Adversarial Machine Learning for 5G Communications Security.
Yalin E. SagduyuTugba ErpekYi ShiPublished in: CoRR (2021)
Keyphrases
- machine learning
- information security
- security policies
- network management
- machine learning algorithms
- access control
- security management
- network security
- decision trees
- machine learning methods
- data mining
- key management
- security requirements
- security issues
- security systems
- statistical databases
- information assurance
- intrusion detection
- inductive logic programming
- text mining
- computer security
- information extraction
- computer science
- active learning
- learning algorithm
- multi agent
- pattern recognition
- security analysis
- natural language
- security mechanisms
- explanation based learning
- machine learning approaches
- learning tasks
- knowledge acquisition
- data analysis
- communication channels
- knowledge representation
- communication systems
- computer networks
- text classification
- security level
- security problems
- security threats