{"id":"https://openalex.org/W4409223023","doi":"https://doi.org/10.1109/access.2025.3558276","title":"A Novel and Efficient Multi-Target Backdoor Attack for Deep Learning-Based Wireless Signal Classifiers","display_name":"A Novel and Efficient Multi-Target Backdoor Attack for Deep Learning-Based Wireless Signal Classifiers","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4409223023","doi":"https://doi.org/10.1109/access.2025.3558276"},"language":"en","primary_location":{"id":"doi:10.1109/access.2025.3558276","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3558276","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2025.3558276","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077569701","display_name":"Nayan Moni Baishya","orcid":null},"institutions":[{"id":"https://openalex.org/I1317621060","display_name":"Indian Institute of Technology Guwahati","ror":"https://ror.org/0022nd079","country_code":"IN","type":"education","lineage":["https://openalex.org/I1317621060"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Nayan Moni Baishya","raw_affiliation_strings":["Indian Institute of Technology Guwahati, Guwahati, Assam, India","Indian Institute of Technology Guwahati, Assam, India"],"raw_orcid":"https://orcid.org/0009-0001-6972-7545","affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Guwahati, Guwahati, Assam, India","institution_ids":["https://openalex.org/I1317621060"]},{"raw_affiliation_string":"Indian Institute of Technology Guwahati, Assam, India","institution_ids":["https://openalex.org/I1317621060"]}]},{"author_position":"middle","author":{"id":null,"display_name":"B. R. Manoj","orcid":"https://orcid.org/0009-0002-2415-7590"},"institutions":[{"id":"https://openalex.org/I1317621060","display_name":"Indian Institute of Technology Guwahati","ror":"https://ror.org/0022nd079","country_code":"IN","type":"education","lineage":["https://openalex.org/I1317621060"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"B. R. Manoj","raw_affiliation_strings":["Indian Institute of Technology Guwahati, Guwahati, Assam, India","Indian Institute of Technology Guwahati, Assam, India"],"raw_orcid":"https://orcid.org/0009-0002-2415-7590","affiliations":[{"raw_affiliation_string":"Indian Institute of Technology Guwahati, Guwahati, Assam, India","institution_ids":["https://openalex.org/I1317621060"]},{"raw_affiliation_string":"Indian Institute of Technology Guwahati, Assam, India","institution_ids":["https://openalex.org/I1317621060"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5107925583","display_name":"S. Karmakar","orcid":"https://orcid.org/0009-0007-6092-7974"},"institutions":[{"id":"https://openalex.org/I151903974","display_name":"National Institute Of Technology Silchar","ror":"https://ror.org/001ws2a36","country_code":"IN","type":"education","lineage":["https://openalex.org/I151903974"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Snehashish Karmakar","raw_affiliation_strings":["National Institute of Technology Silchar, Silchar, Assam, India","National Institute of Technology Silchar, Assam, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"National Institute of Technology Silchar, Silchar, Assam, India","institution_ids":["https://openalex.org/I151903974"]},{"raw_affiliation_string":"National Institute of Technology Silchar, Assam, India","institution_ids":["https://openalex.org/I151903974"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5077569701"],"corresponding_institution_ids":["https://openalex.org/I1317621060"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":2.0776,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.87451287,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"13","issue":null,"first_page":"65863","last_page":"65883"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9390000104904175,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.8262653946876526},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7272140979766846},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.47933635115623474},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.46377032995224},{"id":"https://openalex.org/keywords/signal","display_name":"SIGNAL (programming language)","score":0.45403170585632324},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.41667982935905457},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1949661672115326},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.13464590907096863}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.8262653946876526},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7272140979766846},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.47933635115623474},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.46377032995224},{"id":"https://openalex.org/C2779843651","wikidata":"https://www.wikidata.org/wiki/Q7390335","display_name":"SIGNAL (programming language)","level":2,"score":0.45403170585632324},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.41667982935905457},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1949661672115326},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.13464590907096863},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2025.3558276","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3558276","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:905b277171c74b2baef0c40ae9793f1e","is_oa":true,"landing_page_url":"https://doaj.org/article/905b277171c74b2baef0c40ae9793f1e","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 