[2] 黄万伟, 袁博, 王苏南, 等. 基于非零和信号博弈的主动防御模型[J]. 郑州大学学报(工学版), 2022, 43(1): 90-96.HUANG W W, YUAN B, WANG S N, et al. Proactive defense model based on non-zero-sum signal game[J]. Journal of Zhengzhou University (Engineering Science), 2022, 43(1): 90-96.
[3] XIE N, LI Z Y, TAN H J. A survey of physical-layer authentication in wireless communications[J]. IEEE Communications Surveys &Tutorials, 2021, 23(1): 282-310.
[4] FANG H, WANG X B, HANZO L. Learning-aided phy-sical layer authentication as an intelligent process[J]. IEEE Transactions on Communications, 2018, 67(3): 2260-2273.
[5] ZHANG N, FANG X J, WANG Y, et al. Physical-layer authentication for Internet of Things via WFRFT-based Gaussian tag embedding[J]. IEEE Internet of Things Journal, 2020, 7(9): 9001-9010.
[6] 李兆斌, 崔钊, 魏占祯, 等. 基于物理层信道特征的无线网络认证机制[J]. 计算机科学, 2020, 47(12): 267-272.LI Z B, CUI Z, WEI Z Z, et al. Wireless network authentication method based on physical layer channel cha-racteristics[J]. Computer Science, 2020, 47(12): 267-272.
[7] XIE N, CHEN C S, MING Z. Security model of authentication at the physical layer and performance analysis over fading channels[J]. IEEE Transactions on Dependable and Secure Computing, 2021, 18(1): 253-268.
[8] 吴聪, 杨炜伟. 基于嵌入水印的物理层认证及优化[J]. 通信技术, 2020, 53(9): 2233-2240.WU C, YANG W W. Physical layer authentication and optimization based on embedded watermark[J]. Communications Technology, 2020, 53(9): 2233-2240.
[9] 吴小燕, 刘强, 朱成璋. 社交网络中协同舆论欺诈检测方法应用研究[J]. 郑州大学学报(工学版), 2022, 43(2): 7-14.WU X Y, LIU Q, ZHU C Z. Research on application of collaborative public opinion fraud detection method in social network[J]. Journal of Zhengzhou University (Engineering Science), 2022, 43(2): 7-14.
[10] 李靖, 葛建华, 王勇, 等. 一种资源利用率高的协作无线系统[J]. 西安电子科技大学学报, 2009, 36(1): 28-32, 51.LI J, GE J H, WANG Y, et al. Resource efficient coo-perative wireless system[J]. Journal of Xidian University, 2009, 36(1): 28-32, 51.
[11] GU Z F, CHEN H, XU P P, et al. Physical layer authentication for non-coherent massive SIMO-enabled industrial IoT communications[J]. IEEE Transactions on Information Forensics and Security, 2020, 15: 3722-3733.