Threats of Adversarial Attacks in DNN-Based Modulation Recognition.
Yun LinHaojun ZhaoYa TuShiwen MaoZheng DouPublished in: INFOCOM (2020)
Keyphrases
- countermeasures
- denial of service attacks
- malicious attacks
- recognition accuracy
- object recognition
- recognition rate
- security threats
- computer security
- feature extraction
- cyber attacks
- recognition algorithm
- pattern recognition
- insider threat
- security measures
- security risks
- security vulnerabilities
- information security
- multi agent
- recognition process
- insider attacks
- injection attacks
- security breaches
- dos attacks
- security issues
- human activities
- activity recognition
- action recognition
- identity theft
- intrusion detection system
- data corruption
- cyber crime
- buffer overflow
- worm detection
- neural network