{"id":"https://openalex.org/W2982036631","doi":"https://doi.org/10.1109/dyspan.2019.8935782","title":"Trojan Attacks on Wireless Signal Classification with Adversarial Machine Learning","display_name":"Trojan Attacks on Wireless Signal Classification with Adversarial Machine Learning","publication_year":2019,"publication_date":"2019-11-01","ids":{"openalex":"https://openalex.org/W2982036631","doi":"https://doi.org/10.1109/dyspan.2019.8935782","mag":"2982036631"},"language":"en","primary_location":{"id":"doi:10.1109/dyspan.2019.8935782","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dyspan.2019.8935782","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1910.10766","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075960743","display_name":"Kemal Davasl\u0131o\u011flu","orcid":"https://orcid.org/0000-0003-2745-6764"},"institutions":[{"id":"https://openalex.org/I4210130203","display_name":"Intelligent Automation (United States)","ror":"https://ror.org/02fwb6r86","country_code":"US","type":"company","lineage":["https://openalex.org/I4210130203"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Kemal Davaslioglu","raw_affiliation_strings":["Intelligent Automation, Inc., Rockville, MD, USA","Intelligent Automation, Inc.,Rockville,MD,USA,20855"],"affiliations":[{"raw_affiliation_string":"Intelligent Automation, Inc., Rockville, MD, USA","institution_ids":["https://openalex.org/I4210130203"]},{"raw_affiliation_string":"Intelligent Automation, Inc.,Rockville,MD,USA,20855","institution_ids":["https://openalex.org/I4210130203"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089570143","display_name":"Yalin E. Sagduyu","orcid":"https://orcid.org/0000-0003-1576-5527"},"institutions":[{"id":"https://openalex.org/I4210130203","display_name":"Intelligent Automation (United States)","ror":"https://ror.org/02fwb6r86","country_code":"US","type":"company","lineage":["https://openalex.org/I4210130203"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yalin E. Sagduyu","raw_affiliation_strings":["Intelligent Automation, Inc., Rockville, MD, USA","Intelligent Automation, Inc.,Rockville,MD,USA,20855"],"affiliations":[{"raw_affiliation_string":"Intelligent Automation, Inc., Rockville, MD, USA","institution_ids":["https://openalex.org/I4210130203"]},{"raw_affiliation_string":"Intelligent Automation, Inc.,Rockville,MD,USA,20855","institution_ids":["https://openalex.org/I4210130203"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5075960743"],"corresponding_institution_ids":["https://openalex.org/I4210130203"],"apc_list":null,"apc_paid":null,"fwci":0.2893,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.67499923,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.681804358959198},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6504900455474854},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.6479724645614624},{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.5559471249580383},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5404404997825623},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.4784952998161316},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4625932574272156},{"id":"https://openalex.org/keywords/preprocessor","display_name":"Preprocessor","score":0.4543555974960327},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.43876874446868896},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.43318864703178406},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.43292784690856934},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3458138704299927},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32335779070854187},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08201995491981506}],"concepts":[{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.681804358959198},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6504900455474854},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.6479724645614624},{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.5559471249580383},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5404404997825623},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.4784952998161316},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4625932574272156},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.4543555974960327},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.43876874446868896},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.43318864703178406},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.43292784690856934},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3458138704299927},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32335779070854187},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08201995491981506}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/dyspan.2019.8935782","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dyspan.2019.8935782","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1910.10766","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1910.10766","pdf_url":"https://arxiv.org/pdf/1910.10766","