2020
DOI: 10.48550/arxiv.2012.14392
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Adversarial Machine Learning in Wireless Communications using RF Data: A Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4

Relationship

4
5

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 145 publications
(139 reference statements)
0
8
0
Order By: Relevance
“…Although the susceptibility of deep learning AMC classifiers to evasion attacks has been demonstrated in prior work [12]- [15], relatively few defenses have been proposed to mitigate the effects of adversarial interference [29]. The defense algorithms which have been proposed for AMC DL classifiersadversarial training [30], [31], Gaussian smoothing [32], [33], and autoencoder pre-training [34] -have each demonstrated degraded performance in black box environments.…”
Section: Related Workmentioning
confidence: 99%
“…Although the susceptibility of deep learning AMC classifiers to evasion attacks has been demonstrated in prior work [12]- [15], relatively few defenses have been proposed to mitigate the effects of adversarial interference [29]. The defense algorithms which have been proposed for AMC DL classifiersadversarial training [30], [31], Gaussian smoothing [32], [33], and autoencoder pre-training [34] -have each demonstrated degraded performance in black box environments.…”
Section: Related Workmentioning
confidence: 99%
“…In general, ML is known to be susceptible to manipulations of the inputs in training and test times, as commonly studied under adversarial machine learning (AML) [15]. AML attacks have been applied to the wireless domain [16]- [18]. These attacks include inference (exploratory) attacks [19]- [21], evasion (adversarial) attacks [22]- [42], poisoning (causative) attacks [43]- [47], Trojan attacks [48], spoofing attacks [49]- [52], membership inference attacks [53], [54], and attacks to facilitate covert communications [55]- [57].…”
Section: Introductionmentioning
confidence: 99%
“…Due to the shared and open nature of wireless medium, wireless applications are highly susceptible to adversaries such as jammers and eavesdroppers that can manipulate the training and testing processes of machine learning over the air. While there is a growing interest in designing attacks on machine learningdriven data and control planes of wireless communications [6]- [9], adversarial machine learning has not been considered yet for sophisticated communication systems such as 5G.…”
Section: Introductionmentioning
confidence: 99%