Publications
2026年
- XIE L, WANG P, SHEN G, et al. Secure communication in MIMOME movable-antenna systems with statistical eavesdropper CSI: arXiv:2601.14755[M]. arXiv, 2026.
2025年
- MAO C, LIU L, YU Z, et al. Underwater modulation recognition via attention fusion of CQT and ResNet features[C]//2025 8th International Conference on Information Communication and Signal Processing (ICICSP). 2025: 710-714.
- CHU Z, LI G, MENG Q, et al. Privacy-preserving WiFi sensing in WSNs via CSI obfuscation[J]. Computers & Security, 2025, 157: 104594.
- HE C, MENG Q, CHEN Y, et al. An improved metric-active learning approach for few labeled radio frequency fingerprinting[J]. Computer Networks, 2025, 273: 111794.
- SHAHIRI V, LI G, BEHROOZI H. Physical layer group key generation with the aid of reconfigurable intelligent surfaces[M]. arXiv, 2025.
- HUANG Z, LI G, XU H, et al. Fluid antenna system-assisted physical layer secret key generation: arXiv:2509.15547[M]. arXiv, 2025.
- SUN Y, LI G, CHOU H, et al. Channel-robust RFF for low-latency 5g device identification in SIMO scenarios: arXiv:2511.08902[M]. arXiv, 2025.
- SUN C, LI G, WANG S, et al. Movable antenna enabled dual-scale beams for resilient communication, sensing, and security[J]. IEEE Wireless Communications, 2025: 1-8.
- LI G, ZHOU Y, SUN Y, et al. Endogenous security techniques for safeguarding next-generation spectrum usage at the physical layer[J]. IEEE Network, 2025, 39(6): 128-138.
- LUO H, LI G, BRIGHENTE A, et al. Channel-robust RF fingerprint identification for multi-antenna 5g user equipments[J]. IEEE Transactions on Information Forensics and Security, 2025, 20: 10761-10776.
- HOU Y, SUN H, LI G, et al. Securing wireless communications via channel reciprocity and dynamic constellation obfuscation[J]. IEEE Internet of Things Journal, 2025, 12(18): 37035-37049.
- CHEN J, LI H, LI G, et al. The optimization of XL-RIS-assisted physical layer key generation in near-field[C]//2025 IEEE 102nd Vehicular Technology Conference (VTC2025-Fall). 2025: 1-6.
- HUO A, LI G, YANG L, et al. Enhancing wireless communication security with variable bloom filter-based physical-layer secure transmission[J]. IEEE Internet of Things Journal, 2025, 12(14): 28835-28849.
- XIAO Q, LI G, LIU Z, et al. Optimal subcarrier allocation scheme for physical-layer key generation in an OFDMA network[J]. IEEE Transactions on Information Forensics and Security, 2025, 20: 4929-4942.
- LI G, ZHOU Y, SUN Y, et al. Endogenous security techniques for safeguarding next-generation spectrum usage at the physical layer[J]. IEEE Network, 2025, 39(6): 128-138.
- CHU Z, LI G, MENG Q, et al. Defeating CSI obfuscation mechanisms: A study on unauthorized wi-fi sensing in wireless sensor network[J]. Computer Networks, 2025, 263: 111208.
- WU T, LI G, WANG J, et al. PPCA: Privacy-preserving continuous authentication scheme with consistency proof for zero-trust architecture networks[J]. IEEE Internet of Things Journal, 2025, 12(11): 17596-17609.
- DU Y, DAI H, LIU H, et al. Efficient and error-free secret key generation leveraging sorted indices matching[J]. IEEE Transactions on Mobile Computing, 2025, 24(2): 779-793.
- XU Z, LI G, PENG Z, et al. Collusion-driven impersonation attack on channel-resistant RF fingerprinting[C]//2025 IEEE Conference on Communications and Network Security (CNS). 2025: 1-9.
- LIU M, ZHOU Z, SHI Q, et al. Joint beamforming design for integrated sensing and communication systems with hybrid-colluding eavesdroppers[J]. IEEE Transactions on Communications, 2025, 73(8): 6484-6498.
