Adversarial Machine Learning for 5G Communications Security.

作者: Yalin E Sagduyu , Tugba Erpek , Yi Shi , None

DOI:

关键词: Adversarial machine learningAdversaryCommunications securityDeep learningAuthenticationAttack surfaceWirelessComputer scienceComputer securityArtificial intelligenceCognitive radioCommunications system

摘要: … Radar signal detection and classification is a complex problem … compared to conventional signal detection and classification … we apply adversarial attacks in wireless communications. …

参考文章(68)
David Warde-Farley, Yoshua Bengio, Ian J. Goodfellow, Sherjil Ozair, Aaron Courville, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, Generative Adversarial Networks arXiv: Machine Learning. ,(2014)
Yalin Evren Sagduyu, Anthony Ephremides, A game-theoretic analysis of denial of service attacks in wireless random access Wireless Networks. ,vol. 15, pp. 651- 666 ,(2009) , 10.1007/S11276-007-0088-8
Yalin Sagduyu, Randall Berry, Anthony Ephremides, Jamming games in wireless networks with incomplete information IEEE Communications Magazine. ,vol. 49, pp. 112- 118 ,(2011) , 10.1109/MCOM.2011.5978424
Yalin Evren Sagduyu, Randall A. Berryt, Anthony Ephremidesi, Wireless jamming attacks under dynamic traffic uncertainty modeling and optimization in mobile, ad-hoc and wireless networks. pp. 303- 312 ,(2010)
Marco Barreno, Blaine Nelson, Russell Sears, Anthony D. Joseph, J. D. Tygar, Can machine learning be secure? Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS '06. pp. 16- 25 ,(2006) , 10.1145/1128817.1128824
Nicolas Papernot, Patrick McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik, Ananthram Swami, The Limitations of Deep Learning in Adversarial Settings ieee european symposium on security and privacy. pp. 372- 387 ,(2016) , 10.1109/EUROSP.2016.36
Seyed-Mohsen Moosavi-Dezfooli, Alhussein Fawzi, Pascal Frossard, DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks computer vision and pattern recognition. pp. 2574- 2582 ,(2016) , 10.1109/CVPR.2016.282
Nicolas Papernot, Ian J. Goodfellow, Patrick D. McDaniel, Ananthram Swami, Somesh Jha, Z. Berkay Celik, Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples. arXiv: Cryptography and Security. ,(2016)
Ian Goodfellow, Samy Bengio, Alexey Kurakin, Adversarial examples in the physical world arXiv: Computer Vision and Pattern Recognition. ,(2016)