Review Article

A Survey of User Authentication Based on Channel State Information

Figure 6

The illustration of LSTM.