- 李古月, 张子豪, 毛承海, 等. 基于累积量与深度学习融合的水下调制识别模型[J]. 信息网络安全, 2025, 25(10): 1554-1569.
- HAN Q, DENG J, HUANG S, et al. Adversarial graph perturbation for smart contract vulnerability detection[C]//2025 IEEE Conference on Communications and Network Security (CNS). 2025: 1-9.
2024年
- WANG J, GAO S, LI G, et al. SAMCU: Secure and anonymous multichannel updates in payment channel networks[J]. IEEE Transactions on Information Forensics and Security, 2024, 19: 9115-9128.
- YUAN X, JIANG Y, LI G, et al. Wireless channel key generation based on multisubcarrier phase difference[J]. IEEE Internet of Things Journal, 2024, 11(20): 32939-32955.
- LI G, STAAT P, LI H, et al. RIS-jamming: Breaking key consistency in channel reciprocity-based key generation[J]. IEEE Transactions on Information Forensics and Security, 2024, 19: 5090-5105.
- DU Y, DAI H, LIU H, et al. Secret key generation based on manipulated channel measurement matching[J]. IEEE Transactions on Mobile Computing, 2024, 23(10): 9532-9548.
- LI G, MA Y, WANG W, et al. The self-detection method of the puppet attack in biometric fingerprinting[J]. IEEE Internet of Things Journal, 2024, 11(10): 18824-18838.
- ZHANG X, LI G, ZHANG J, et al. Enabling deep learning-based physical-layer secret key generation for FDD-OFDM systems in multienvironments[J]. IEEE Transactions on Vehicular Technology, 2024, 73 (7): 10135-10149.
- WANG W, LI G, CHU Z, et al. Two-factor authentication approach based on behavior patterns for defeating puppet attacks[J]. IEEE Sensors Journal, 2024, 24(6): 8250-8264.
- LI G, LUO H, YU J, et al. Information-theoretic secure key sharing for wide-area mobile applications[J]. IEEE Wireless Communications, 2024, 31(1): 118-124.
- HU L, LI G, HU A, et al. Exploiting malicious RIS for secret key acquisition in physical-layer key generation[J]. IEEE Wireless Communications Letters, 2024, 13(2): 417-421.
- HU L, LI G, QIAN X, et al. Reconfigurable intelligent surface-assisted secret key generation in spatially correlated channels[J]. IEEE Transactions on Wireless Communications, 2024, 23(3): 2153-2166.
- LILIN Y, GUYUE L, TAO G, et al. Physical-layer secret key generation for dual-task scenarios[J]. China Communications, 2024, 21(7): 252266.
- ZHANG Z, LI G, SHI J, et al. Real-world aircraft recognition based on RF fingerprinting with few labeled ADS-b signals[J]. IEEE Transactions on Vehicular Technology, 2024, 73(2): 2866-2871.
- XIAO Q, ZHAO J, FENG S, et al. Securing NextG networks with physical-layer key generation: A survey[J]. Security and Safety, 2024, 3: 2023021.
- XU H, WONG K K, NEW W K, et al. Coding-enhanced cooperative jamming for secret communication in fluid antenna systems[J]. IEEE Communications Letters, 2024, 28(9): 1991-1995.
- FENG S, CHENG Y, LI G, et al. Physical-layer secret key generation with energy efficiency maximization[C]//GLOBECOM 2024 - 2024 IEEE Global Communications Conference. 2024: 1713-1718.
- YANG H, XIE B, WANG J, et al. Privacy-preserving and secure decentralized identity management for multiple controllers[C]// GLOBECOM 2024 - 2024 IEEE Global Communications Conference. 2024: 541-546.
- TANG H, LI G, GUO T, et al. A VT-code-based information reconciliation scheme for secret key generation using RSS[J]. IEEE Communications Letters, 2024, 28(4): 783-787.
2023年
- LUO H, LI G, XING Y, et al. RelativeRFF: Multi-antenna device identification in multipath propagation scenarios[C]//ICC 2023 - IEEE International Conference on Communications. 2023: 3708-3713.
- HU L, SUN C, LI G, et al. Reconfigurable intelligent surface-aided secret key generation in multi-cell systems[J]. IEEE Transactions on Communications, 2023, 71(11): 6499-6513.
