Targeted adversarial examples against RF deep classifiers S Kokalj-Filipovic, R Miller, J Morman Proceedings of the ACM Workshop on Wireless Security and Machine Learning, 6-11, 2019 | 55 | 2019 |
Mitigation of adversarial examples in rf deep classifiers utilizing autoencoder pre-training S Kokalj-Filipovic, R Miller, N Chang, CL Lau 2019 International Conference on Military Communications and Information …, 2019 | 51 | 2019 |
Adversarial examples in RF deep learning: Detection and physical robustness S Kokalj-Filipovic, R Miller, G Vanhoy 2019 IEEE Global Conference on Signal and Information Processing (GlobalSIP …, 2019 | 45 | 2019 |
Adversarial examples in RF deep learning: detection of the attack and its physical robustness S Kokalj-Filipovic, R Miller arXiv preprint arXiv:1902.06044, 2019 | 35 | 2019 |
Doped fountain coding for minimum delay data collection in circular networks S Kokalj-Filipovic, P Spasojevic, E Soljanin IEEE Journal on Selected Areas in Communications 27 (5), 673-684, 2009 | 28 | 2009 |
ARQ with doped fountain decoding S Kokalj-Filipovic, P Spasojevic, E Soljanin, R Yates 2008 IEEE 10th International Symposium on Spread Spectrum Techniques and …, 2008 | 25 | 2008 |
Suppressing the cliff effect in video reproduction quality S Kokalj-Filipović, E Soljanin Bell Labs Technical Journal 16 (4), 171-185, 2012 | 24 | 2012 |
Cliff effect suppression through multiple-descriptions with split personality S Kokalj-Filipović, E Soljanin, Y Gao 2011 IEEE International Symposium on Information Theory Proceedings, 948-952, 2011 | 21 | 2011 |
Methods for extracting V2V propagation models from imperfect RSSI field data S Kokalj-Filipovic, L Greenstein, B Cheng, M Gruteser 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall), 1-5, 2015 | 17 | 2015 |
The quality of source location protection in globally attacked sensor networks S Kokalj-Filipović, F Le Fessant, P Spasojević 2011 IEEE International Conference on Pervasive Computing and Communications …, 2011 | 14 | 2011 |
Large Scale Radio Frequency Signal Classification L Boegner, M Gulati, G Vanhoy, P Vallance, B Comar, S Kokalj-Filipovic, ... arXiv preprint arXiv:2207.09918, 2022 | 13 | 2022 |
Autoencoders for training compact deep learning rf classifiers for wireless protocols S Kokalj-Filipovic, R Miller, J Morman 2019 IEEE 20th International Workshop on Signal Processing Advances in …, 2019 | 12 | 2019 |
Decentralized fountain codes for minimum-delay data collection S Kokalj-Filipovic, P Spasojevic, R Yates, E Soljanin 2008 42nd Annual Conference on Information Sciences and Systems, 545-550, 2008 | 11 | 2008 |
Policy based synthesis: Data generation and augmentation methods for rf machine learning RD Miller, S Kokalj-Filipovic, G Vanhoy, J Morman 2019 IEEE Global Conference on Signal and Information Processing (GlobalSIP …, 2019 | 8 | 2019 |
Learning structural properties of wireless ad-hoc networks non-parametrically from spectral activity samples S Kokalj-Filipovic, CB Acosta, M Pepe 2016 IEEE Global Conference on Signal and Information Processing (GlobalSIP …, 2016 | 7 | 2016 |
Bespoken protocol for data dissemination in wireless sensor networks S Kokalj-Filipovic, P Spasojevic, R Yates 2007 5th International Symposium on Modeling and Optimization in Mobile, Ad …, 2007 | 7 | 2007 |
Inaudible manipulation of voice-enabled devices through backdoor using robust adversarial audio attacks M Kasher, M Zhao, A Greenberg, D Gulati, S Kokalj-Filipovic, ... Proceedings of the 3rd ACM Workshop on Wireless Security and Machine …, 2021 | 6 | 2021 |
Deep delay loop reservoir computing for specific emitter identification S Kokalj-Filipovic, P Toliver, W Johnson, RR Hoare II, JJ Jezak arXiv preprint arXiv:2010.06649, 2020 | 6 | 2020 |
Detecting acoustic backdoor transmission of inaudible messages using deep learning S Kokalj-Filipovic, M Kasher, M Zhao, P Spasojevic Proceedings of the 2nd ACM Workshop on Wireless Security and Machine …, 2020 | 6 | 2020 |
V2V propagation modeling with imperfect RSSI samples S Kokalj-Filipovic, L Greenstein, B Cheng, M Gruteser arXiv preprint arXiv:1409.1846, 2014 | 6 | 2014 |