1: \begin{abstract}
2: In \ac{pla} mechanisms, a verifier decides whether a received message has been transmitted by a legitimate user or an intruder, according to some features of the physical channel over which the message traveled. To design the authentication check implemented at the verifier, typically either the statistics or a dataset of features are available for the channel from the legitimate user, while no information is available when under attack. When the statistics are known, a well-known good solution is the \ac{lt}. When a dataset is available, the decision problem is \ac{occ} and a good understanding of the \ac{ml} techniques used for its solution is important to ensure security. Thus, in this paper, we aim at obtaining \ac{ml} \ac{pla} verifiers that operate as the \ac{lt}. We show how to do it with the \ac{nn} and the \ac{oclssvm} models, trained as two-class classifiers on the single-class dataset and an artificial dataset. The artificial dataset for the negative class is obtained by generating \ac{cf} vectors uniformly distributed over the domain of the legitimate class dataset. We also derive a modified \ac{sgd} algorithm that trains a \ac{pla} verifier operating as \ac{lt} without the need for the artificial dataset. Furthermore, we show that the \acl{oclssvm} with suitable kernels operates as the \ac{lt} at convergence. Lastly, we show that the widely used \acl{ae} classifier generally does not provide the \ac{lt}. Numerical results are provided considering \ac{pla} on both wireless and underwater acoustic channels.
3: \end{abstract}
4: