“…In this setting, a single transmitter communicates with its receiver while an eavesdropper is present. To counter the eavesdropper, a cooperative jammer (CJ) (potentially with multiple antennas [25]) transmits carefully crafted adversarial perturbations to deceive the eavesdropper into classifying the received signal as noise. This constitutes an evasion or adversarial attack within the realm of AML.…”