{"id":"https://openalex.org/W4387869530","doi":"https://doi.org/10.1109/icc45041.2023.10279348","title":"How Potent are Evasion Attacks for Poisoning Federated Learning-Based Signal Classifiers?","display_name":"How Potent are Evasion Attacks for Poisoning Federated Learning-Based Signal Classifiers?","publication_year":2023,"publication_date":"2023-05-28","ids":{"openalex":"https://openalex.org/W4387869530","doi":"https://doi.org/10.1109/icc45041.2023.10279348"},"language":"en","primary_location":{"id":"doi:10.1109/icc45041.2023.10279348","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc45041.2023.10279348","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2023 - IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100463053","display_name":"Su Wang","orcid":"https://orcid.org/0000-0002-7550-1120"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Su Wang","raw_affiliation_strings":["Elmore Family School of Electrical and Computer Engineering, Purdue University"],"affiliations":[{"raw_affiliation_string":"Elmore Family School of Electrical and Computer Engineering, Purdue University","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084897218","display_name":"Rajeev Sahay","orcid":"https://orcid.org/0000-0001-6823-1364"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rajeev Sahay","raw_affiliation_strings":["Elmore Family School of Electrical and Computer Engineering, Purdue University"],"affiliations":[{"raw_affiliation_string":"Elmore Family School of Electrical and Computer Engineering, Purdue University","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020399355","display_name":"Christopher G. Brinton","orcid":"https://orcid.org/0000-0003-2771-3521"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Christopher G. Brinton","raw_affiliation_strings":["Elmore Family School of Electrical and Computer Engineering, Purdue University"],"affiliations":[{"raw_affiliation_string":"Elmore Family School of Electrical and Computer Engineering, Purdue University","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100463053"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.7514,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.878571,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"2376","last_page":"2381"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9692000150680542,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7765123844146729},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.6963946223258972},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6594284772872925},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4794313311576843},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4720096290111542},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45212697982788086},{"id":"https://openalex.org/keywords/training-set","display_name":"Training set","score":0.45188722014427185},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.43646252155303955},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.41200491786003113},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3385777473449707}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7765123844146729},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.6963946223258972},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6594284772872925},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4794313311576843},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4720096290111542},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45212697982788086},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.45188722014427185},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.43646252155303955},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.41200491786003113},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3385777473449707},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc45041.2023.10279348","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc45041.2023.10279348","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2023 - IEEE International Conference on Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G192647634","display_name":null,"funder_award_id":"N000142212305,N000142112472","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"},{"id":"https://openalex.org/G4424510726","display_name":null,"funder_award_id":"D22AP00168-00","funder_id":"https://openalex.org/F4320332180","funder_display_name":"Defense Advanced Research Projects Agency"}],"funders":[{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"},{"id":"https://openalex.org/F4320337345","display_name":"Office of Naval Research","ror":"https://ror.org/00rk2pe57"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1945616565","https://openalex.org/W2773170971","https://openalex.org/W2888024549","https://openalex.org/W2893554781","https://openalex.org/W2903356604","https://openalex.org/W2917719556","https://openalex.org/W2974739971","https://openalex.org/W3023683268","https://openalex.org/W3035032188","https://openalex.org/W3047492485","https://openalex.org/W3048715803","https://openalex.org/W3087391814","https://openalex.org/W3114953370","https://openalex.org/W3155160971","https://openalex.org/W3157674102","https://openalex.org/W3169313989","https://openalex.org/W3200744636","https://openalex.org/W4225727763","https://openalex.org/W4288059624","https://openalex.org/W4295308277","https://openalex.org/W4318619660","https://openalex.org/W6728757088","https://openalex.org/W6755038706","https://openalex.org/W6756840679","https://openalex.org/W6770634426","https://openalex.org/W6774681163","https://openalex.org/W6787341417","https://openalex.org/W6840304457"],"related_works":["https://openalex.org/W3211393740","https://openalex.org/W3208049411","https://openalex.org/W3022908591","https://openalex.org/W2946768379","https://openalex.org/W2981877337","https://openalex.org/W3203938600","https://openalex.org/W4307079546","https://openalex.org/W4286910063","https://openalex.org/W2163707935","https://openalex.org/W83146503"],"abstract_inverted_index":{"There":[0],"has":[1,44],"been":[2],"recent":[3],"interest":[4],"in":[5,96,181],"leveraging":[6],"federated":[7],"learning":[8],"(FL)":[9],"for":[10],"radio":[11],"signal":[12,72],"classification":[13,188],"tasks.":[14],"In":[15,63,88],"FL,":[16],"model":[17,75,118,167],"parameters":[18],"are":[19],"periodically":[20],"communicated":[21],"from":[22],"participating":[23],"devices,":[24,54],"training":[25,81,113],"on":[26,121],"their":[27,102],"own":[28],"local":[29,103],"datasets,":[30],"to":[31,48,59,74,140,170],"a":[32,39,110,156],"central":[33],"server":[34],"which":[35,78,97],"aggregates":[36],"them":[37],"into":[38],"global":[40,117,172],"model.":[41],"While":[42],"FL":[43,99,143],"privacy/security":[45],"advantages":[46],"due":[47],"raw":[49],"data":[50,86],"not":[51,84],"leaving":[52],"the":[53,68,80,112,116,165,171,187],"it":[55],"is":[56],"still":[57],"susceptible":[58],"several":[60],"adversarial":[61,106,152,182],"attacks.":[62,108],"this":[64,89],"work,":[65],"we":[66,91,175],"reveal":[67,146],"susceptibility":[69],"of":[70,115],"FL-based":[71],"classifiers":[73],"poisoning":[76,168,183],"attacks,":[77],"compromise":[79],"process":[82,114],"despite":[83],"observing":[85],"transmissions.":[87],"capacity,":[90],"develop":[92],"an":[93],"attack":[94,161,169],"framework":[95,162],"compromised":[98],"devices":[100,179],"perturb":[101],"datasets":[104],"using":[105],"evasion":[107],"As":[109],"result,":[111],"significantly":[119],"degrades":[120],"in-distribution":[122],"signals":[123,125],"(i.e.,":[124],"received":[126],"over":[127],"channels":[128],"with":[129,155],"identical":[130],"distributions":[131],"at":[132],"each":[133],"edge":[134],"device).":[135],"We":[136],"compare":[137],"our":[138,160],"work":[139],"previously":[141],"proposed":[142],"attacks":[144],"and":[145],"that":[147,177],"as":[148,150],"few":[149],"one":[151],"device":[153],"operating":[154],"low-powered":[157],"perturbation":[158],"under":[159],"can":[163],"induce":[164],"potent":[166],"classifier.":[173],"Moreover,":[174],"find":[176],"more":[178],"partaking":[180],"will":[184],"proportionally":[185],"degrade":[186],"performance.":[189]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
