Colluding RF Fingerprint Impersonation Attack Based on Generative Adversarial Network.
Yuxuan XuMing LiuLinning PengJunqing ZhangYawen ZhengPublished in: ICC (2022)
Keyphrases
- generative model
- authentication protocol
- network structure
- computer networks
- attack graphs
- peer to peer
- network intrusion
- relevance feedback
- network topologies
- smart card
- complex networks
- unsupervised learning
- multi agent
- countermeasures
- security analysis
- network traffic
- mobile communication
- cyber attacks
- denial of service attacks
- fault injection
- buffer overflow