{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:47:39Z","timestamp":1774021659105,"version":"3.50.1"},"reference-count":37,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Ad Hoc Networks"],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1016\/j.adhoc.2024.103593","type":"journal-article","created":{"date-parts":[[2024,7,4]],"date-time":"2024-07-04T07:36:19Z","timestamp":1720078579000},"page":"103593","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":8,"special_numbering":"C","title":["Multi-attribute weighted convolutional attention neural network for multiuser physical layer authentication in IIoT"],"prefix":"10.1016","volume":"163","author":[{"given":"Yue","family":"Wu","sequence":"first","affiliation":[]},{"given":"Tao","family":"Jing","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4397-9154","authenticated-orcid":false,"given":"Qinghe","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Mao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0647-1009","authenticated-orcid":false,"given":"Yan","family":"Huo","sequence":"additional","affiliation":[]},{"given":"Zhiwei","family":"Yang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"6","key":"10.1016\/j.adhoc.2024.103593_b1","doi-asserted-by":"crossref","first-page":"4122","DOI":"10.1109\/TII.2021.3115697","article-title":"Industrial IoT in 5G-and-beyond networks: Vision, architecture, and design trends","volume":"18","author":"Mahmood","year":"2022","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"5","key":"10.1016\/j.adhoc.2024.103593_b2","doi-asserted-by":"crossref","first-page":"8169","DOI":"10.1109\/JIOT.2019.2927379","article-title":"Physical-layer security of 5G wireless networks for IoT: Challenges and opportunities","volume":"6","author":"Wang","year":"2019","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"10.1016\/j.adhoc.2024.103593_b3","doi-asserted-by":"crossref","first-page":"2205","DOI":"10.1109\/JIOT.2018.2883403","article-title":"Data collection for security measurement in wireless sensor networks: A survey","volume":"6","author":"Xie","year":"2019","journal-title":"IEEE Internet Things J."},{"issue":"8","key":"10.1016\/j.adhoc.2024.103593_b4","doi-asserted-by":"crossref","first-page":"5420","DOI":"10.1109\/TWC.2020.2993175","article-title":"Fuzzy learning for multi-dimensional adaptive physical layer authentication: A compact and robust approach","volume":"19","author":"Fang","year":"2020","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"6","key":"10.1016\/j.adhoc.2024.103593_b5","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/MNET.011.2000122","article-title":"Physical layer authentication for 5G communications: Opportunities and road ahead","volume":"34","author":"Wang","year":"2020","journal-title":"IEEE Netw."},{"issue":"3","key":"10.1016\/j.adhoc.2024.103593_b6","doi-asserted-by":"crossref","first-page":"2041","DOI":"10.1109\/TII.2020.2963962","article-title":"Automated labeling and learning for physical layer authentication against clone node and sybil attacks in industrial wireless edge networks","volume":"17","author":"Chen","year":"2021","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"7","key":"10.1016\/j.adhoc.2024.103593_b7","doi-asserted-by":"crossref","first-page":"1484","DOI":"10.1109\/LCOMM.2022.3170509","article-title":"Physical layer authentication scheme in beamspace MIMO systems","volume":"26","author":"Afeef","year":"2022","journal-title":"IEEE Commun. Lett."},{"issue":"1","key":"10.1016\/j.adhoc.2024.103593_b8","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/LWC.2021.3123820","article-title":"Improved physical layer authentication scheme based on wireless channel phase","volume":"11","author":"Lu","year":"2022","journal-title":"IEEE Wirel. Commun. Lett."},{"issue":"24","key":"10.1016\/j.adhoc.2024.103593_b9","doi-asserted-by":"crossref","first-page":"22591","DOI":"10.1109\/JIOT.2023.3304519","article-title":"A novel hybrid physical-layer authentication scheme for multiuser wireless communication systems","volume":"10","author":"Illi","year":"2023","journal-title":"IEEE Internet Things J."