References |
: |
[1]Tu GH, Li CY, Peng C, Li Y, Lu S. New security threats caused by IMS-based SMS service in 4G LTE networks. In proceedings of the ACM SIGSAC conference on computer and communications security 2016 (pp. 1118-30).
|
[Crossref] |
[Google Scholar] |
[2]Tu GH, Li CY, Peng C, Lu S. How voice call technology poses security threats in 4g LTE networks. In conference on communications and network security 2015 (pp. 442-50). IEEE.
|
[Crossref] |
[Google Scholar] |
[3]Tu GH, Li Y, Peng C, Li CY, Raza MT, Tseng HY, et al. New threats to SMS-assisted mobile internet services from 4G LTE: lessons learnt from distributed mobile-initiated attacks towards facebook and other services. arXiv preprint arXiv:1510.08531. 2015.
|
[Google Scholar] |
[4]Bhattarai S, Wei S, Rook S, Yu W, Erbacher RF, Cam H. On simulation studies of jamming threats against LTE networks. In international conference on computing, networking and communications 2015 (pp. 99-103). IEEE.
|
[Crossref] |
[Google Scholar] |
[5]Li W, Wang N, Jiao L, Zeng K. Physical layer spoofing attack detection in MmWave massive MIMO 5G networks. IEEE Access. 2021; 9:60419-32.
|
[Crossref] |
[Google Scholar] |
[6]Sánchez JD, Urquiza-Aguiar L, Paredes MC, Osorio DP. Survey on physical layer security for 5G wireless networks. Annals of Telecommunications. 2021; 76(3):155-74.
|
[Crossref] |
[Google Scholar] |
[7]Grover K, Lim A, Yang Q. Jamming and anti–jamming techniques in wireless networks: a survey. International Journal of Ad Hoc and Ubiquitous Computing. 2014; 17(4):197-215.
|
[Crossref] |
[Google Scholar] |
[8]Shi Y, Sagduyu YE, Erpek T, Davaslioglu K, Lu Z, Li JH. Adversarial deep learning for cognitive radio security: jamming attack and defense strategies. In international conference on communications workshops 2018(pp. 1-6). IEEE.
|
[Crossref] |
[Google Scholar] |
[9]Erpek T, Sagduyu YE, Shi Y. Deep learning for launching and mitigating wireless jamming attacks. IEEE Transactions on Cognitive Communications and Networking. 2018; 5(1):2-14.
|
[Crossref] |
[Google Scholar] |
[10]Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, et al. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199. 2013.
|
[Google Scholar] |
[11]Goodfellow IJ, Shlens J, Szegedy C. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572. 2014.
|
[Google Scholar] |
[12]Sadeghi M, Larsson EG. Adversarial attacks on deep-learning based radio signal classification. IEEE Wireless Communications Letters. 2018; 8(1):213-6.
|
[Crossref] |
[Google Scholar] |
[13]Kokalj-filipovic S, Miller R, Morman J. Targeted adversarial examples against RF deep classifiers. In proceedings of the ACM workshop on wireless security and machine learning 2019 (pp. 6-11).
|
[Crossref] |
[Google Scholar] |
[14]Kokalj-filipovic S, Miller R, Vanhoy G. Adversarial examples in RF deep learning: Detection and physical robustness. In global conference on signal and information processing 2019 (pp. 1-5). IEEE.
|
[Crossref] |
[Google Scholar] |
[15]Flowers B, Buehrer RM, Headley WC. Evaluating adversarial evasion attacks in the context of wireless communications. IEEE Transactions on Information Forensics and Security. 2019; 15:1102-13.
|
[Crossref] |
[Google Scholar] |
[16]Lin Y, Zhao H, Tu Y, Mao S, Dou Z. Threats of adversarial attacks in DNN-based modulation recognition. In INFOCOM conference on computer communications 2020 (pp. 2469-78). IEEE.
|
[Crossref] |
[Google Scholar] |
[17]Kim B, Sagduyu YE, Davaslioglu K, Erpek T, Ulukus S. Over-the-air adversarial attacks on deep learning based modulation classifier over wireless channels. In annual conference on information sciences and systems 2020 (pp. 1-6). IEEE.
|
[Crossref] |
[Google Scholar] |
[18]Kim B, Sagduyu YE, Davaslioglu K, Erpek T, Ulukus S. Channel-aware adversarial attacks against deep learning-based wireless signal classifiers. arXiv preprint arXiv:2005.05321. 2020.
|
[Google Scholar] |
[19]Hameed MZ, György A, Gündüz D. Communication without interception: defense against modulation detection. In global conference on signal and information processing 2019 (pp. 1-5). IEEE.
|
[Crossref] |
[Google Scholar] |
[20]Hameed MZ, György A, Gündüz D. The best defense is a good offense: adversarial attacks to avoid modulation detection. IEEE Transactions on Information Forensics and Security. 2020; 16:1074-87.
|
[Crossref] |
[Google Scholar] |
[21]Kim B, Sagduyu YE, Davaslioglu K, Erpek T, Ulukus S. How to Make 5G communications invisible: adversarial machine learning for wireless privacy. In Asilomar conference on signals, systems, and computers 2020 (pp. 763-7). IEEE.
|
[Crossref] |
[Google Scholar] |
[22]Kim B, Sagduyu YE, Erpek T, Davaslioglu K, Ulukus S. Adversarial attacks with multiple antennas against deep learning-based modulation classifiers. In globecom workshops 2020 (pp. 1-6). IEEE.
