Login / Signup
Stealthy Backdoor Attack on RF Signal Classification.
Tianming Zhao
Zijie Tang
Tianfang Zhang
Huy Phan
Yan Wang
Cong Shi
Bo Yuan
Yingying Chen
Published in:
ICCCN (2023)
Keyphrases
</>
radio frequency
relevance feedback
malicious attacks
information retrieval
power analysis
malicious users
attack graphs
database
databases
countermeasures
secret key
authentication protocol