zhangweifeng1218 / Adaptive_RF_FingerprintingView external linksLinks
☆19Feb 3, 2023Updated 3 years ago
Alternatives and similar repositories for Adaptive_RF_Fingerprinting
Users that are interested in Adaptive_RF_Fingerprinting are comparing it to the libraries listed below
Sorting:
- Assessing the Feasibility of RF Fingerprinting for Security in Unmanned Aerial Vehicles☆12Nov 22, 2023Updated 2 years ago
- Deep learning projects☆13Aug 13, 2019Updated 6 years ago
- Few-Shot Specific Emitter Identification (FS-SEI) Method☆23Oct 20, 2025Updated 3 months ago
- Provides examples for using the WiSig dataset☆26Mar 12, 2022Updated 3 years ago
- Adversarial attack on a CNN trained on MNIST dataset using Targeted I-FGSM and Targeted MI-FGM☆11Feb 17, 2018Updated 7 years ago
- Implement a bunch of website fingerprinting defenses on Pluggable Transport☆13Feb 26, 2024Updated last year
- ☆14Aug 27, 2024Updated last year
- ☆11Jul 22, 2024Updated last year
- ☆15Oct 16, 2024Updated last year
- Edge Computing AI and Smart Contract☆10May 30, 2023Updated 2 years ago
- [TMC’23] Preemptive Migration Prediction Network for Proactive Fault Tolerant Edge Computing☆10Sep 25, 2023Updated 2 years ago
- Exploring a dataset of modulated radio signals using deep learning with Keras.☆11Jun 17, 2018Updated 7 years ago
- ☆18Sep 8, 2025Updated 5 months ago
- A marvelous toolbox for DL research.☆14May 2, 2025Updated 9 months ago
- ☆26Jul 1, 2025Updated 7 months ago
- Device Authentication for Wi-Fi Based on Deep Learning and Radio Frequency Fingerprint☆15Aug 26, 2024Updated last year
- ☆11Mar 22, 2021Updated 4 years ago
- ☆14Sep 6, 2023Updated 2 years ago
- ☆17Mar 25, 2024Updated last year
- Code for the ICLR 2022 paper "Attacking deep networks with surrogate-based adversarial black-box methods is easy"☆10Oct 16, 2025Updated 3 months ago
- Codes for reproducing the numerical results reported in: "Control Aspects for Using RIS in Latency-Constrained Mobile Edge Computing" by …☆14Dec 19, 2023Updated 2 years ago
- Neural Synchronization: A Generalizable Model-and-Data Driven Approach for Open-Set RFF Authentication☆18Nov 22, 2024Updated last year
- ☆20Nov 14, 2025Updated 3 months ago
- ☆13May 15, 2022Updated 3 years ago
- SNN Cutoff Evaluation.☆17Aug 14, 2024Updated last year
- ☆12Aug 24, 2023Updated 2 years ago
- Used in fingerprinting RF Signals, Multiple papers are implemented here all credits of the research goes to the authors who conducted the…☆16Dec 30, 2022Updated 3 years ago
- A supervised deep learning based resource allocation scheme for multi-cell wireless system.☆18Oct 29, 2019Updated 6 years ago
- ☆16Jan 11, 2024Updated 2 years ago
- ☆18Dec 23, 2024Updated last year
- The Extended Hata (eHata) Urban Propagation Model☆20Feb 2, 2024Updated 2 years ago
- Conference and Journal Paper Implementations☆18Mar 8, 2025Updated 11 months ago
- RF fingerprinting project on 802.11 WiFi signals☆18Apr 30, 2023Updated 2 years ago
- [python] 使用A*算法(A-star)的最短路径优化设计 (2d/3d)☆22Aug 19, 2022Updated 3 years ago
- ☆17Feb 20, 2023Updated 2 years ago
- Apprentices in Federated Learning from ECNU <3☆25Mar 10, 2022Updated 3 years ago
- ☆26Oct 14, 2023Updated 2 years ago
- ☆23Jul 11, 2023Updated 2 years ago
- Implementation for Jacobian Adversarially Regularized Networks for Robustness (ICLR 2020)☆22Dec 30, 2019Updated 6 years ago