How to Make 5G Communications" Invisible": Adversarial Machine Learning for Wireless Privacy

B Kim, YE Sagduyu, K Davaslioglu… - 2020 54th Asilomar …, 2020 - ieeexplore.ieee.org
We consider the problem of hiding wireless communications from an eavesdropper that
employs a deep learning (DL) classifier to detect whether any transmission of interest is
present or not. There exists one transmitter that transmits to its receiver in the presence of an
eavesdropper, while a cooperative jammer (CJ) transmits carefully crafted adversarial
perturbations over the air to fool the eavesdropper into classifying the received
superposition of signals as noise. The CJ puts an upper bound on the strength of …

[引用][C] How to make 5G communications “invisible” adversarial machine learning for wireless privacy,” 2020, available on

B Kim, YE Sagduyu, K Davaslioglu, T Erpek, S Ulukus - arXiv preprint arXiv:2005.07675
以上显示的是最相近的搜索结果。 查看全部搜索结果