Internet of Things (IoT) based on cognitive radio (CR) exhibits strong dynamic sensing and intelligent decision-making capabilities by effectively utilizing spectrum resources. The federal learning (FL) framework based modulation recognition (MR) is an essential component, but its use of uninterpretable deep learning (DL) introduces security risks. This paper combines traditional signal interference methods and data poisoning in FL to propose a new adversarial attack approach. The poisoning attack in distributed frameworks manipulates the global model by controlling malicious users, which is not only covert but also highly impactful. The carefully designed pseudo-noise in MR is also extremely difficult to detect. The combination of these tw...
Artificial intelligence (AI) technology has provided a potential solution for automatic modulation r...
Cognitive learning is progressively prospering in the field of Internet of Things (IoT). With the ad...
Deep learning algorithms have been shown to be powerful in many communication network design problem...
Internet of Things (IoT) based on cognitive radio (CR) exhibits strong dynamic sensing and intellige...
Cognitive radio-based Internet of Things (CR-IoT) network provides a solution for IoT devices to eff...
Device fingerprinting combined with Machine and Deep Learning (ML/DL) report promising performance w...
Motivated by the superior performance of deep learning in many applications including computer visio...
Cognitive Radio Internet of Things (CR-IoT) has revolutionized almost every field of life and reshap...
PhD Theses.Cognitive Radio Internet of Things (CR-IoT) has revolutionized almost every eld of life ...
Artificial intelligence (AI), and specifically machine and deep learning, are emerging as essential ...
Device fingerprinting combined with Machine and Deep Learning (ML/DL) report promising performance w...
Adversarial attack has been widely used to degrade the performance of deep learning (DL), especially...
We consider a communication scenario, in which an intruder tries to determine the modulation scheme ...
Automatic Modulation Recognition (AMR) is one of the critical steps in the signal processing chain o...
Deep learning algorithms have been shown to be powerful in many communication network design problem...
Artificial intelligence (AI) technology has provided a potential solution for automatic modulation r...
Cognitive learning is progressively prospering in the field of Internet of Things (IoT). With the ad...
Deep learning algorithms have been shown to be powerful in many communication network design problem...
Internet of Things (IoT) based on cognitive radio (CR) exhibits strong dynamic sensing and intellige...
Cognitive radio-based Internet of Things (CR-IoT) network provides a solution for IoT devices to eff...
Device fingerprinting combined with Machine and Deep Learning (ML/DL) report promising performance w...
Motivated by the superior performance of deep learning in many applications including computer visio...
Cognitive Radio Internet of Things (CR-IoT) has revolutionized almost every field of life and reshap...
PhD Theses.Cognitive Radio Internet of Things (CR-IoT) has revolutionized almost every eld of life ...
Artificial intelligence (AI), and specifically machine and deep learning, are emerging as essential ...
Device fingerprinting combined with Machine and Deep Learning (ML/DL) report promising performance w...
Adversarial attack has been widely used to degrade the performance of deep learning (DL), especially...
We consider a communication scenario, in which an intruder tries to determine the modulation scheme ...
Automatic Modulation Recognition (AMR) is one of the critical steps in the signal processing chain o...
Deep learning algorithms have been shown to be powerful in many communication network design problem...
Artificial intelligence (AI) technology has provided a potential solution for automatic modulation r...
Cognitive learning is progressively prospering in the field of Internet of Things (IoT). With the ad...
Deep learning algorithms have been shown to be powerful in many communication network design problem...