{"id":"https://openalex.org/W7117976989","doi":"https://doi.org/10.54364/aaiml.2025.54264","title":"Detecting Wireless Relay Attacks in NFC Using Deep-Learning","display_name":"Detecting Wireless Relay Attacks in NFC Using Deep-Learning","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W7117976989","doi":"https://doi.org/10.54364/aaiml.2025.54264"},"language":null,"primary_location":{"id":"doi:10.54364/aaiml.2025.54264","is_oa":true,"landing_page_url":"https://doi.org/10.54364/aaiml.2025.54264","pdf_url":"https://doi.org/10.54364/aaiml.2025.54264","source":{"id":"https://openalex.org/S4210238872","display_name":"Advances in Artificial Intelligence and Machine Learning","issn_l":"2582-9793","issn":["2582-9793"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Advances in Artificial Intelligence and Machine Learning","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://doi.org/10.54364/aaiml.2025.54264","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5121833308","display_name":"Asia Othman Aljahdali","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Asia Othman Aljahdali","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121789806","display_name":"Maria Jawah","orcid":null},"institutions":[{"id":"https://openalex.org/I4210099699","display_name":"University of Jeddah","ror":"https://ror.org/015ya8798","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210099699"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Maria Jawah","raw_affiliation_strings":["Cybersecurity Department University of Jeddah Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Cybersecurity Department University of Jeddah Saudi Arabia","institution_ids":["https://openalex.org/I4210099699"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121832326","display_name":"Jana Bakhalqi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jana Bakhalqi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5121752012","display_name":"Talah Fairaq","orcid":null},"institutions":[{"id":"https://openalex.org/I4210099699","display_name":"University of Jeddah","ror":"https://ror.org/015ya8798","country_code":"SA","type":"education","lineage":["https://openalex.org/I4210099699"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Talah Fairaq","raw_affiliation_strings":["Cybersecurity Department University of Jeddah Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Cybersecurity Department University of Jeddah Saudi Arabia","institution_ids":["https://openalex.org/I4210099699"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5121833308"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.7056563,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"05","issue":"04","first_page":"4765","last_page":"4765"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.5562000274658203,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.5562000274658203,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.3357999920845032,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10326","display_name":"Indoor and Outdoor Localization Technologies","score":0.022700000554323196,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/relay","display_name":"Relay","score":0.6741999983787537},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.49790000915527344},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4697999954223633},{"id":"https://openalex.org/keywords/sensitivity","display_name":"Sensitivity (control systems)","score":0.4690000116825104},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.46320000290870667},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.4496000111103058},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.40459999442100525},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.39469999074935913}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.708299994468689},{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.6741999983787537},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.49790000915527344},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4697999954223633},{"id":"https://openalex.org/C21200559","wikidata":"https://www.wikidata.org/wiki/Q7451068","display_name":"Sensitivity (control systems)","level":2,"score":0.4690000116825104},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.46320000290870667},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.4496000111103058},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4097999930381775},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.40459999442100525},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.39469999074935913},{"id":"https://openalex.org/C175604262","wikidata":"https://www.wikidata.org/wiki/Q273353","display_name":"Near field communication","level":3,"score":0.3833000063896179},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3691999912261963},{"id":"https://openalex.org/C2779843651","wikidata":"https://www.wikidata.org/wiki/Q7390335","display_name":"SIGNAL (programming language)","level":2,"score":0.3637999892234802},{"id":"https://openalex.org/C100660578","wikidata":"https://www.wikidata.org/wiki/Q18733","display_name":"Recall","level":2,"score":0.35109999775886536},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.3073999881744385},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.289000004529953},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.2809000015258789},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.28060001134872437},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.27070000767707825},{"id":"https://openalex.org/C171115542","wikidata":"https://www.wikidata.org/wiki/Q1331892","display_name":"Software-defined radio","level":2,"score":0.2687000036239624},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.26249998807907104}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.54364/aaiml.2025.54264","is_oa":true,"landing_page_url":"https://doi.org/10.54364/aaiml.2025.54264","pdf_url":"https://doi.org/10.54364/aaiml.2025.54264","source":{"id":"https://openalex.org/S4210238872","display_name":"Advances in Artificial Intelligence and Machine Learning","issn_l":"2582-9793","issn":["2582-9793"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Advances in Artificial Intelligence and Machine Learning","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.54364/aaiml.2025.54264","is_oa":true,"landing_page_url":"https://doi.org/10.54364/aaiml.2025.54264","pdf_url":"https://doi.org/10.54364/aaiml.2025.54264","source":{"id":"https://openalex.org/S4210238872","display_name":"Advances in Artificial Intelligence and Machine Learning","issn_l":"2582-9793","issn":["2582-9793"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Advances in Artificial Intelligence and Machine Learning","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7117976989.pdf","grobid_xml":"https://content.openalex.org/works/W7117976989.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"This":[0,72],"study":[1,73],"explores":[2],"the":[3,108,118,130,147,157],"application":[4],"of":[5,77],"deep":[6,61,85],"learning":[7,62,86],"(DL)":[8],"to":[9,68,97,107,117],"enhance":[10],"security":[11,37],"in":[12,22],"Near":[13],"Field":[14],"Communication":[15],"(NFC)":[16],"technology,":[17],"which":[18],"is":[19,124],"widely":[20],"used":[21,96],"secure":[23],"access":[24],"control":[25],"and":[26,60,84,91,127,143,150,153,173],"contactless":[27],"payments.":[28],"As":[29],"NFC":[30,78,100],"usage":[31],"grows,":[32],"concerns":[33],"have":[34],"emerged":[35],"about":[36],"vulnerabilities,":[38],"particularly":[39],"relay":[40,44,79],"attacks,":[41],"where":[42],"attackers":[43],"signals":[45],"without":[46],"breaking":[47],"encryption":[48],"or":[49],"other":[50],"protective":[51],"measures.":[52],"Previous":[53],"research":[54],"focused":[55],"on":[56],"ambient-based,":[57],"distance-bounding":[58],"protocols":[59],"with":[63,140],"RF":[64,82],"fingerprinting":[65],"via":[66,87],"Wi-Fi":[67],"mitigate":[69],"such":[70],"threats.":[71],"will":[74],"improve":[75],"detecting":[76],"attacks":[80],"using":[81,129],"fingerprints":[83],"Bluetooth.":[88],"SDR++":[89],"software":[90],"a":[92],"HackRF":[93],"device":[94],"were":[95,163],"gather":[98],"2,400":[99],"signal":[101],"samples.":[102],"1,200":[103,113],"samples":[104,114],"are":[105,115],"allocated":[106],"Normal":[109],"category,":[110],"while":[111],"another":[112],"assigned":[116],"Relay":[119],"Attack":[120],"category.":[121],"The":[122,133],"dataset":[123],"trained,":[125],"validated,":[126],"tested":[128],"2D-CNN":[131],"model.":[132],"model\u2019s":[134],"test":[135],"set":[136],"accuracy":[137],"was":[138,169],"88%,":[139],"0.85":[141],"precision":[142,152],"0.91":[144],"recall":[145,155],"for":[146,156],"\u201dNormal\u201d":[148],"class":[149],"0.90":[151],"0.84":[154],"\u201dAttack\u201d":[158],"class.":[159],"Both":[160],"classes\u2019":[161],"F1-scores":[162],"approximately":[164],"0.88,":[165],"showing":[166],"performance":[167],"that":[168],"balanced":[170],"between":[171],"sensitivity":[172],"precision.":[174]},"counts_by_year":[],"updated_date":"2026-03-14T06:41:57.775601","created_date":"2026-01-02T00:00:00"}
