Secure wireless communication via adversarial machine learning: A Priori vs. A Posteriori

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 373
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorSeo, Junghaako
dc.contributor.authorPark, Sangwooko
dc.contributor.authorKang, Joonhyukko
dc.date.accessioned2022-06-27T09:01:28Z-
dc.date.available2022-06-27T09:01:28Z-
dc.date.created2022-06-27-
dc.date.created2022-06-27-
dc.date.created2022-06-27-
dc.date.created2022-06-27-
dc.date.created2022-06-27-
dc.date.issued2022-06-
dc.identifier.citationICT EXPRESS, v.8, no.2, pp.220 - 224-
dc.identifier.issn2405-9595-
dc.identifier.urihttp://hdl.handle.net/10203/297107-
dc.description.abstractThis paper considers wireless communication system consisted of one transmitter, one legitimate receiver, and one eavesdropper. The transmitter transmits perturbation-added signal (i.e. adversarial example) with a certain modulation type, while the legitimate receiver and the eavesdropper adopt deep neural networks (DNN)-based classifier to recognize the modulation type of the received signal. Compared to the fact that the general goal of adversarial examples being a misclassification of all available classifiers, our objective is to design an adversarial example that lets the legitimate receiver classify accurately while the eavesdropper misclassifies. To this end, we propose two design approaches of the adversarial examples: (i) A priori; (ii) A posteriori, i.e. before and after learning steps of the receiver, respectively. Numerical results show that both approaches are effective for securing the communication link. (C) 2021 The Korean Institute of Communications and Information Sciences (KICS).-
dc.languageEnglish-
dc.publisherELSEVIER-
dc.titleSecure wireless communication via adversarial machine learning: A Priori vs. A Posteriori-
dc.typeArticle-
dc.identifier.wosid000810442900011-
dc.identifier.scopusid2-s2.0-85110474790-
dc.type.rimsART-
dc.citation.volume8-
dc.citation.issue2-
dc.citation.beginningpage220-
dc.citation.endingpage224-
dc.citation.publicationnameICT EXPRESS-
dc.identifier.doi10.1016/j.icte.2021.06.005-
dc.identifier.kciidART002859080-
dc.contributor.localauthorKang, Joonhyuk-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorWireless communication-
dc.subject.keywordAuthorAdversarial example-
dc.subject.keywordAuthorMachine learning-
dc.subject.keywordAuthorModulation recognition-
Appears in Collection
EE-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0