{"id":"https://openalex.org/W4398131527","doi":"https://doi.org/10.1145/3643833.3656138","title":"No Blind Spots: On the Resiliency of Device Fingerprints to Hardware Warm-Up Through Sequential Transfer Learning","display_name":"No Blind Spots: On the Resiliency of Device Fingerprints to Hardware Warm-Up Through Sequential Transfer Learning","publication_year":2024,"publication_date":"2024-05-20","ids":{"openalex":"https://openalex.org/W4398131527","doi":"https://doi.org/10.1145/3643833.3656138"},"language":"en","primary_location":{"id":"doi:10.1145/3643833.3656138","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3643833.3656138","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3643833.3656138","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045271717","display_name":"Abdurrahman Elmaghbub","orcid":"https://orcid.org/0000-0003-3704-6056"},"institutions":[{"id":"https://openalex.org/I131249849","display_name":"Oregon State University","ror":"https://ror.org/00ysfqy60","country_code":"US","type":"education","lineage":["https://openalex.org/I131249849"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Abdurrahman Elmaghbub","raw_affiliation_strings":["Oregon State University, Corvallis, OR, USA"],"affiliations":[{"raw_affiliation_string":"Oregon State University, Corvallis, OR, USA","institution_ids":["https://openalex.org/I131249849"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020197513","display_name":"Bechir Hamdaoui","orcid":"https://orcid.org/0000-0002-6085-4505"},"institutions":[{"id":"https://openalex.org/I131249849","display_name":"Oregon State University","ror":"https://ror.org/00ysfqy60","country_code":"US","type":"education","lineage":["https://openalex.org/I131249849"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bechir Hamdaoui","raw_affiliation_strings":["Oregon State University, Corvallis, OR, USA"],"affiliations":[{"raw_affiliation_string":"Oregon State University, Corvallis, OR, USA","institution_ids":["https://openalex.org/I131249849"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5045271717"],"corresponding_institution_ids":["https://openalex.org/I131249849"],"apc_list":null,"apc_paid":null,"fwci":1.7075,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.86066954,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"134","last_page":"144"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12791","display_name":"Full-Duplex Wireless Communications","score":0.970300018787384,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10187","display_name":"Radio Frequency Integrated Circuit Design","score":0.9487000107765198,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7584201097488403},{"id":"https://openalex.org/keywords/transfer-of-learning","display_name":"Transfer of learning","score":0.5955844521522522},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.5389536023139954},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.5347470641136169},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5320836901664734},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.5183507204055786},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.46018725633621216},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4573483169078827},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.42626190185546875},{"id":"https://openalex.org/keywords/transfer","display_name":"Transfer (computing)","score":0.4158386290073395},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.38187623023986816},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3782462179660797},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1511465609073639}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7584201097488403},{"id":"https://openalex.org/C150899416","wikidata":"https://www.wikidata.org/wiki/Q1820378","display_name":"Transfer of learning","level":2,"score":0.5955844521522522},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.5389536023139954},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.5347470641136169},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5320836901664734},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.5183507204055786},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.46018725633621216},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4573483169078827},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.42626190185546875},{"id":"https://openalex.org/C2776175482","wikidata":"https://www.wikidata.org/wiki/Q1195816","display_name":"Transfer (computing)","level":2,"score":0.4158386290073395},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.38187623023986816},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3782462179660797},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1511465609073639},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3643833.3656138","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3643833.3656138","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3643833.3656138","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3643833.3656138","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.4699999988079071,"display_name":"Climate action","id":"https://metadata.un.org/sdg/13"}],"awards":[{"id":"https://openalex.org/G6034437767","display_name":null,"funder_award_id":"2003273","funder_id":"https://openalex.org/F4320323817","funder_display_name":"Universitas Brawijaya"}],"funders":[{"id":"https://openalex.org/F4320323817","display_name":"Universitas Brawijaya","ror":"https://ror.org/01wk3d929"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2123670273","https://openalex.org/W2418241189","https://openalex.org/W2903139904","https://openalex.org/W2953958347","https://openalex.org/W2982145123","https://openalex.org/W3015448029","https://openalex.org/W3047279638","https://openalex.org/W3104381518","https://openalex.org/W3172135703","https://openalex.org/W3206629225","https://openalex.org/W4214569028","https://openalex.org/W4225730496","https://openalex.org/W4229080651","https://openalex.org/W4285103009","https://openalex.org/W4308655556","https://openalex.org/W4309374915","https://openalex.org/W4386255995"],"related_works":["https://openalex.org/W4206357785","https://openalex.org/W4281381188","https://openalex.org/W2951211570","https://openalex.org/W3192840557","https://openalex.org/W4375928479","https://openalex.org/W3167935049","https://openalex.org/W3023427754","https://openalex.org/W3131673289","https://openalex.org/W4393011546","https://openalex.org/W3198847674"],"abstract_inverted_index":{"Deep":[0],"Learning-based":[1],"RF":[2,51,60,143],"fingerprinting":[3,61,144],"has":[4],"emerged":[5],"as":[6],"a":[7,69,125,141,175],"game-changer":[8],"for":[9,147],"offering":[10],"robust":[11],"network":[12],"device":[13,114],"authentication":[14],"and":[15,63,76,156,180],"identification":[16],"solutions.":[17,37,187],"However,":[18],"it":[19],"struggles":[20],"in":[21,58],"cross-time":[22],"scenarios,":[23],"particularly":[24],"during":[25,62,91,109],"hardware":[26,65,158,171],"warm-up":[27,93,131],"phases.":[28,94],"This":[29,163],"often-overlooked":[30],"vulnerability":[31],"jeopardizes":[32],"the":[33,48,110,134,148,153,161,166,182],"reliability":[34],"of":[35,50,105,113,160,168,178,184],"these":[36,82],"In":[38],"response":[39],"to":[40,107],"this":[41],"critical":[42],"gap,":[43],"we":[44,80,139],"dive":[45],"deep":[46],"into":[47,55],"anatomy":[49],"fingerprints,":[52],"revealing":[53],"insights":[54],"temporal":[56],"variations":[57],"DL-based":[59],"post":[64],"stabilization.":[66],"Introducing":[67],"HEEDFUL,":[68],"novel":[70],"framework":[71],"harnessing":[72],"sequential":[73],"transfer":[74],"learning":[75],"targeted":[77],"impairment":[78,172],"estimation,":[79],"address":[81],"challenges":[83],"with":[84],"remarkable":[85,102],"consistency,":[86],"eliminating":[87],"blind":[88],"spots":[89],"even":[90],"challenging":[92],"Our":[95],"extensive":[96],"evaluation":[97],"showcases":[98],"HEEDFUL's":[99,122],"efficacy,":[100],"achieving":[101,124],"classification":[103,128],"accuracies":[104],"up":[106],"96%":[108],"initial":[111],"intervals":[112,132],"operation-far":[115],"surpassing":[116],"traditional":[117],"models.":[118],"Cross-domain":[119],"assessments":[120],"confirm":[121],"superiority,":[123],"steady":[126],"87%":[127],"accuracy":[129],"across":[130],"on":[133],"Day":[135],"2":[136],"dataset.":[137],"Additionally,":[138],"release":[140],"WiFi":[142],"dataset":[145],"that,":[146],"first":[149],"time,":[150],"incorporates":[151],"both":[152],"time-domain":[154],"representation":[155],"real":[157],"impairments":[159],"frames.":[162],"inclusion":[164],"underscores":[165],"importance":[167],"leveraging":[169],"actual":[170],"data,":[173],"enabling":[174],"deeper":[176],"understanding":[177],"fingerprints":[179],"facilitating":[181],"development":[183],"more":[185],"resilient":[186]},"counts_by_year":[{"year":2025,"cited_by_count":5}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
