MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM) 2019
DOI: 10.1109/milcom47813.2019.9020716
|View full text |Cite
|
Sign up to set email alerts
|

Communications Aware Adversarial Residual Networks for over the Air Evasion Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
27
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1

Relationship

3
3

Authors

Journals

citations
Cited by 17 publications
(27 citation statements)
references
References 10 publications
0
27
0
Order By: Relevance
“…That is, they yield a high BER. However, the ability to formally define a perceptible perturbation as BER has allowed recent works to create differentiable versions of the receive chain, that allow for the BER to be directly incorporated into the loss function of an adversarial attack [84], [86], yielding more sophisticated and effective threats.…”
Section: ) Defining Perceptible Perturbations In Wirelessmentioning
confidence: 99%
“…That is, they yield a high BER. However, the ability to formally define a perceptible perturbation as BER has allowed recent works to create differentiable versions of the receive chain, that allow for the BER to be directly incorporated into the loss function of an adversarial attack [84], [86], yielding more sophisticated and effective threats.…”
Section: ) Defining Perceptible Perturbations In Wirelessmentioning
confidence: 99%
“…The adversarial scenario considered in this work is illustrated by Figure 1. As previously mentioned, balancing the two conflicting goals of evasion of an eavesdropper and successful communication by an intended receiver is difficult and has been examined in previous work [4,5,10,15]. In this work, the idea of successful perception of the signal at the receiver is driven using metrics such as bit error rate (BER) that indicate the success of the communication.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, this work presents a novel form of perception to be considered alongside BER, that of spectral integrity. The previous works in this area have shown that adversarial perturbations naturally tend to manifest out of the main lobe of the signal and lead to adversarial signals that do not hold well the same spectral shape as the original signal [5]. This change in the spectral shape of the signal poses a problem to the success of the attack as the eavesdropper could leverage preprocessing stages to reduce the impact of the perturbation, such as with a filter, and potentially can lead to increased likelihood of detection that an attack is taking place since the spectral shape does not appear benign.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations