Sign in

Stealthy Backdoor Attack on RF Signal Classification.

Tianming ZhaoZijie TangTianfang ZhangHuy PhanYan WangCong ShiBo YuanYingying Chen
Published in: ICCCN (2023)
Keyphrases
  • radio frequency
  • relevance feedback
  • malicious attacks
  • information retrieval
  • power analysis
  • malicious users
  • attack graphs
  • database
  • databases
  • countermeasures
  • secret key
  • authentication protocol