“…Overall, AML is an emerging field that studies machine learning (ML) in the presence of adversaries that may aim to manipulate the test and/or training pipelines of ML algorithms [ 7 , 8 , 9 ]. While the applications of AML have originated in the computer vision domain, there has been a growing interest in applying AML to wireless communications [ 10 , 11 , 12 ], including exploratory (inference) attacks [ 13 , 14 ], evasion (adversarial) attacks [ 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 ] and their extensions to secure and covert communications against eavesdroppers [ 34 , 35 , 36 , 37 ], causative (poisoning) attacks [ 38 , 39 , 40 ], membership inference attacks [ 41 , 42 ], Trojan attacks [ 43 ], and spoofing attacks [ 44 , 45 , 46 , 47 ].…”