{"id":"https://openalex.org/W4402158786","doi":"https://doi.org/10.1109/icc51166.2024.10623131","title":"Unmasking Vulnerabilities: Adversarial Attacks against DRL-based Resource Allocation in O-RAN","display_name":"Unmasking Vulnerabilities: Adversarial Attacks against DRL-based Resource Allocation in O-RAN","publication_year":2024,"publication_date":"2024-06-09","ids":{"openalex":"https://openalex.org/W4402158786","doi":"https://doi.org/10.1109/icc51166.2024.10623131"},"language":"en","primary_location":{"id":"doi:10.1109/icc51166.2024.10623131","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc51166.2024.10623131","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2024 - IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5106954329","display_name":"Yared Abera Ergu","orcid":null},"institutions":[{"id":"https://openalex.org/I148099254","display_name":"National Chung Cheng University","ror":"https://ror.org/0028v3876","country_code":"TW","type":"education","lineage":["https://openalex.org/I148099254"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Yared Abera Ergu","raw_affiliation_strings":["National Chung Cheng University (CCU),Dept. of Computer Science and Information Engineering,Chiayi,Taiwan"],"affiliations":[{"raw_affiliation_string":"National Chung Cheng University (CCU),Dept. of Computer Science and Information Engineering,Chiayi,Taiwan","institution_ids":["https://openalex.org/I148099254"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034201659","display_name":"Van-Linh Nguyen","orcid":"https://orcid.org/0000-0002-3472-0108"},"institutions":[{"id":"https://openalex.org/I148099254","display_name":"National Chung Cheng University","ror":"https://ror.org/0028v3876","country_code":"TW","type":"education","lineage":["https://openalex.org/I148099254"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Van-Linh Nguyen","raw_affiliation_strings":["National Chung Cheng University (CCU),Dept. of Computer Science and Information Engineering,Chiayi,Taiwan"],"affiliations":[{"raw_affiliation_string":"National Chung Cheng University (CCU),Dept. of Computer Science and Information Engineering,Chiayi,Taiwan","institution_ids":["https://openalex.org/I148099254"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035925200","display_name":"Ren\u2010Hung Hwang","orcid":"https://orcid.org/0000-0001-7996-4184"},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Ren-Hung Hwang","raw_affiliation_strings":["College of Artificial Intelligence, National Yang Ming Chiao Tung University (NYCU),Taiwan"],"affiliations":[{"raw_affiliation_string":"College of Artificial Intelligence, National Yang Ming Chiao Tung University (NYCU),Taiwan","institution_ids":["https://openalex.org/I148366613"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021844836","display_name":"Ying\u2010Dar Lin","orcid":"https://orcid.org/0000-0002-5226-4396"},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Ying-Dar Lin","raw_affiliation_strings":["College of Artificial Intelligence, National Yang Ming Chiao Tung University (NYCU),Taiwan"],"affiliations":[{"raw_affiliation_string":"College of Artificial Intelligence, National Yang Ming Chiao Tung University (NYCU),Taiwan","institution_ids":["https://openalex.org/I148366613"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052809735","display_name":"Chuan-Yu Cho","orcid":null},"institutions":[{"id":"https://openalex.org/I4210148468","display_name":"Industrial Technology Research Institute","ror":"https://ror.org/05szzwt63","country_code":"TW","type":"nonprofit","lineage":["https://openalex.org/I4210148468"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chuan-Yu Cho","raw_affiliation_strings":["Industrial Technology Research Institute (ITRI),Information and Communications Research Lab,Taiwan"],"affiliations":[{"raw_affiliation_string":"Industrial Technology Research Institute (ITRI),Information and Communications Research Lab,Taiwan","institution_ids":["https://openalex.org/I4210148468"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5114219826","display_name":"Hui-Kuo Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210148468","display_name":"Industrial Technology Research Institute","ror":"https://ror.org/05szzwt63","country_code":"TW","type":"nonprofit","lineage":["https://openalex.org/I4210148468"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Hui-Kuo Yang","raw_affiliation_strings":["Industrial Technology Research Institute (ITRI),Information and Communications Research Lab,Taiwan"],"affiliations":[{"raw_affiliation_string":"Industrial Technology Research Institute (ITRI),Information and Communications Research