- MENG Q, LI G, SHI J, et al. Enhancing RF fingerprinting with a simulated attack detection strategy for few labeled signals[C]//2023 IEEE 23rd International Conference on Communication Technology (ICCT). 2023: 281-285.
- SUN Y, LI G, LUO H, et al. Location-invariant radio frequency fingerprint for base station recognition[J]. IEEE Wireless Communications Letters, 2023, 12(9): 1583-1587.
- LI H, LI G, HU L, et al. RIS-assisted physical-layer key generation with discrete phase shift optimization[C]//2023 IEEE 98th Vehicular Technology Conference (VTC2023-Fall). 2023: 1-5.
- SUN H, LI G, LI H, et al. A physical-layer key generation scheme for non-square channel matrices based on PMI[C]//2023 IEEE/CIC International Conference on Communications in China (ICCC). 2023: 1-6.
2022年
- LI G, SHI J, YU J, et al. E-fin: Enabling RF fingerprinting for realworld aircraft with few labeled ADS-b signals[Z].
- HU L, LI G, QIAN X, et al. Joint transmit and reflective beamforming for RIS-assisted secret key generation[C]//GLOBECOM 2022 - 2022 IEEE Global Communications Conference. 2022: 2352-2357.
- HUANG Z, LI G, HU A, et al. Recognizing automotive ethernet device by extracting fingerprint from power spectrum[C]//2022 IEEE 22nd International Conference on Communication Technology (ICCT). 2022: 1442-1446.
- HOU Y, LI G, DANG S, et al. Physical layer encryption scheme based on dynamic constellation rotation[C]//2022 IEEE 96th Vehicular Technology Conference (VTC2022-Fall). 2022: 1-5.
- LI G, HU L, STAAT P, et al. Reconfigurable intelligent surface for physical layer key generation: Constructive or destructive?[J]. IEEE Wireless Communications, 2022, 29(4): 146-153.
- LI G, YANG H, ZHANG J, et al. Fast and secure key generation with channel obfuscation in slowly varying environments[C]//IEEE INFOCOM 2022 - IEEE Conference on Computer Communications. 2022: 1-10.
- LI G, SUN C, XU W, et al. On maximizing the sum secret key rate for reconfigurable intelligent surface-assisted multiuser systems[J]. IEEE Transactions on Information Forensics and Security, 2022, 17: 211-225.
- ZHANG X, LI G, ZHANG J, et al. Deep-learning-based physical-layer secret key generation for FDD systems[J]. IEEE Internet of Things Journal, 2022, 9(8): 6081-6094.
- YANG J, GAO S, LI G, et al. Reducing gas consumption of tornado cash and other smart contracts in ethereum[C]//2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). 2022: 921-926.
- 胡奥婷, 胡爱群, 胡韵, 等. 机器学习中差分隐私的数据共享及发布: 技术、应用和挑战[J]. 信息安全学报, 2022, 7(4): 1-16.
- 李古月, 胡爱群. 网络空间安全专业课程思政教学探索与实践–以东南大学“网络空间安全新进展”课程为例[J]. 网络与信息安全学报, 2022, 8(2): 183-189.
2021年
- LI G, XU Y, XU W, et al. Robust key generation with hardware mismatch for secure MIMO communications[J]. IEEE Transactions on Information Forensics and Security, 2021, 16: 5264-5278.
- LUO H, LI G, HU L. On the security of RIS-assisted manipulating attack in MISO systems[C]//2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall). 2021: 1-5.
- HU L, LI G, LUO H, et al. On the RIS manipulating attack and its countermeasures in physical-layer key generation[C]//2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall). 2021: 1-5.
- ZHANG X, LI G, HOU Z, et al. Secret key generation for FDD systems based on complex-valued neural network[C]//2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall). 2021: 1-6.
- HU L, CHEN Y, LI G, et al. Exploiting artificial randomness for fast secret key generation in quasi-static environments[C]//2021 IEEE 6th International Conference on Signal and Image Processing (ICSIP). 2021: 985-989.
- LI G, SUN C, JORSWIECK E A, et al. Sum secret key rate maximization for TDD multi-user massive MIMO wireless networks[J]. IEEE Transactions on Information Forensics and Security, 2021, 16: 968-982.
