2021
DOI: 10.1109/tr.2020.3032744
|View full text |Cite
|
Sign up to set email alerts
|

Adversarial Attacks in Modulation Recognition With Convolutional Neural Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
47
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
4

Relationship

3
7

Authors

Journals

citations
Cited by 174 publications
(48 citation statements)
references
References 30 publications
1
47
0
Order By: Relevance
“…As shown in Fig. 6, with the increase of the SNR, the accuracy of the model shows a trend of first gradually improving, and then fluctuating near a certain value, which also is also verified in [37]. The classifier on the fake signals generated by JSMA, UAP, FGSM, BIM and FDPA achieve the accuracy of 44.74%, 61.46%, 47.31%, 70.31% and 68.16%, respectively.…”
Section: F Comparison With Other Attackerssupporting
confidence: 60%
“…As shown in Fig. 6, with the increase of the SNR, the accuracy of the model shows a trend of first gradually improving, and then fluctuating near a certain value, which also is also verified in [37]. The classifier on the fake signals generated by JSMA, UAP, FGSM, BIM and FDPA achieve the accuracy of 44.74%, 61.46%, 47.31%, 70.31% and 68.16%, respectively.…”
Section: F Comparison With Other Attackerssupporting
confidence: 60%
“…With the coming of the 6G era, many advanced technologies have been extensively researched, such as artificial intelligence technology [1], image processing technology [2], intelligent integration technology [3], and wireless communication technology [4], which have also promoted the development of the IoT field. The application of IoT technology is becoming more and more important.…”
Section: Introductionmentioning
confidence: 99%
“…Because the physiothermal channel of wireless communications is open, the modulation signal containing important information is fully exposed and an attacker can retrieve important signal information by utilizing a blind signal processing technology, which poses a serious threat to legal communication that makes signal data available. For this issue, Reference [13] discusses the performance of a modulation recognition attack method, measures the effectiveness of adversarial attack on signal, and empirically evaluates the reliability of CNN. In particular, privacy and safety are crucial.…”
Section: Introductionmentioning
confidence: 99%