![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessGenerative adversarial network-based rogue device identification using differential constellation trace figure
With the dramatic development of the internet of things (IoT), security issues such as identity authentication have received serious attention. The radio frequency (RF) fingerprint of IoT device is an inherent...
-
Chapter
The Early Rise of Social Security in China: Ideas and Reforms, 1911–1949
Applying the editor’s “onion skin model” of social policy ideas, this chapter analyses the early rise of social security ideas and policies in Republican China (1911–1949). Facing imperialism, Chinese elites t...
-
Article
Open AccessPhysical layer identification of LoRa devices using constellation trace figure
LoRa wireless technology is a revolutionary wireless network access technology with a wide application prospect. An identification method for Lora devices based on physical layer fingerprinting is proposed to ...