Adversarial attacks and defenses in machine learning-empowered communication systems and networks: A contemporary survey

Y Wang, T Sun, S Li, X Yuan, W Ni… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Adversarial attacks and defenses in machine learning and deep neural network (DNN) have
been gaining significant attention due to the rapidly growing applications of deep learning in …

“real attackers don't compute gradients”: bridging the gap between adversarial ml research and practice

G Apruzzese, HS Anderson, S Dambra… - … IEEE Conference on …, 2023 - ieeexplore.ieee.org
Recent years have seen a proliferation of research on adversarial machine learning.
Numerous papers demonstrate powerful algorithmic attacks against a wide variety of …

[HTML][HTML] Misconfiguration in O-RAN: Analysis of the impact of AI/ML

NM Yungaicela-Naula, V Sharma, S Scott-Hayward - Computer Networks, 2024 - Elsevier
User demand on network communication infrastructure has never been greater with
applications such as extended reality, holographic telepresence, and wireless brain …

Schemes of attacks on machine learning models

D Namiot - International Journal of Open Information Technologies, 2023 - injoit.ru
This article discusses attack schemes on artificial intelligence systems (on machine learning
models). Classically, attacks on machine learning systems are special data modifications at …

ScasDK-A Development Kit for Security Assurance test in Multi-Network-Function 5G

F Mancini, G Bianchi - Proceedings of the 18th International Conference …, 2023 - dl.acm.org
To ensure 5G infrastructure security, standardized Security Assurance Specification (SCAS)
tests are being developed by 3GPP. However, executing these tests on complex 5G …

From NEA and NIA to NESAS and SCAS: Demystifying the 5G Security Ecosystem

A Michalas, C Patsakis, DD Vergados… - arXiv preprint arXiv …, 2022 - arxiv.org
Despite the numerous pompous statements regarding 5G, it is indisputable that 5G creates a
radical shift in telecommunications. The main reason is that 5G is an enabler of numerous …

DASTAN-CNN: RF Fingerprinting for the Mitigation of Membership Inference Attacks in 5G

SA Khowaja, P Khuwaja, K Dev… - … 2023-2023 IEEE …, 2023 - ieeexplore.ieee.org
The fifth generation (5G) networks are designed to support a large range of diverse services
with strict performance requirements. Studies suggest that, 5G uses machine learning …

Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring

MN Hoq, JW Yao, S Majumdar, L Suárez… - … on Research in …, 2023 - Springer
Abstract 5G network technology is being rapidly adopted in various critical infrastructures,
mainly due to its unique benefits (eg, higher throughput, lower latency, and better …

[HTML][HTML] СХЕМЫ АТАК НА МОДЕЛИ МАШИННОГО ОБУЧЕНИЯ

ДЕ Намиот - International Journal of Open Information …, 2023 - cyberleninka.ru
В настоящей статье рассматриваются схемы атак на системы искусственного
интеллекта (на модели машинного обучения). Классически, атаки на системы …

Analysis of neural network detectors for network attacks

Q Zou, L Zhang, A Singhal, X Sun… - Journal of Computer …, 2023 - content.iospress.com
While network attacks play a critical role in many advanced persistent threat (APT)
campaigns, an arms race exists between the network defenders and the adversary: to make …