Countering radiometric signature exploitation using adversarial machine learning based protocol switching.
Wassila LalouaniMohamed F. YounisUthman BaroudiPublished in: Comput. Commun. (2021)
Keyphrases
- machine learning
- pattern recognition
- machine learning algorithms
- knowledge acquisition
- knowledge representation
- lightweight
- decision trees
- data mining
- learning systems
- blind signature
- blind signature scheme
- authentication protocol
- explanation based learning
- machine learning approaches
- machine learning methods
- text classification
- artificial intelligence
- information extraction
- signature verification
- data analysis
- signature recognition
- multi agent
- text mining
- learning tasks
- natural language processing
- dynamic range
- communication protocol
- learning algorithm
- network protocols
- protocol specification