scispace - formally typeset
Q

Qiao Tian

Researcher at Harbin Engineering University

Publications -  13
Citations -  141

Qiao Tian is an academic researcher from Harbin Engineering University. The author has contributed to research in topics: Computer science & Pattern recognition (psychology). The author has an hindex of 3, co-authored 5 publications receiving 43 citations.

Papers
More filters
Journal ArticleDOI

New Security Mechanisms of High-Reliability IoT Communication Based on Radio Frequency Fingerprint

TL;DR: A low-latency high-reliability security mechanism is proposed to avoid the MITM attack in IIoT scenario by combining the radio frequency fingerprint (RFF) technology withIIoT applications and using the new security mechanisms based on RFF.
Journal ArticleDOI

Multisignal Modulation Classification Using Sliding Window Detection and Complex Convolutional Network in Frequency Domain

TL;DR: A multisignal frequency domain detection and recognition method that can recognize 264 time-domain aliasing and frequency-closed signals with an accuracy of 97.3% under the influence of −2 dB corresponding to the noise of the calibration signal is proposed.
Journal ArticleDOI

A Method for Guaranteeing Wireless Communication Based on a Combination of Deep and Shallow Learning

TL;DR: A framework of anomaly-based network intrusion detection system to finish the detection job and results prove that the proposed method performs quite better than some of state-of-the-art intrusion detection approaches, including the method based on the principal component analysis (PCA) and some other machine learning strategies.
Journal ArticleDOI

An Identity Authentication Method of a MIoT Device Based on Radio Frequency (RF) Fingerprint Technology

TL;DR: Based on the research on the communication of the physical layer and the support vector data description (SVDD) algorithm, this paper establishes a radio frequency fingerprint (RFF or RF fingerprint) authentication model for a communication device.
Journal ArticleDOI

The technology of adversarial attacks in signal recognition

TL;DR: This study converts individual signals into stellar contour images, and then generates adversarial examples to evaluate the adversarial attack impacts, and shows that whether the current input sample is a signal sequence or a converted image, the DNN is vulnerable to the threat of adversarialExamples.