Lab,Taiwan","institution_ids":["https://openalex.org/I4210148468"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5106954329"],"corresponding_institution_ids":["https://openalex.org/I148099254"],"apc_list":null,"apc_paid":null,"fwci":1.8316,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.86387576,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"2378","last_page":"2383"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9897000193595886,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ran","display_name":"Ran","score":0.694333016872406},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6508331298828125},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6106441617012024},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5560509562492371},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4618595540523529},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.07418078184127808}],"concepts":[{"id":"https://openalex.org/C160704184","wikidata":"https://www.wikidata.org/wiki/Q18031028","display_name":"Ran","level":2,"score":0.694333016872406},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6508331298828125},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6106441617012024},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5560509562492371},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4618595540523529},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.07418078184127808}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc51166.2024.10623131","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc51166.2024.10623131","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2024 - IEEE International Conference on Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2888024549","https://openalex.org/W3163127313","https://openalex.org/W3212981375","https://openalex.org/W3217596786","https://openalex.org/W4200498924","https://openalex.org/W4210803946","https://openalex.org/W4290997040","https://openalex.org/W4310716661","https://openalex.org/W4317796310","https://openalex.org/W4327928501","https://openalex.org/W4392158247"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W1766728438","https://openalex.org/W1668090144","https://openalex.org/W2504993638","https://openalex.org/W2083168956","https://openalex.org/W2980853820","https://openalex.org/W404373762","https://openalex.org/W2186004379","https://openalex.org/W2107427363"],"abstract_inverted_index":{"The":[0,101],"rapid":[1],"advancement":[2],"of":[3,30,45,67,73,148,161],"wireless":[4],"networks":[5],"towards":[6],"Artificial":[7],"Intelligence":[8],"(AI)-driven":[9],"solutions":[10,62],"attracts":[11],"many":[12],"vendors":[13],"to":[14,132,172,189],"build":[15],"resilient":[16],"and":[17,33,92,108,126,134,169],"intelligent":[18],"capabilities":[19],"for":[20,59,197],"Open":[21],"Radio":[22],"Access":[23],"Networks":[24],"(O-RAN).":[25],"However,":[26],"besides":[27],"the":[28,43,56,60,64,71,89,94,98,112,121,145,154,179,185],"benefits":[29],"achieving":[31],"flexibility":[32],"intelligence,":[34],"openness":[35],"in":[36,63,111,138],"native":[37],"AI-driven":[38],"O-RAN":[39],"functions":[40],"is":[41,153,184],"also":[42,142],"target":[44],"severe":[46],"AI-related":[47],"security":[48,57],"threats,":[49],"e.g.,":[50],"adversarial":[51,84],"attacks.":[52],"This":[53],"work":[54],"addresses":[55],"matter":[58],"AI-powered":[61],"physical":[65],"layer":[66],"O-RAN,":[68],"specifically":[69],"within":[70],"context":[72],"deep":[74],"reinforcement":[75],"learning":[76],"(DRL)-based":[77],"resource":[78,151],"allocation.":[79],"We":[80,141],"introduce":[81],"a":[82,159],"new":[83],"attack":[85,102,122,183],"variant":[86],"that":[87,120,144],"manipulates":[88],"environment":[90,155,174],"parameters":[91],"misleads":[93],"agent's":[95],"observation":[96,156],"during":[97],"inference":[99],"phase.":[100],"can":[103,166],"cause":[104,190],"incorrect":[105],"allocation":[106,152],"decisions":[107],"significant":[109],"degradation":[110],"transmission":[113],"data":[114,125],"rate.":[115],"Our":[116],"evaluation":[117],"results":[118],"show":[119],"degrades":[123],"user":[124],"packet":[127],"delivery":[128],"rates":[129],"by":[130],"up":[131],"40%":[133],"77.74%,":[135],"respectively,":[136],"particularly":[137],"ultra-low-latency":[139],"services.":[140],"found":[143],"major":[146],"weakness":[147],"DRL-driven":[149],"radio":[150],"stage,":[157],"where":[158],"group":[160],"compromised":[162],"users":[163],"or":[164,194],"jammers":[165],"spoof":[167],"noises":[168],"signal":[170],"power":[171],"mislead":[173],"interaction.":[175],"In":[176],"our":[177],"context,":[178],"proposed":[180],"policy":[181],"infiltration":[182],"most":[186],"efficient":[187],"approach":[188],"sustained":[191],"network":[192],"inefficiencies":[193],"reduced":[195],"throughput":[196],"benign":[198],"users.":[199]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2}],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
