2022
DOI: 10.3390/e24081047
|View full text |Cite
|
Sign up to set email alerts
|

Adversarial Machine Learning for NextG Covert Communications Using Multiple Antennas

Abstract: This paper studies the privacy of wireless communications from an eavesdropper that employs a deep learning (DL) classifier to detect transmissions of interest. There exists one transmitter that transmits to its receiver in the presence of an eavesdropper. In the meantime, a cooperative jammer (CJ) with multiple antennas transmits carefully crafted adversarial perturbations over the air to fool the eavesdropper into classifying the received superposition of signals as noise. While generating the adversarial pe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 51 publications
0
1
0
Order By: Relevance
“…In this setting, a single transmitter communicates with its receiver while an eavesdropper is present. To counter the eavesdropper, a cooperative jammer (CJ) (potentially with multiple antennas [25]) transmits carefully crafted adversarial perturbations to deceive the eavesdropper into classifying the received signal as noise. This constitutes an evasion or adversarial attack within the realm of AML.…”
Section: Related Workmentioning
confidence: 99%
“…In this setting, a single transmitter communicates with its receiver while an eavesdropper is present. To counter the eavesdropper, a cooperative jammer (CJ) (potentially with multiple antennas [25]) transmits carefully crafted adversarial perturbations to deceive the eavesdropper into classifying the received signal as noise. This constitutes an evasion or adversarial attack within the realm of AML.…”
Section: Related Workmentioning
confidence: 99%