- XING Y, WANG T, ZHOU F, et al. EVAL cane: Nonintrusive monitoring platform with a novel gait-based user-identification scheme[J]. IEEE Transactions on Instrumentation and Measurement, 2021, 70: 1-15.
- LI G, ZHANG Z, ZHANG J, et al. Encrypting wireless communications on the fly using one-time pad and key generation[J]. IEEE Internet of Things Journal, 2021, 8(1): 357-369.
- XU Y, HU A, LI G. LOBBY: A novel physical-layer key generation method[C]//Proceedings of the 2021 9th International Conference on Communications and Broadband Networking. 2021: 295-299.
- 宋宇波, 耿益瑾, 李古月, 等. 基于差分星座轨迹图的LoRa设备识别方法[J]. 信息网络安全, 2021, 21(1): 41-48.
- ZHOU X, HU A, LI G, et al. A robust radio-frequency fingerprint extraction scheme for practical device recognition[J]. IEEE Internet of Things Journal, 2021, 8(14): 11276-11289.
2020年
- CHEN Y, LI G, SUN C, et al. Beam-domain secret key generation for multi-user massive MIMO networks[C]//ICC 2020 - 2020 IEEE International Conference on Communications (ICC). 2020: 1-6.
- ZHANG J, LI G, MARSHALL A, et al. A new frontier for IoT security emerging from three decades of key generation relying on wireless channels[J]. IEEE Access, 2020, 8: 138406-138446.
- XING Y, HU A, ZHANG J, et al. Design of a robust radio-frequency fingerprint identification scheme for multimode LFM radar[J]. IEEE Internet of Things Journal, 2020, 7(10): 10581-10593.
- SUN C, LI G. Power allocation and beam scheduling for multi-user massive MIMO secret key generation[J]. IEEE Access, 2020, 8: 164580164592.
- 李古月, 俞佳宝, 胡爱群. 基于设备与信道特征的物理层安全方法[J]. 密 码学报, 2020, 7(2): 224-248.
- 袁瑞, 彭林宁, 李古月, 等. 不同环境下无线信道密钥生成性能研究[J]. 密码学报, 2020, 7(2): 261-273.
- SUN C, YANG H, LI G. AmpRmdr: Remainder-based secret key generation using wireless channel amplitude[J]. IEEE Access, 2020, 8: 228178228187.
2019年
- LI G, YU J, XING Y, et al. Location-invariant physical layer identification approach for WiFi devices[J]. IEEE Access, 2019, 7: 106974106986.
- YU J, HU A, ZHOU F, et al. Radio frequency fingerprint identification based on denoising autoencoders[C]//2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). 2019: 1-6.
- LIU B, HU A, LI G. Secret key generation scheme based on the channel covariance matrix eigenvalues in FDD systems[J]. IEEE Communications Letters, 2019, 23(9): 1493-1496.
- ZHANG J, DING M, LI G, et al. Key generation based on large scale fading[J]. IEEE Transactions on Vehicular Technology, 2019, 68(8): 8222-8226.
- PENG L, LI G, ZHANG J, et al. An investigation of using loop-back mechanism for channel reciprocity enhancement in secret key generation[J]. IEEE Transactions on Mobile Computing, 2019, 18(3): 507-519.
- YU J, HU A, LI G, et al. A multi-sampling convolutional neural network-based RF fingerprinting approach for low-power devices[C]// IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). 2019: 1-6.
- LI G, ZHANG Z, YU Y, et al. A hybrid information reconciliation method for physical layer key generation[J]. Entropy, 2019, 21(7).
- XING Y, HU A, YU J, et al. A robust radio frequency fingerprint identification scheme for LFM pulse radars[C]//2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). 2019: 1-6.
- ZHOU X, HU A, LI G, et al. Design of a robust RF fingerprint generation and classification scheme for practical device identification [C]//2019 IEEE Conference on Communications and Network Security (CNS). 2019: 196-204.
- LI G, HU L, HU A. Lightweight group secret key generation leveraging non-reconciled received signal strength in mobile wireless networks[C]// 2019 IEEE International Conference on Communications Workshops (ICC Workshops). 2019: 1-6.
