Adversarial machine learning in wireless communications using RF data: A review

D Adesina, CC Hsieh, YE Sagduyu… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Machine learning (ML) provides effective means to learn from spectrum data and solve
complex tasks involved in wireless communications. Supported by recent advances in …

Considerations, advances, and challenges associated with the use of specific emitter identification in the security of internet of things deployments: A survey

JH Tyler, MKM Fadul, DR Reising - Information, 2023 - mdpi.com
Initially introduced almost thirty years ago for the express purpose of providing electronic
warfare systems the capabilities to detect, characterize, and identify radar emitters, Specific …

Robust adversarial attacks against DNN-based wireless communication systems

A Bahramali, M Nasr, A Houmansadr… - Proceedings of the …, 2021 - dl.acm.org
There is significant enthusiasm for the employment of Deep Neural Networks (DNNs) for
important tasks in major wireless communication systems: channel estimation and decoding …

Data augmentation with conditional GAN for automatic modulation classification

M Patel, X Wang, S Mao - Proceedings of the 2nd ACM Workshop on …, 2020 - dl.acm.org
Deep learning has great potential for automatic modulation classification (AMC). However,
its performance largely hinges upon the availability of sufficient high-quality labeled data. In …

Penetrating RF fingerprinting-based authentication with a generative adversarial attack

S Karunaratne, E Krijestorac… - ICC 2021-IEEE …, 2021 - ieeexplore.ieee.org
Physical layer authentication relies on detecting unique imperfections in signals transmitted
by radio devices to isolate their fingerprint. Recently, deep learning-based authenticators …

An rfml ecosystem: Considerations for the application of deep learning to spectrum situational awareness

LJ Wong, WH Clark, B Flowers… - IEEE Open Journal …, 2021 - ieeexplore.ieee.org
While deep learning (DL) technologies are now pervasive in state-of-the-art Computer
Vision (CV) and Natural Language Processing (NLP) applications, only in recent years have …

How to Attack and Defend NextG Radio Access Network Slicing with Reinforcement Learning

Y Shi, YE Sagduyu, T Erpek, MC Gursoy - arXiv preprint arXiv:2101.05768, 2021 - arxiv.org
In this paper, reinforcement learning (RL) for network slicing is considered in NextG radio
access networks, where the base station (gNodeB) allocates resource blocks (RBs) to the …

The rfml ecosystem: A look at the unique challenges of applying deep learning to radio frequency applications

LJ Wong, WH Clark IV, B Flowers, RM Buehrer… - arXiv preprint arXiv …, 2020 - arxiv.org
While deep machine learning technologies are now pervasive in state-of-the-art image
recognition and natural language processing applications, only in recent years have these …

Wild networks: Exposure of 5G network infrastructures to adversarial examples

G Apruzzese, R Vladimirov… - … on Network and …, 2022 - ieeexplore.ieee.org
Fifth Generation (5G) networks must support billions of heterogeneous devices while
guaranteeing optimal Quality of Service (QoS). Such requirements are impossible to meet …

Learn to defend: Adversarial multi-distillation for automatic modulation recognition models

Z Chen, Z Wang, D Xu, J Zhu, W Shen… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Automatic modulation recognition (AMR) of radio signal is an important research topic in the
area of non-cooperative communication and cognitive radio. Recently deep learning (DL) …