},{"issue":"12","key":"10.1016\/j.adhoc.2024.103593_b10","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/MCOM.2015.7355561","article-title":"To avoid or not to avoid CSI leakage in physical layer secret communication systems","volume":"53","author":"Liu","year":"2015","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/j.adhoc.2024.103593_b11","series-title":"2010 Second International Conference on COMmunication Systems and NETworks","first-page":"1","article-title":"A channel-based hypothesis testing approach to enhance user authentication in wireless networks","author":"Tugnait","year":"2010"},{"issue":"2","key":"10.1016\/j.adhoc.2024.103593_b12","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1109\/TVT.2021.3055563","article-title":"Multiple correlated attributes based physical layer authentication in wireless networks","volume":"70","author":"Xia","year":"2021","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"12","key":"10.1016\/j.adhoc.2024.103593_b13","doi-asserted-by":"crossref","first-page":"10037","DOI":"10.1109\/TVT.2016.2524258","article-title":"PHY-layer spoofing detection with reinforcement learning in wireless networks","volume":"65","author":"Xiao","year":"2016","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"6","key":"10.1016\/j.adhoc.2024.103593_b14","doi-asserted-by":"crossref","first-page":"4171","DOI":"10.1109\/TWC.2016.2535442","article-title":"Physical layer authentication enhancement using two-dimensional channel quantization","volume":"15","author":"Liu","year":"2016","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"3","key":"10.1016\/j.adhoc.2024.103593_b15","doi-asserted-by":"crossref","first-page":"2260","DOI":"10.1109\/TCOMM.2018.2881117","article-title":"Learning-aided physical layer authentication as an intelligent process","volume":"67","author":"Fang","year":"2019","journal-title":"IEEE Trans. Commun."},{"key":"10.1016\/j.adhoc.2024.103593_b16","series-title":"2022 IEEE International Conference on Communication, Networks and Satellite","first-page":"289","article-title":"Threshold-based physical layer authentication for space information networks","author":"Abdrabou","year":"2022"},{"key":"10.1016\/j.adhoc.2024.103593_b17","series-title":"2023 Joint European Conference on Networks and Communications & 6G Summit","first-page":"30","article-title":"Multi-feature physical layer authentication for URLLC based on linear supervised learning","author":"Weinand","year":"2023"},{"issue":"11","key":"10.1016\/j.adhoc.2024.103593_b18","doi-asserted-by":"crossref","first-page":"2440","DOI":"10.3390\/s19112440","article-title":"Deep-learning-based physical layer authentication for industrial wireless sensor networks","volume":"19","author":"Liao","year":"2019","journal-title":"Sensors"},{"key":"10.1016\/j.adhoc.2024.103593_b19","series-title":"2021 IEEE Wireless Communications and Networking Conference","first-page":"1","article-title":"Physical layer group authentication in mMTC networks with NOMA","author":"Zhang","year":"2021"},{"issue":"4","key":"10.1016\/j.adhoc.2024.103593_b20","doi-asserted-by":"crossref","first-page":"1371","DOI":"10.1109\/JSAC.2022.3143222","article-title":"Privacy-preserving physical-layer authentication for non-orthogonal multiple access systems","volume":"40","author":"Xie","year":"2022","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"10.1016\/j.adhoc.2024.103593_b21","series-title":"2016 9th International Symposium on Turbo Codes and Iterative Information Processing","first-page":"355","article-title":"Feature-based multi-user authentication for parallel uplink transmissions","author":"Forssell","year":"2016"},{"key":"10.1016\/j.adhoc.2024.103593_b22","series-title":"GLOBECOM 2023 - 2023 IEEE Global Communications Conference","first-page":"3366","article-title":"Joint design of multi-dimensional multiple access and lightweight continuous authentication in zero-trust environments","author":"Fang","year":"2023"},{"issue":"3","key":"10.1016\/j.adhoc.2024.103593_b23","doi-asserted-by":"crossref","first-page":"2041","DOI":"10.1109\/TII.2020.2963962","article-title":"Automated labeling and learning for physical layer authentication against clone node and sybil attacks in industrial wireless edge networks","volume":"17","author":"Chen","year":"2021","journal-title":"IEEE Trans. Ind. Inform."},{"key":"10.1016\/j.adhoc.2024.103593_b24","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2021.102559","article-title":"Multiuser physical layer security mechanism in the wireless communication system of the IIOT","volume":"113","author":"Du","year":"2022","journal-title":"Comput. Secur."},{"issue":"6","key":"10.1016\/j.adhoc.2024.103593_b25","doi-asserted-by":"crossref","first-page":"4011","DOI":"10.1109\/TCOMM.2021.3065980","article-title":"Lightweight continuous authentication via intelligently arranged pseudo-random access in 5G-and-beyond","volume":"69","author":"Fang","year":"2021","journal-title":"IEEE Trans. Commun."