- LI G, SUN C, ZHANG J, et al. Physical layer key generation in 5g and beyond wireless communications: Challenges and opportunities[J]. Entropy, 2019, 21(5).
- 胡爱群, 李古月, 彭林宁, 等. 融入思政的网络空间安全前沿技术教学探索[J]. 网络与信息安全学报, 2019, 5(3): 54-66.
- XING Y, HU A, YU J, et al. A robust radio frequency fingerprint identification scheme for LFM pulse radars[C]//2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). 2019: 1-6.
- YU J, HU A, LI G, et al. A robust RF fingerprinting approach using multisampling convolutional neural network[J]. IEEE Internet of Things Journal, 2019, 6(4): 6786-6799.
- ZHANG Z, LI G, HU A. An adaptive information reconciliation protocol for physical-layer based secret key generation[C]//2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring). 2019: 1-5.
2018年
- PENG L, LI G, ZHANG J, et al. Securing m2m transmissions using nonreconciled secret keys generated from wireless channels[C]//2018 IEEE Globecom Workshops (GC Wkshps). 2018: 1-6.
- LI G, HU A, SUN C, et al. Constructing reciprocal channel coefficients for secret key generation in FDD systems[J]. IEEE Communications Letters, 2018, 22(12): 2487-2490.
- LI G, HU A, ZHANG J, et al. High-agreement uncorrelated secret key generation based on principal component analysis preprocessing[J]. IEEE Transactions on Communications, 2018, 66(7): 3022-3034.
- HU L, HU A, LI G, et al. Lightweight group key distribution method based on high similar wireless channel characteristics[C]//2018 IEEE 18th International Conference on Communication Technology (ICCT). 2018: 140-144.
- XING Y, HU A, ZHANG J, et al. On radio frequency fingerprint identification for DSSS systems in low SNR scenarios[J]. IEEE Communications Letters, 2018, 22(11): 2326-2329.
2017年
- PENG L, LI G, HU A. Channel reciprocity improvement of secret key generation with loop-back transmissions[C]//2017 IEEE 17th International Conference on Communication Technology (ICCT). 2017: 193-198.
- LI G, HU A, ZHANG J, et al. Security analysis of a novel artificial randomness approach for fast key generation[C]//GLOBECOM 2017 - 2017 IEEE Global Communications Conference. 2017: 1-6.
- 李古月, 胡爱群. 基于K-L变换的无线信道密钥提取方法[J]. 东南大学学报(自然科学版), 2017, 47(2): 203-208.
2016年及之前
- LI G, HU A. MISO secrecy transmission via designing artificial noise by receiver under perfect and imperfect CSI[C]//2016 2nd IEEE International Conference on Computer and Communications (ICCC). 2016: 2664-2668.
- MINGFU X, AIQUN H, YI H, et al. Monte carlo based test pattern generation for hardware trojan detection[C]//2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing. 2013: 131-136.
- LI G, HU A, PENG L, et al. The optimal preprocessing approach for secret key generation from OFDM channel measurements[C]//2016 IEEE Globecom Workshops (GC Wkshps). 2016: 1-6.
- LI G, HU A. Virtual MIMO-based cooperative beamforming and jamming scheme for the clustered wireless sensor network security[C]//2016 2nd IEEE International Conference on Computer and Communications (ICCC). 2016: 2246-2250.
- 李古月, 胡爱群, 石乐. 无线信道的密钥生成方法[J]. 密码学报, 2014, 1 (3): 211-224.
- 胡爱群, 李古月. 无线通信物理层安全方法综述[J]. 数据采集与处理, 2014, 29(3): 341-350.
- LI G, HU A, HUANG Y. A novel artificial noise aided security scheme to resist blind source separation attacks[J]. Chinese Science Bulletin, 2014, 59(32): 4225-4234.
- LI G, HU A, ZOU Y, et al. A novel transform for secret key generation in time-varying TDD channel under hardware fingerprint deviation[C]//2015 IEEE 82nd Vehicular Technology Conference (VTC2015Fall). 2015: 1-5.
- LI G, HU A. An approach to resist blind source separation attacks of speech signals[J]. 2014 Communications Security Conference (CSC 2014): 13.