13, Pp 65863-65883 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2025.3558276","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3558276","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W2005956500","https://openalex.org/W2114267371","https://openalex.org/W2272847350","https://openalex.org/W2531409750","https://openalex.org/W2603396821","https://openalex.org/W2773170971","https://openalex.org/W2807731816","https://openalex.org/W2887146012","https://openalex.org/W2888024549","https://openalex.org/W2934843808","https://openalex.org/W2941806810","https://openalex.org/W2963190722","https://openalex.org/W2990270730","https://openalex.org/W2995240473","https://openalex.org/W3081178496","https://openalex.org/W3090898103","https://openalex.org/W3101503122","https://openalex.org/W3136021864","https://openalex.org/W3163168187","https://openalex.org/W3175215793","https://openalex.org/W4210557982","https://openalex.org/W4214680449","https://openalex.org/W4312233756","https://openalex.org/W4366147513","https://openalex.org/W4387068365","https://openalex.org/W4398199753","https://openalex.org/W4400277685","https://openalex.org/W4401163238","https://openalex.org/W4402727121","https://openalex.org/W6743581629","https://openalex.org/W6756074407","https://openalex.org/W6917408469"],"related_works":["https://openalex.org/W2731899572","https://openalex.org/W3215138031","https://openalex.org/W3009238340","https://openalex.org/W4360585206","https://openalex.org/W4321369474","https://openalex.org/W4285208911","https://openalex.org/W3082895349","https://openalex.org/W4213079790","https://openalex.org/W2248239756","https://openalex.org/W3086377361"],"abstract_inverted_index":{"Deep":[0],"learning":[1],"(DL)-based":[2],"wireless":[3,66,95,308,316],"signal":[4,206],"classification":[5,59,192],"is":[6,71,88,162],"increasingly":[7],"becoming":[8],"important":[9],"and":[10,23,49,74,145,208,244,257,275,285,291],"deployed":[11],"on":[12,53,108,156,190,205,236,247,313],"edge":[13],"devices":[14],"(e.g.,":[15],"IoT,":[16],"smartphones,":[17],"etc.)":[18],"to":[19,31,35,79,102,114,141,151,261,305],"enhance":[20],"communication":[21],"reliability":[22],"efficiency.":[24],"However,":[25],"these":[26],"DL":[27,54,173,216,226],"models":[28,55,174],"are":[29,112],"vulnerable":[30],"security":[32,303],"threats":[33],"due":[34],"the":[36,80,123,128,157,179,186,223,242,245,251,271,295,306],"broadcast":[37],"nature":[38],"of":[39,60,210,234,278,294],"radio":[40],"frequency":[41],"(RF)":[42],"signals.":[43,126,287],"This":[44],"work":[45],"proposes":[46],"a":[47,89,132,138,146,163,301],"novel":[48],"practical":[50],"backdoor":[51,105,263,273,297],"attack":[52,69,129,180,195,211,254,274,298],"for":[56],"automatic":[57],"modulation":[58,191],"RF":[61,125],"signals":[62,154],"after":[63],"deployment":[64],"in":[65,93,281],"devices.":[67],"Our":[68],"method":[70,101,229],"practically":[72],"realizable":[73],"does":[75],"not":[76],"require":[77],"access":[78],"target":[81,172,215,225,238],"model\u2019s":[82],"training":[83],"data":[84],"or":[85],"architecture,":[86],"which":[87,117],"less":[90],"explored":[91],"area":[92],"DL-based":[94,307,315],"systems.":[96],"We":[97,183],"propose":[98],"an":[99,232],"efficient":[100],"design":[103],"multiple":[104,143,237],"triggers":[106,144],"based":[107,155,189],"Hadamard":[109],"matrices":[110],"that":[111,136,166],"orthogonal":[113],"each":[115],"other,":[116],"can":[118,167,230],"be":[119,168],"easily":[120],"injected":[121,169],"into":[122,170],"received":[124],"Further,":[127],"mechanism":[130,299],"utilizes":[131],"model":[133,165],"named":[134],"BackdoorNet":[135,161],"includes":[137],"denoising":[139],"autoencoder":[140],"extract":[142],"fully-connected":[147],"deep":[148],"neural":[149],"network":[150],"generate":[152],"misclassification":[153],"extracted":[158],"triggers.":[159],"The":[160,218,288],"lightweight":[164],"various":[171],"without":[175,240],"resource-intensive":[176],"training,":[177],"making":[178],"computationally":[181],"efficient.":[182],"thoroughly":[184],"investigate":[185],"attack\u2019s":[187],"effectiveness":[188,277],"accuracy":[193],"(MCA),":[194],"success":[196],"rate":[197,202],"(ASR),":[198],"trigger":[199],"false":[200],"alarm":[201],"(FAR),":[203],"effect":[204],"characteristics,":[207],"generalization":[209],"performance":[212],"across":[213,222],"different":[214],"models.":[217],"results":[219],"suggest":[220],"that,":[221],"investigated":[224],"models,":[227],"our":[228],"achieve":[231],"ASR":[233],"99%":[235],"labels":[239],"affecting":[241],"MCA":[243],"FAR":[246],"clean":[248,284],"signals,":[249],"emphasizing":[250],"method\u2019s":[252],"multi-target":[253],"capability,":[255],"stealthiness,":[256],"computational":[258],"efficiency":[259],"compared":[260],"recent":[262],"attacks.":[264],"Furthermore,":[265],"we":[266],"analyze":[267],"defense":[268],"techniques":[269],"against":[270],"proposed":[272,296],"showthe":[276],"activation":[279],"clustering":[280],"distinguishing":[282],"between":[283],"triggered":[286],"extensive":[289],"experimentation":[290],"detailed":[292],"analysis":[293],"show":[300],"significant":[302],"threat":[304],"classifiers,":[309],"necessitating":[310],"further":[311],"research":[312],"other":[314],"applications.":[317]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
