Fig. 2From: PHYAlert: identity spoofing attack detection and prevention for a wireless edge networka CSI amplitude graph of 3000 received frames including frames injected by an attack. b and c CSI distribution I/Q view for the 20th subcarrier of the first and second half of the frames, respectivelyBack to article page