Deep Learning for Launching and Mitigating Wireless Jamming Attacks
暂无分享,去创建一个
Yalin E. Sagduyu | Yi Shi | Tugba Erpek | Yi Shi | Y. Sagduyu | T. Erpek
[1] Fabio Roli,et al. Evasion Attacks against Machine Learning at Test Time , 2013, ECML/PKDD.
[2] Kemal Davaslioglu,et al. Adversarial Deep Learning for Cognitive Radio Security: Jamming Attack and Defense Strategies , 2018, 2018 IEEE International Conference on Communications Workshops (ICC Workshops).
[3] Timothy J. O'Shea,et al. Applications of Machine Learning to Cognitive Radio Networks , 2007, IEEE Wireless Communications.
[4] Yalin E. Sagduyu,et al. Defending active learning against adversarial inputs in automated document classification , 2016, 2016 IEEE Global Conference on Signal and Information Processing (GlobalSIP).
[5] Somesh Jha,et al. Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures , 2015, CCS.
[6] Walid Saad,et al. Machine Learning for Wireless Networks with Artificial Intelligence: A Tutorial on Neural Networks , 2017, ArXiv.
[7] Hwee Pink Tan,et al. Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications , 2014, IEEE Communications Surveys & Tutorials.
[8] Ekram Hossain,et al. Machine Learning Techniques for Cooperative Spectrum Sensing in Cognitive Radio Networks , 2013, IEEE Journal on Selected Areas in Communications.
[9] Kemal Davaslioglu,et al. Generative Adversarial Learning for Spectrum Sensing , 2018, 2018 IEEE International Conference on Communications (ICC).
[10] Dong-Ho Cho,et al. Deep Sensing: Cooperative Spectrum Sensing Based on Convolutional Neural Networks , 2017, ArXiv.
[11] Yalin E. Sagduyu,et al. Evasion and causative attacks with adversarial deep learning , 2017, MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM).
[12] Peng Ning,et al. Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks , 2016, IEEE Transactions on Vehicular Technology.
[13] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[14] Nei Kato,et al. Intrusion detection system (IDS) for combating attacks against cognitive radio networks , 2013, IEEE Network.
[15] Kemal Davaslioglu,et al. Generative Adversarial Networks for Black-Box API Attacks with Limited Training Data , 2018, 2018 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT).
[16] Simon Osindero,et al. Conditional Generative Adversarial Nets , 2014, ArXiv.
[17] Kemal Davaslioglu,et al. Active Deep Learning Attacks under Strict Rate Limitations for Online API Calls , 2018, 2018 IEEE International Symposium on Technologies for Homeland Security (HST).
[18] H. Vincent Poor,et al. Two-dimensional anti-jamming communication based on deep reinforcement learning , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[19] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[20] Tomas Pfister,et al. Learning from Simulated and Unsupervised Images through Adversarial Training , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[21] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[22] Fan Zhang,et al. Stealing Machine Learning Models via Prediction APIs , 2016, USENIX Security Symposium.
[23] Anthony Ephremides,et al. Jamming games in wireless networks with incomplete information , 2011, IEEE Communications Magazine.
[24] Geoffrey Ye Li,et al. Power of Deep Learning for Channel Estimation and Signal Detection in OFDM Systems , 2017, IEEE Wireless Communications Letters.
[25] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[26] H. Vincent Poor,et al. User-Centric View of Jamming Games in Cognitive Radio Networks , 2015, IEEE Transactions on Information Forensics and Security.
[27] Geoffrey E. Hinton,et al. Learning representations by back-propagating errors , 1986, Nature.
[28] Kemal Davaslioglu,et al. Vulnerability Detection and Analysis in Adversarial Deep Learning , 2018, Guide to Vulnerability Analysis for Computer Networks and Systems.
[29] T. Charles Clancy,et al. Convolutional Radio Modulation Recognition Networks , 2016, EANN.
[30] Federico Chiariotti,et al. A game-theoretic analysis of energy-depleting jamming attacks , 2019, 2017 International Conference on Computing, Networking and Communications (ICNC).
[31] Yalin E. Sagduyu,et al. Spectrum Data Poisoning with Adversarial Deep Learning , 2018, MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM).
[32] Dong In Kim,et al. Performance Analysis of Wireless Energy Harvesting Cognitive Radio Networks Under Smart Jamming Attacks , 2015, IEEE Transactions on Cognitive Communications and Networking.
[33] Geethapriya Thamilarasu,et al. Game Theoretic Modeling of Jamming Attacks in Ad hoc Networks , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.
[34] Yi Shi,et al. How to steal a machine learning classifier with deep learning , 2017, 2017 IEEE International Symposium on Technologies for Homeland Security (HST).
[35] Samy Bengio,et al. Adversarial examples in the physical world , 2016, ICLR.
[36] Liuqing Yang,et al. Securing physical-layer communications for cognitive radio networks , 2015, IEEE Communications Magazine.
[37] Giovanni Felici,et al. Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers , 2013, Int. J. Secur. Networks.
[38] K. J. Ray Liu,et al. An anti-jamming stochastic game for cognitive radio networks , 2011, IEEE Journal on Selected Areas in Communications.
[39] Charalampos Konstantopoulos,et al. A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.
[40] Ursula Challita,et al. Artificial Neural Networks-Based Machine Learning for Wireless Networks: A Tutorial , 2017, IEEE Communications Surveys & Tutorials.