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"mag:2982036631","is_oa":true,"landing_page_url":"https://arxiv.org/pdf/1910.10766","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"doi:10.48550/arxiv.1910.10766","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1910.10766","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1910.10766","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1910.10766","pdf_url":"https://arxiv.org/pdf/1910.10766","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2982036631.pdf","grobid_xml":"https://content.openalex.org/works/W2982036631.grobid-xml"},"referenced_works_count":41,"referenced_works":["https://openalex.org/W1621957113","https://openalex.org/W1677182931","https://openalex.org/W2092904426","https://openalex.org/W2112507308","https://openalex.org/W2187089797","https://openalex.org/W2272847350","https://openalex.org/W2274565976","https://openalex.org/W2562146178","https://openalex.org/W2617896574","https://openalex.org/W2623427976","https://openalex.org/W2748789698","https://openalex.org/W2793350679","https://openalex.org/W2795727551","https://openalex.org/W2853090665","https://openalex.org/W2886189420","https://openalex.org/W2888024549","https://openalex.org/W2907201671","https://openalex.org/W2914711741","https://openalex.org/W2920763889","https://openalex.org/W2934843808","https://openalex.org/W2963047971","https://openalex.org/W2963079272","https://openalex.org/W2963207607","https://openalex.org/W2963629198","https://openalex.org/W2964277700","https://openalex.org/W2971480956","https://openalex.org/W2996613410","https://openalex.org/W3012548231","https://openalex.org/W3195387997","https://openalex.org/W6640425456","https://openalex.org/W6676935882","https://openalex.org/W6694508510","https://openalex.org/W6694611762","https://openalex.org/W6738862474","https://openalex.org/W6743581629","https://openalex.org/W6749495021","https://openalex.org/W6756074407","https://openalex.org/W6760521931","https://openalex.org/W6762189832","https://openalex.org/W6768669621","https://openalex.org/W6917408469"],"related_works":["https://openalex.org/W2995240473","https://openalex.org/W3120674715","https://openalex.org/W3034478342","https://openalex.org/W3176792048","https://openalex.org/W3157391214","https://openalex.org/W3043705394","https://openalex.org/W2990270730","https://openalex.org/W3106646114","https://openalex.org/W3109235236","https://openalex.org/W2947864246","https://openalex.org/W3184406156","https://openalex.org/W3208816772","https://openalex.org/W3111857723","https://openalex.org/W3038028754","https://openalex.org/W2970233010","https://openalex.org/W2969023901","https://openalex.org/W3208328782","https://openalex.org/W2913144408","https://openalex.org/W3213282580","https://openalex.org/W2971661634"],"abstract_inverted_index":{"We":[0,140,184],"present":[1],"a":[2,66,98,134],"Trojan":[3,192],"(backdoor":[4],"or":[5],"trapdoor)":[6],"attack":[7,123,144],"that":[8,94,142,186],"targets":[9],"deep":[10,17,78],"learning":[11,18,79],"applications":[12],"in":[13],"wireless":[14,24],"communications.":[15],"A":[16],"classifier":[19,136],"is":[20,73,145,175],"considered":[21,176],"to":[22,48,65,75,132],"classify":[23,107,116],"signals":[25,88,110,117],"using":[26],"raw":[27],"(I/Q)":[28],"samples":[29,53,64,197],"as":[30,35,97,179,181],"features":[31],"and":[32,58,151,160],"modulation":[33],"types":[34],"labels.":[36],"An":[37],"adversary":[38,86],"slightly":[39],"manipulates":[40],"training":[41,51,71,159],"data":[42,52,72,162],"by":[43,54,128,155],"inserting":[44],"Trojans":[45],"(i.e.,":[46],"triggers)":[47],"only":[49],"few":[50,196],"modifying":[55],"their":[56],"phases":[57],"changing":[59],"the":[60,77,90,103,158,187],"labels":[61],"of":[62],"these":[63],"target":[67],"label.":[68],"This":[69,121],"poisoned":[70,118,129],"used":[74],"train":[76],"classifier.":[80],"In":[81],"test":[82,161],"(inference)":[83],"time,":[84],"an":[85],"transmits":[87],"with":[89,119,163,177],"same":[91],"phase":[92,165],"shift":[93],"was":[95],"added":[96],"trigger":[99],"during":[100],"training.":[101],"While":[102],"receiver":[104],"can":[105,190],"accurately":[106],"clean":[108],"(unpoisoned)":[109],"without":[111],"triggers,":[112],"it":[113],"cannot":[114,152],"reliably":[115],"triggers.":[120],"stealth":[122],"remains":[124],"hidden":[125],"until":[126],"activated":[127],"inputs":[130],"(Trojans)":[131],"bypass":[133],"signal":[135],"(e.g.,":[137],"for":[138],"authentication).":[139],"show":[141,185],"this":[143,169],"successful":[146],"over":[147],"different":[148],"channel":[149],"conditions":[150],"be":[153],"mitigated":[154],"simply":[156],"preprocessing":[157],"random":[164],"variations.":[166],"To":[167],"detect":[168,191],"attack,":[170],"activation":[171],"based":[172],"outlier":[173],"detection":[174],"statistical":[178],"well":[180],"clustering":[182],"techniques.":[183],"latter":[188],"one":[189],"attacks":[193],"even":[194],"if":[195],"are":[198],"poisoned.":[199]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2019-11-01T00:00:00"}