专利
- 吴天琦,李古月,宋宇波,王家恒, 一种用户隐私保持的持续认证协议, 202411483392.1.
李古月,张鹤鸣,罗弘毅,何骏昊,一种MIMO场景下基于射频指纹的空口接入识别方法,受理,202311165415X
李古月,李皓钰,胡爱群,一种抗RIS干扰攻击的宽带无线信道密钥生成方法 2023.05.18.中国CN202310563301.4
李古月,丛子晴,相璐,陈佑,蒋涛 一种应用于多用户大规模MIMO系统中的密钥生成方法 2020.08.11 中国CN201910729172.5(授权)
李古月,胡爱群,王栋,韩远致,李晶琪 基于主成分分析的信道互易性增强方法2019.04.30 中国 CN201610539867.3(授权)
李古月,胡爱群,李晶琪,王栋,韩远致 基于酉变换预处理的无线信道特征变级量化方法2016.10.12 中国 CN201610539956.8(授权)
胥英豪,李古月,胡爱群 一种MIMO-OFDM系统的主动信道密钥生成方法及系统2020.09.21 国际PCT/CN2020/116433
李古月,胥英豪,胡爱群 一种防近端窃听的主动信道密钥生成方法及系统2020.08.25 中国 CN202010343569.3
胥英豪,李古月,胡爱群 一种MIMO-OFDM系统的主动信道密钥生成方法及系统2020.08.18 中国 CN202010344216.5
李古月,胥英豪,胡爱群 一种基于矩阵特征值的主动信道密钥生成方法及系统2020.08.07 中国 CN202010343555.1
刘瑞之,李锦辉,刘余文,雷重庆,何川,李古月 一种基于接收信号强度的无线通信安全认证方法2020.04.17 中国 CN201911166170.6
李古月,丛子晴,相璐,陈佑,蒋涛 一种应用于多用户大规模MIMO系统中的密钥生成方法2019.09.20 国际PCT/CN2019/10688
李古月,杨海誉,何川 基于幅度取余的无线信道密钥随机性增强方法2019.08.23 中国 CN201910375302.X
李古月,胡爱群,张喆颖 一种基于初始密钥不一致率的生成密钥自适应调和方法2019.08.02 中国 CN201910333552.7
李古月,胡爱群,张喆颖 一种结合BBBSS协议与BCH码的生成密钥部分调和方法2019.07.30 中国 CN201910333854.4(授权)
胡爱群,俞佳宝,彭林宁,李古月 一种鲁棒的低功耗设备射频指纹识别方法2019.06.21 中国 CN201910080693.2
胡爱群,俞佳宝,李古月,彭林宁 一种基于多采样卷积神经网络的射频指纹提取和识别方法2019.06.21 中国 CN201910080034.9
胡爱群,刘博谦,李古月,一种频分双工系统中的密钥提取方法2019.04.12 中国 CN201910067771.5
李古月,胡爱群,刘博谦, 基于多径分离的频分双工系统中互易信道系数构建方法2019.01.25 中国 CN201810830831.X (授权)
李古月,胡爱群,刘博谦 ,一种基于路径相位差分的频分双工系统互易信道参数构建方法2018.12.18 中国 ZL201810830831.X (授权)
李古月,胡爱群,胡良君,基于无线信道特征的轻量级组密钥分发方法2021.03.05 中国 ZL201810513227.4(授权)
李古月,何川,胡爱群,庄浩宇,杨海誉,基于前导差分谱的OFDM设备识别方法及装置 2019.07.23 CN11-417701 B(授权)
李古月;张鑫伟;侯宗越;王星宇,一种基于深度学习的频分双工系统密钥生成方法,受理,2021.3.24,202110312897.1
李古月;罗弘毅;马艺耘;胡爱群,一种针对生物指纹强迫按压的检测方法,受理,2022.2.23,202210170301.3
李古月;杨丽琳;冯淑颖;胡爱群,基于辛变换的物理层密钥生成预处理方法,受理,2022.2.23,202210169400.X
- 李古月;汪文灏;马艺耘;靳佳琪,一种抗胁迫攻击的生物指纹认证方法及系统,受理,2022.08.15,202210972296.8
