Login / Signup
Explanation-Guided Backdoor Attacks on Model-Agnostic RF Fingerprinting.
Tianya Zhao
Xuyu Wang
Junqing Zhang
Shiwen Mao
Published in:
INFOCOM (2024)
Keyphrases
</>
mathematical model
neural network
high level
objective function
cost function
probabilistic model
formal model
decision trees
management system
access control
theoretical analysis
network structure
neural network model
simulation model
network security