ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2409.02430
  4. Cited By
Transfer-based Adversarial Poisoning Attacks for Online (MIMO-)Deep
  Receviers

Transfer-based Adversarial Poisoning Attacks for Online (MIMO-)Deep Receviers

4 September 2024
Kunze Wu
Weiheng Jiang
Dusit Niyato
Yinghuan Li
Chuang Luo
    AAML
ArXivPDFHTML

Papers citing "Transfer-based Adversarial Poisoning Attacks for Online (MIMO-)Deep Receviers"

18 / 18 papers shown
Title
Rethinking Model Ensemble in Transfer-based Adversarial Attacks
Rethinking Model Ensemble in Transfer-based Adversarial Attacks
Huanran Chen
Yichi Zhang
Yinpeng Dong
Xiao Yang
Hang Su
Junyi Zhu
AAML
55
65
0
16 Mar 2023
Adversarial Attacks are a Surprisingly Strong Baseline for Poisoning
  Few-Shot Meta-Learners
Adversarial Attacks are a Surprisingly Strong Baseline for Poisoning Few-Shot Meta-Learners
E. T. Oldewage
J. Bronskill
Richard Turner
54
3
0
23 Nov 2022
T-SEA: Transfer-based Self-Ensemble Attack on Object Detection
T-SEA: Transfer-based Self-Ensemble Attack on Object Detection
Hao Huang
Ziyan Chen
Huanran Chen
Yongtao Wang
Ke-Yue Zhang
AAML
71
59
0
16 Nov 2022
ML Attack Models: Adversarial Attacks and Data Poisoning Attacks
ML Attack Models: Adversarial Attacks and Data Poisoning Attacks
Jing Lin
Long Dang
Mohamed Rahouti
Kaiqi Xiong
AAML
44
48
0
06 Dec 2021
Adversarial Examples Make Strong Poisons
Adversarial Examples Make Strong Poisons
Liam H. Fowl
Micah Goldblum
Ping Yeh-Chiang
Jonas Geiping
Wojtek Czaja
Tom Goldstein
SILM
80
135
0
21 Jun 2021
Robust Adversarial Attacks Against DNN-Based Wireless Communication
  Systems
Robust Adversarial Attacks Against DNN-Based Wireless Communication Systems
Alireza Bahramali
Milad Nasr
Amir Houmansadr
Dennis Goeckel
Don Towsley
AAML
64
55
0
01 Feb 2021
DeepRx: Fully Convolutional Deep Learning Receiver
DeepRx: Fully Convolutional Deep Learning Receiver
Mikko Honkala
D. Korpi
Janne M. J. Huttunen
81
137
0
04 May 2020
Adversarial Deep Learning for Over-the-Air Spectrum Poisoning Attacks
Adversarial Deep Learning for Over-the-Air Spectrum Poisoning Attacks
Y. Sagduyu
Yi Shi
T. Erpek
AAML
50
83
0
01 Nov 2019
ViterbiNet: A Deep Learning Based Viterbi Algorithm for Symbol Detection
ViterbiNet: A Deep Learning Based Viterbi Algorithm for Symbol Detection
Nir Shlezinger
Nariman Farsad
Yonina C. Eldar
Andrea J. Goldsmith
46
143
0
26 May 2019
Data Poisoning Attacks against Online Learning
Data Poisoning Attacks against Online Learning
Yizhen Wang
Kamalika Chaudhuri
AAML
59
92
0
27 Aug 2018
Improving Transferability of Adversarial Examples with Input Diversity
Improving Transferability of Adversarial Examples with Input Diversity
Cihang Xie
Zhishuai Zhang
Yuyin Zhou
Song Bai
Jianyu Wang
Zhou Ren
Alan Yuille
AAML
97
1,116
0
19 Mar 2018
Deep Learning for Joint Source-Channel Coding of Text
Deep Learning for Joint Source-Channel Coding of Text
Nariman Farsad
Milind Rao
Andrea J. Goldsmith
51
348
0
19 Feb 2018
Towards Poisoning of Deep Learning Algorithms with Back-gradient
  Optimization
Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization
Luis Muñoz-González
Battista Biggio
Ambra Demontis
Andrea Paudice
Vasin Wongrassamee
Emil C. Lupu
Fabio Roli
AAML
96
630
0
29 Aug 2017
Towards Deep Learning Models Resistant to Adversarial Attacks
Towards Deep Learning Models Resistant to Adversarial Attacks
Aleksander Madry
Aleksandar Makelov
Ludwig Schmidt
Dimitris Tsipras
Adrian Vladu
SILM
OOD
269
12,029
0
19 Jun 2017
Model-Agnostic Meta-Learning for Fast Adaptation of Deep Networks
Model-Agnostic Meta-Learning for Fast Adaptation of Deep Networks
Chelsea Finn
Pieter Abbeel
Sergey Levine
OOD
806
11,866
0
09 Mar 2017
An Introduction to Deep Learning for the Physical Layer
An Introduction to Deep Learning for the Physical Layer
Tim O'Shea
J. Hoydis
AI4CE
128
2,194
0
02 Feb 2017
Delving into Transferable Adversarial Examples and Black-box Attacks
Delving into Transferable Adversarial Examples and Black-box Attacks
Yanpei Liu
Xinyun Chen
Chang-rui Liu
D. Song
AAML
133
1,731
0
08 Nov 2016
Adam: A Method for Stochastic Optimization
Adam: A Method for Stochastic Optimization
Diederik P. Kingma
Jimmy Ba
ODL
1.4K
149,842
0
22 Dec 2014
1