ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1905.01430
  4. Cited By
When Attackers Meet AI: Learning-empowered Attacks in Cooperative
  Spectrum Sensing

When Attackers Meet AI: Learning-empowered Attacks in Cooperative Spectrum Sensing

4 May 2019
Z. Luo
Shangqing Zhao
Zhuo Lu
Jie Xu
Y. Sagduyu
    AAML
ArXivPDFHTML

Papers citing "When Attackers Meet AI: Learning-empowered Attacks in Cooperative Spectrum Sensing"

11 / 11 papers shown
Title
Wild Networks: Exposure of 5G Network Infrastructures to Adversarial
  Examples
Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples
Giovanni Apruzzese
Rodion Vladimirov
A.T. Tastemirova
Pavel Laskov
AAML
40
15
0
04 Jul 2022
SecureSense: Defending Adversarial Attack for Secure Device-Free Human
  Activity Recognition
SecureSense: Defending Adversarial Attack for Secure Device-Free Human Activity Recognition
Jianfei Yang
Han Zou
Lihua Xie
AAML
HAI
30
20
0
04 Apr 2022
Machine Learning in NextG Networks via Generative Adversarial Networks
Machine Learning in NextG Networks via Generative Adversarial Networks
E. Ayanoglu
Kemal Davaslioglu
Y. Sagduyu
GAN
24
34
0
09 Mar 2022
When Machine Learning Meets Spectrum Sharing Security: Methodologies and
  Challenges
When Machine Learning Meets Spectrum Sharing Security: Methodologies and Challenges
Qun Wang
Haijian Sun
R. Hu
Arupjyoti Bhuyan
31
23
0
12 Jan 2022
Adversarial Attacks against Deep Learning Based Power Control in
  Wireless Communications
Adversarial Attacks against Deep Learning Based Power Control in Wireless Communications
Brian Kim
Yi Shi
Y. Sagduyu
T. Erpek
S. Ulukus
AAML
25
27
0
16 Sep 2021
Membership Inference Attack and Defense for Wireless Signal Classifiers
  with Deep Learning
Membership Inference Attack and Defense for Wireless Signal Classifiers with Deep Learning
Yi Shi
Y. Sagduyu
19
16
0
22 Jul 2021
How to Make 5G Communications "Invisible": Adversarial Machine Learning
  for Wireless Privacy
How to Make 5G Communications "Invisible": Adversarial Machine Learning for Wireless Privacy
Brian Kim
Y. Sagduyu
Kemal Davaslioglu
T. Erpek
S. Ulukus
AAML
17
29
0
15 May 2020
Channel-Aware Adversarial Attacks Against Deep Learning-Based Wireless
  Signal Classifiers
Channel-Aware Adversarial Attacks Against Deep Learning-Based Wireless Signal Classifiers
Brian Kim
Y. Sagduyu
Kemal Davaslioglu
T. Erpek
S. Ulukus
AAML
23
111
0
11 May 2020
Over-the-Air Adversarial Attacks on Deep Learning Based Modulation
  Classifier over Wireless Channels
Over-the-Air Adversarial Attacks on Deep Learning Based Modulation Classifier over Wireless Channels
Brian Kim
Y. Sagduyu
Kemal Davaslioglu
T. Erpek
S. Ulukus
AAML
48
68
0
05 Feb 2020
When Wireless Security Meets Machine Learning: Motivation, Challenges,
  and Research Directions
When Wireless Security Meets Machine Learning: Motivation, Challenges, and Research Directions
Y. Sagduyu
Yi Shi
T. Erpek
William C. Headley
Bryse Flowers
G. Stantchev
Zhuo Lu
AAML
20
39
0
24 Jan 2020
Adversarial examples in the physical world
Adversarial examples in the physical world
Alexey Kurakin
Ian Goodfellow
Samy Bengio
SILM
AAML
326
5,847
0
08 Jul 2016
1