2022
DOI: 10.1109/tmc.2020.3030061
|View full text |Cite
|
Sign up to set email alerts
|

When Attackers Meet AI: Learning-Empowered Attacks in Cooperative Spectrum Sensing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 50 publications
(25 citation statements)
references
References 57 publications
0
23
0
Order By: Relevance
“…Another works are also based on cooperative sensing spectrum, though, the decision is taken by the fusion center in [189]. Indeed the nodes report their sensing results to a fusion center that makes a centralized decision on the availability of channels.…”
Section: • Adversarial Attacks On Cognitive Radiosmentioning
confidence: 99%
“…Another works are also based on cooperative sensing spectrum, though, the decision is taken by the fusion center in [189]. Indeed the nodes report their sensing results to a fusion center that makes a centralized decision on the availability of channels.…”
Section: • Adversarial Attacks On Cognitive Radiosmentioning
confidence: 99%
“…Poisoning attacks, also called causative attacks, provide incorrect information such as training data to the ML to cause the ML model to perform poorly. The poisoning attacks in the context of SS networks have been investigated in [162], which can be achieved by fooling the classifiers with spectrum data falsifications during the CSS phase, similar to SSDF attacks.…”
Section: Attacks For ML Modelmentioning
confidence: 99%
“…When compared to data transmission jamming, this attack uses less energy and is harder to detect. The intrusion is effective and significantly decreases the trans mitter's throughput [25][26][27][28][29].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Researchers in [32][33][34] investigated the attacks 802.11 networks. Similarly, authors in [35][36][37][38] and [7][8][9][10][11], [24][25][26][27][28][29][30][31][32][33][34][35][36][37][38][39] have investigated the attacks in sensor networks, multi-hop networks, and other network models respectively. Sadeghi and Larsson [40] have described how blackbox adversarial attacks are carried out and their impact on the transmission system's block error rate.…”
Section: Literature Reviewmentioning
confidence: 99%