Cited By
View all- Lai ZChang ZSha MZhang QXie NChen CNiyato D(2025)A Comprehensive Survey on Physical Layer Authentication Techniques: Categorization and Analysis of Model-Driven and Data-Driven ApproachesACM Computing Surveys10.1145/370849657:5(1-35)Online publication date: 9-Jan-2025
- Wang WNiyato DXiong ZYin Z(2025)Detection and Authentication for Cross-Technology CommunicationIEEE Transactions on Vehicular Technology10.1109/TVT.2024.346710974:2(3157-3171)Online publication date: Feb-2025
- Laghari ALi HKhan AShoulin YKarim SKhani M(2024)Internet of Things (IoT) applications security trends and challengesDiscover Internet of Things10.1007/s43926-024-00090-54:1Online publication date: 24-Dec-2024
- Show More Cited By