|
[Crossref] |
[Google Scholar] |
[23]Kim B, Sagduyu YE, Erpek T, Davaslioglu K, Ulukus S. Channel effects on surrogate models of adversarial attacks against wireless signal classifiers. In ICC international conference on communications 2021 (pp. 1-6). IEEE.
|
[Crossref] |
[Google Scholar] |
[24]Sagduyu YE, Shi Y, Erpek T. IoT network security from the perspective of adversarial deep learning. In annual international conference on sensing, communication, and networking 2019 (pp. 1-9). IEEE.
|
[Crossref] |
[Google Scholar] |
[25]Adesina D, Hsieh CC, Sagduyu YE, Qian L. Adversarial machine learning in wireless communications using RF data: a review. arXiv preprint arXiv:2012.14392. 2020.
|
[Google Scholar] |
[26]Shi Y, Erpek T, Sagduyu YE, Li JH. Spectrum data poisoning with adversarial deep learning. In MILCOM military communications conference 2018(pp. 407-12). IEEE.
|
[Crossref] |
[Google Scholar] |
[27]Sagduyu Y, Shi Y, Erpek T. Adversarial deep learning for over-the-air spectrum poisoning attacks. IEEE Transactions on Mobile Computing. 2019; 20(2):306-19.
|
[Crossref] |
[Google Scholar] |
[28]Luo Z, Zhao S, Lu Z, Xu J, Sagduyu Y. When attackers meet AI: learning-empowered attacks in cooperative spectrum sensing. IEEE Transactions on Mobile Computing. 2020.
|
[Crossref] |
[Google Scholar] |
[29]Luo Z, Zhao S, Lu Z, Sagduyu YE, Xu J. Adversarial machine learning based partial-model attack in IoT. In proceedings of the ACM workshop on wireless security and machine learning 2020 (pp. 13-8).
|
[Crossref] |
[Google Scholar] |
[30]Shi Y, Davaslioglu K, Sagduyu YE. Over-the-air membership inference attacks as privacy threats for deep learning-based wireless signal classifiers. In proceedings of the ACM workshop on wireless security and machine learning 2020 (pp. 61-6).
|
[Crossref] |
[Google Scholar] |
[31]Davaslioglu K, Sagduyu YE. Trojan attacks on wireless signal classification with adversarial machine learning. In international symposium on dynamic spectrum access networks 2019 (pp. 1-6). IEEE.
|
[Crossref] |
[Google Scholar] |
[32]Gupta V, Krishnamurthy S, Faloutsos M. Denial of service attacks at the MAC layer in wireless ad hoc networks. In MILCOM 2002(pp. 1118-23). IEEE.
|
[Crossref] |
[Google Scholar] |
[33]Kyasanur P, Vaidya NH. Detection and handling of MAC layer misbehavior in wireless networks. In DSN 2003 (pp. 173-82).
|
[Google Scholar] |
[34]Bayraktaroglu E, King C, Liu X, Noubir G, Rajaraman R, Thapa B. Performance of IEEE 802.11 under jamming. Mobile Networks and Applications. 2013; 18(5):678-96.
|
[Crossref] |
[Google Scholar] |
[35]Li M, Koutsopoulos I, Poovendran R. Optimal jamming attacks and network defense policies in wireless sensor networks. In INFOCOM international conference on computer communications 2007 (pp. 1307-15). IEEE.
|
[Crossref] |
[Google Scholar] |
[36]Xu W, Trappe W, Zhang Y, Wood T. The feasibility of launching and detecting jamming attacks in wireless networks. In proceedings of the ACM international symposium on mobile ad hoc networking and computing 2005 (pp. 46-57).
|
[Crossref] |
[Google Scholar] |
[37]Zander J. Jamming in slotted ALOHA multihop packet radio networks. IEEE Transactions on Communications. 1991; 39(10):1525-31.
|
[Crossref] |
[Google Scholar] |
[38]Theodorakopoulos G, Baras JS. Game theoretic modeling of malicious users in collaborative networks. IEEE Journal on Selected Areas in Communications. 2008; 26(7):1317-27.
|
[Crossref] |
[Google Scholar] |
[39]Sagduyu YE, Berry RA, Ephremides A. Jamming games in wireless networks with incomplete information. IEEE Communications Magazine. 2011; 49(8):112-8.
|
[Crossref] |
[Google Scholar] |
[40]Sadeghi M, Larsson EG. Physical adversarial attacks against end-to-end autoencoder communication systems. IEEE Communications Letters. 2019; 23(5):847-50.
|
[Crossref] |
[Google Scholar] |
[41]Manoj BR, Sadeghi M, Larsson EG. Adversarial attacks on deep learning based power allocation in a massive mimo network. arXiv preprint arXiv:2101.12090. 2021.
|
[Google Scholar] |
[42]Zhong C, Wang F, Gursoy MC, Velipasalar S. Adversarial jamming attacks on deep reinforcement learning based dynamic multichannel access. In wireless communications and networking conference 2020 (pp. 1-6). IEEE.
|
[Crossref] |
[Google Scholar] |
[43]Wang F, Zhong C, Gursoy MC, Velipasalar S. Defense strategies against adversarial jamming attacks via deep reinforcement learning. In annual conference on information sciences and systems 2020 (pp. 1-6). IEEE.
|
[Crossref] |
[Google Scholar] |
[44]Lam J, Abbas R. Machine learning based anomaly detection for 5g networks. arXiv preprint arXiv:2003.03474. 2020.
|
[Google Scholar] |
|