Login / Signup

Comparison of Statistical and Machine Learning Techniques for Physical Layer Authentication.

Linda SenigagliesiMarco BaldiEnnio Gambi
Published in: IEEE Trans. Inf. Forensics Secur. (2021)
Keyphrases
  • physical layer
  • application layer
  • wireless communication
  • management system
  • resource utilization
  • network layer