University, Uppsala, Sweden","institution_ids":["https://openalex.org/I123387679"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071943253","display_name":"Thiemo Voigt","orcid":"https://orcid.org/0000-0002-2586-8573"},"institutions":[{"id":"https://openalex.org/I123387679","display_name":"Uppsala University","ror":"https://ror.org/048a87296","country_code":"SE","type":"education","lineage":["https://openalex.org/I123387679"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Thiemo Voigt","raw_affiliation_strings":["Uppsala University, Uppsala, Sweden"],"affiliations":[{"raw_affiliation_string":"Uppsala University, Uppsala, Sweden","institution_ids":["https://openalex.org/I123387679"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004373489","display_name":"Christian Rohner","orcid":"https://orcid.org/0000-0002-1527-734X"},"institutions":[{"id":"https://openalex.org/I123387679","display_name":"Uppsala University","ror":"https://ror.org/048a87296","country_code":"SE","type":"education","lineage":["https://openalex.org/I123387679"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Christian Rohner","raw_affiliation_strings":["Uppsala University, Uppsala, Sweden"],"affiliations":[{"raw_affiliation_string":"Uppsala University, Uppsala, Sweden","institution_ids":["https://openalex.org/I123387679"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5087024140"],"corresponding_institution_ids":["https://openalex.org/I123387679"],"apc_list":null,"apc_paid":null,"fwci":2.231,"has_fulltext":true,"cited_by_count":15,"citation_normalized_percentile":{"value":0.87687511,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"85","last_page":"97"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.987500011920929,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.987500011920929,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9842000007629395,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.978600025177002,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7414181232452393},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.7163151502609253},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5360017418861389},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.5254998207092285},{"id":"https://openalex.org/keywords/multipath-propagation","display_name":"Multipath propagation","score":0.5162762999534607},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.49771955609321594},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4720997214317322},{"id":"https://openalex.org/keywords/fading","display_name":"Fading","score":0.4296354651451111},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.37867897748947144},{"id":"https://openalex.org/keywords/electronic-engineering","display_name":"Electronic engineering","score":0.3420772850513458},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2703630328178406},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.17866265773773193},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.13971757888793945},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.13694289326667786}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7414181232452393},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.7163151502609253},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5360017418861389},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.5254998207092285},{"id":"https://openalex.org/C161218011","wikidata":"https://www.wikidata.org/wiki/Q11827794","display_name":"Multipath propagation","level":3,"score":0.5162762999534607},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.49771955609321594},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4720997214317322},{"id":"https://openalex.org/C81978471","wikidata":"https://www.wikidata.org/wiki/Q1196572","display_name":"Fading","level":3,"score":0.4296354651451111},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.37867897748947144},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.3420772850513458},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2703630328178406},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.17866265773773193},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.13971757888793945},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.13694289326667786},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3507657.3528542","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3507657.3528542","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3507657.3528542","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},{"id":"pmh:oai:DiVA.org:uu-488880","is_oa":true,"landing_page_url":"http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-488880","pdf_url":null,"source":{"id":"https://openalex.org/S4306401559","display_name":"KTH Publication Database DiVA (KTH Royal Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference paper"}],"best_oa_location":{"id":"doi:10.1145/3507657.3528542","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3507657.3528542","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3507657.3528542","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320320940","display_name":"Stiftelsen f\u00f6r\u00a0Strategisk Forskning","ror":"https://ror.org/044wr7g58"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4229080651.pdf","grobid_xml":"https://content.openalex.org/works/W4229080651.grobid-xml"},"referenced_works_count":27,"referenced_works":["https://openalex.org/W37708147","https://openalex.org/W595252221","https://openalex.org/W1162090796","https://openalex.org/W1874399837","https://openalex.org/W1971438559","https://openalex.org/W1975449922","https://openalex.org/W2012166391","https://openalex.org/W2094192676","https://openalex.org/W2108139215","https://openalex.org/W2163363194","https://openalex.org/W2184340044","https://openalex.org/W2317978897","https://openalex.org/W2755087487","https://openalex.org/W2791256362","https://openalex.org/W2938144699","https://openalex.org/W2963580435","https://openalex.org/W2971392577","https://openalex.org/W2984025449","https://openalex.org/W3165855972","https://openalex.org/W4230809509","https://openalex.org/W4237276539","https://openalex.org/W4244286740","https://openalex.org/W4249359494","https://openalex.org/W4249888970","https://openalex.org/W4255078180","https://openalex.org/W4388867283","https://openalex.org/W4401693406"],"related_works":["https://openalex.org/W2376969857","https://openalex.org/W207732638","https://openalex.org/W2112962431","https://openalex.org/W2163290991","https://openalex.org/W2361184779","https://openalex.org/W2474386553","https://openalex.org/W2125329004","https://openalex.org/W3174961728","https://openalex.org/W2141752560","https://openalex.org/W2067130749"],"abstract_inverted_index":{"Radiometric":[0],"fingerprint":[1,21,56],"schemes":[2],"have":[3],"been":[4],"shown":[5],"effective":[6],"in":[7,14,36,58,131,150,169],"identifying":[8],"wireless":[9,44,98],"devices":[10],"based":[11],"on":[12,47,65,70,137],"imperfections":[13],"their":[15,34],"hardware":[16],"electronics.":[17],"The":[18],"robustness":[19],"of":[20,114,129],"systems":[22],"under":[23,85],"complex":[24,86,173],"channel":[25,54,87,99,116,125],"conditions,":[26],"however,":[27],"is":[28],"a":[29,59,76,80,93,112,141],"critical":[30],"challenge":[31],"that":[32,52,63,78,96,160],"makes":[33],"application":[35],"real-world":[37],"scenarios":[38,171],"difficult.":[39],"We":[40],"systematically":[41],"evaluate":[42],"the":[43,53,66,71,132,147,176],"channel's":[45,67],"impact":[46],"radiometric":[48],"fingerprints":[49],"and":[50,103,140],"find":[51],"impacts":[55],"features":[57],"very":[60],"particular":[61],"way":[62],"depends":[64],"properties.":[68],"Based":[69],"insights,":[72],"we":[73],"present":[74],"RRF,":[75],"system":[77,121],"provides":[79],"robust":[81],"identification/authentication":[82],"service":[83],"even":[84],"fading":[88],"disturbance.":[89],"Our":[90,156],"design":[91],"deploys":[92],"hybrid":[94],"architecture":[95],"combines":[97],"simulation,":[100],"signal":[101],"processing":[102],"machine":[104],"learning.":[105],"In":[106],"this":[107],"pipeline,":[108],"RRF":[109,135,161],"first":[110],"utilizes":[111],"series":[113],"structured":[115],"simulations":[117],"to":[118,145],"strategically":[119],"improve":[120],"tolerance":[122],"towards":[123],"multipath":[124],"interference.":[126],"On":[127],"top":[128],"that,":[130],"identification":[133],"phase,":[134],"relies":[136],"noise":[138],"compensation":[139],"feature":[142],"denoising":[143],"filter":[144],"augment":[146],"system's":[148],"stability":[149],"noisy":[151],"conditions":[152],"with":[153,172],"weak":[154],"signals.":[155],"experimental":[157],"results":[158],"show":[159],"achieves":[162],"an":[163],"average":[164],"accuracy":[165],"consistently":[166],"above":[167],"99%":[168],"empirical":[170],"channels,":[174],"where":[175],"baseline":[177],"approach":[178],"from":[179],"previous":[180],"work":[181],"rarely":[182],"exceeds":[183],"50%.":[184]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2022-05-08T00:00:00"}