},{"issue":"2","key":"10.1016\/j.adhoc.2024.103593_b26","doi-asserted-by":"crossref","first-page":"2097","DOI":"10.1109\/TII.2023.3286885","article-title":"Multiobservation-multichannel-attribute-based multiuser authentication for industrial wireless edge networks","volume":"20","author":"Meng","year":"2024","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"24","key":"10.1016\/j.adhoc.2024.103593_b27","doi-asserted-by":"crossref","first-page":"22165","DOI":"10.1109\/JIOT.2023.3303511","article-title":"Cooperative physical layer authentication with reputation-inspired collaborator selection","volume":"10","author":"Zhang","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.adhoc.2024.103593_b28","series-title":"2019 IEEE International Conference on Artificial Intelligence and Computer Applications","first-page":"231","article-title":"A novel physical layer authentication method with convolutional neural network","author":"Liao","year":"2019"},{"issue":"1","key":"10.1016\/j.adhoc.2024.103593_b29","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1109\/JIOT.2022.3203514","article-title":"Multiuser physical-layer authentication based on latent perturbed neural networks for industrial internet of things","volume":"10","author":"Meng","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.adhoc.2024.103593_b30","series-title":"2020 IEEE Globecom Workshops","first-page":"1","article-title":"On physical-layer authentication via triple pool convolutional neural network","author":"Chen","year":"2020"},{"key":"10.1016\/j.adhoc.2024.103593_b31","doi-asserted-by":"crossref","first-page":"116390","DOI":"10.1109\/ACCESS.2019.2934122","article-title":"Security enhancement for mobile edge computing through physical layer authentication","volume":"7","author":"Liao","year":"2019","journal-title":"IEEE Access"},{"issue":"3","key":"10.1016\/j.adhoc.2024.103593_b32","doi-asserted-by":"crossref","first-page":"2077","DOI":"10.1109\/JIOT.2019.2960099","article-title":"Multiuser physical layer authentication in internet of things with data augmentation","volume":"7","author":"Liao","year":"2020","journal-title":"IEEE Internet Things J."},{"issue":"8","key":"10.1016\/j.adhoc.2024.103593_b33","doi-asserted-by":"crossref","first-page":"1748","DOI":"10.1109\/LWC.2022.3180901","article-title":"CSI-based physical layer authentication via deep learning","volume":"11","author":"Wang","year":"2022","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"10.1016\/j.adhoc.2024.103593_b34","series-title":"Radio frequency measurements for selected manufacturing and industrial environments","author":"R. Candell","year":"2016"},{"issue":"4","key":"10.1016\/j.adhoc.2024.103593_b35","doi-asserted-by":"crossref","first-page":"707","DOI":"10.1109\/LWC.2022.3140828","article-title":"Learning of time-frequency attention mechanism for automatic modulation recognition","volume":"11","author":"Lin","year":"2022","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"10.1016\/j.adhoc.2024.103593_b36","series-title":"2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"7132","article-title":"Squeeze-and-excitation networks","author":"Hu","year":"2018"},{"key":"10.1016\/j.adhoc.2024.103593_b37","series-title":"Computer Vision \u2013 ECCV 2016","first-page":"499","article-title":"A discriminative feature learning approach for deep face recognition","author":"Wen","year":"2016"}],"container-title":["Ad Hoc Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S157087052400204X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S157087052400204X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,8,24]],"date-time":"2024-08-24T20:36:22Z","timestamp":1724531782000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S157087052400204X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10]]},"references-count":37,"alternative-id":["S157087052400204X"],"URL":"https:\/\/doi.org\/10.1016\/j.adhoc.2024.103593","relation":{},"ISSN":["1570-8705"],"issn-type":[{"value":"1570-8705","type":"print"}],"subject":[],"published":{"date-parts":[[2024,10]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Multi-attribute weighted convolutional attention neural network for multiuser physical layer authentication in IIoT","name":"articletitle","label":"Article Title"},{"value":"Ad Hoc Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.adhoc.2024.103593","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"103593"}}