2023
DOI: 10.1109/comst.2023.3319492
|View full text |Cite
|
Sign up to set email alerts
|

Adversarial Attacks and Defenses in Machine Learning-Empowered Communication Systems and Networks: A Contemporary Survey

Yulong Wang,
Tong Sun,
Shenghong Li
et al.
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(6 citation statements)
references
References 276 publications
0
6
0
Order By: Relevance
“…To this aim, several specific query strategies exist depending on the type of model to be attacked, for instance, support vector machines [6], or deep neural networks [7,35,36,37,38]. dataset in the quality of the replica and the effect of pruning the mimetic model (a decision tree) on its comprehensibility [40], developing also an MML-based strategy [41] to minimise the number of queries.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…To this aim, several specific query strategies exist depending on the type of model to be attacked, for instance, support vector machines [6], or deep neural networks [7,35,36,37,38]. dataset in the quality of the replica and the effect of pruning the mimetic model (a decision tree) on its comprehensibility [40], developing also an MML-based strategy [41] to minimise the number of queries.…”
Section: Related Workmentioning
confidence: 99%
“…(Deep) Neural Networks [7], Naive Bayes [8], and even various online prediction APIs [9]. Knowing the model's family can thus help predict its vulnerabilities and promote more comprehensive defence strategies against adversarial attacks [10,11].…”
Section: Introductionmentioning
confidence: 99%
“…Relay-based networks are increasingly utilized in device-to-device and dronecell networks for enhanced capacity and coverage, utilizing MDPs to assess performance metrics like transmission time, buffer overflow, and effective throughput [20]. The research findings in [21] demonstrate that adversarial assaults have the potential to exploit vulnerabilities in machine learning and deep neural network-based algorithms, namely in the domains of wireless signal categorization, modulation scheme detection, and MIMO network resource allocation.…”
Section: B Existing Work In Security Involving Network Slicing and Ma...mentioning
confidence: 99%
“…Further discussions extend to offering a literature review and proposing future research directions to address existing gaps [6]. A detailed survey of adversarial attacks and defenses in ML-empowered communication systems highlights the ongoing arms race between attackers and defenders [7]. The application of ML in network anomaly detection includes various techniques and their effectiveness in identifying unusual patterns indicative of cyber threats [8].…”
Section: Introductionmentioning
confidence: 99%