Results 351 to 360 of about 6,360,569 (404)

Radio Frequency Identification

Lecture Notes in Computer Science, 2018
Radio frequency identification, RFID, uses electromagnetic fields to transfer data wirelessly. Common uses of RFID are entry passes to secure sites, library book logging, or tracking component parts in a production process. Passive RFID tags consist only of an antenna and a microchip, whose shadow can be seen by holding an RFID card up to a light ...
Elise Marie Moran
openaire   +3 more sources

Radio Frequency Fingerprinting on the Edge

IEEE Transactions on Mobile Computing, 2022
Deep learning methods have been very successful at radio frequency fingerprinting tasks, predicting the identity of transmitting devices with high accuracy. We study radio frequency fingerprinting deployments at resource-constrained edge devices.
T. Jian   +9 more
semanticscholar   +1 more source

Radio Frequency Fingerprint Identification for LoRa Using Deep Learning

IEEE Journal on Selected Areas in Communications, 2021
Radio frequency fingerprint identification (RFFI) is an emerging device authentication technique that relies on the intrinsic hardware characteristics of wireless devices. This paper designs a deep learning-based RFFI scheme for Long Range (LoRa) systems.
Guanxiong Shen   +4 more
semanticscholar   +1 more source

Radio Frequency Identification [PDF]

open access: possibleBiomedical Instrumentation & Technology, 2010
Radio Frequency Identifikation, kurz RFID, ist eine Technologie zur Identifizierung von Objekten. Das Grundprinzip von RFID basiert auf der kontaktlosen Datenerfassung und -ubertragung per Funk. Verschiedene Objekte werden dabei mit Transpondern (so genannten Tags oder Smart-Labels) ausgestattet.
Selcuk Nisancioglu   +3 more
openaire   +3 more sources

A Review of Radio Frequency Fingerprinting Techniques

IEEE Journal of Radio Frequency Identification, 2020
Radio frequency (RF) fingerprinting techniques have been used as an extra security layer for wireless devices. Unique fingerprints are used to identify wireless devices in order to avoid spoofing or impersonating attacks.
Naeimeh Soltanieh   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy