{"id":"https://openalex.org/W7134890992","doi":"https://doi.org/10.1109/jsac.2026.3672550","title":"XAI-Guided Physical Adversarial Machine Learning Attacks on Automatic Modulation Classification","display_name":"XAI-Guided Physical Adversarial Machine Learning Attacks on Automatic Modulation Classification","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7134890992","doi":"https://doi.org/10.1109/jsac.2026.3672550"},"language":null,"primary_location":{"id":"doi:10.1109/jsac.2026.3672550","is_oa":true,"landing_page_url":"https://doi.org/10.1109/jsac.2026.3672550","pdf_url":null,"source":{"id":"https://openalex.org/S90422530","display_name":"IEEE Journal on Selected Areas in Communications","issn_l":"0733-8716","issn":["0733-8716","1558-0008"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Journal on Selected Areas in Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1109/jsac.2026.3672550","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093693843","display_name":"Younes Salmi","orcid":"https://orcid.org/0000-0002-9181-7475"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Younes Salmi","raw_affiliation_strings":["Institute of Radiocommunications, Poznan University of Technology, Poznan, Poland"],"affiliations":[{"raw_affiliation_string":"Institute of Radiocommunications, Poznan University of Technology, Poznan, Poland","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5128775555","display_name":"Hanna Bogucka","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hanna Bogucka","raw_affiliation_strings":["Institute of Radiocommunications, Poznan University of Technology, Poznan, Poland"],"affiliations":[{"raw_affiliation_string":"Institute of Radiocommunications, Poznan University of Technology, Poznan, Poland","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5093693843"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.72974181,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"44","issue":null,"first_page":"4271","last_page":"4286"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9106000065803528,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9106000065803528,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.07909999787807465,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.0012000000569969416,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.7721999883651733},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5906999707221985},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.5878999829292297},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.524399995803833},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.4271000027656555},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4097999930381775},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.33730000257492065},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.32919999957084656}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8676999807357788},{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.7721999883651733},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6633999943733215},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6294999718666077},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5906999707221985},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.5878999829292297},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.524399995803833},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.4271000027656555},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4097999930381775},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.33730000257492065},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.32919999957084656},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.32580000162124634},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3206999897956848},{"id":"https://openalex.org/C110083411","wikidata":"https://www.wikidata.org/wiki/Q1744628","display_name":"Statistical classification","level":2,"score":0.31929999589920044},{"id":"https://openalex.org/C123860398","wikidata":"https://www.wikidata.org/wiki/Q6934605","display_name":"Multiclass classification","level":3,"score":0.31929999589920044},{"id":"https://openalex.org/C123079801","wikidata":"https://www.wikidata.org/wiki/Q750240","display_name":"Modulation (music)","level":2,"score":0.3034000098705292},{"id":"https://openalex.org/C2776145971","wikidata":"https://www.wikidata.org/wiki/Q30673951","display_name":"Labeled data","level":2,"score":0.27869999408721924},{"id":"https://openalex.org/C95922358","wikidata":"https://www.wikidata.org/wiki/Q5432725","display_name":"False positive rate","level":2,"score":0.26100000739097595},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.25440001487731934}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jsac.2026.3672550","is_oa":true,"landing_page_url":"https://doi.org/10.1109/jsac.2026.3672550","pdf_url":null,"source":{"id":"https://openalex.org/S90422530","display_name":"IEEE Journal on Selected Areas in Communications","issn_l":"0733-8716","issn":["0733-8716","1558-0008"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Journal on Selected Areas in Communications","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/jsac.2026.3672550","is_oa":true,"landing_page_url":"https://doi.org/10.1109/jsac.2026.3672550","pdf_url":null,"source":{"id":"https://openalex.org/S90422530","display_name":"IEEE Journal on Selected Areas in Communications","issn_l":"0733-8716","issn":["0733-8716","1558-0008"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Journal on Selected Areas in Communications","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.44922348856925964}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,26,35,92,98,109,115,130,153,158,192],"advancement":[2],"of":[3,25,87,163],"Artificial":[4],"Intelligence":[5],"(AI)":[6],"and":[7,68,97,172],"Explainable":[8],"AI":[9],"(XAI),":[10],"Deep":[11],"Learning":[12],"(DL)":[13],"algorithms":[14],"become":[15],"increasingly":[16],"vulnerable":[17],"to":[18,79,114,123],"adversarial":[19],"machine":[20],"learning":[21],"(AML)":[22],"threats.":[23],"One":[24],"widely":[27],"used":[28,78],"DL-based":[29,52,116,147],"applications":[30],"in":[31,51,161],"wireless":[32],"communication":[33],"is":[34],"Automatic":[36],"Modulation":[37],"Classification":[38],"(AMC).":[39],"In":[40],"this":[41],"paper,":[42],"we":[43,56],"investigate":[44],"XAI":[45],"methods":[46,77],"for":[47],"designing":[48],"AML":[49,59,184],"attacks":[50,141,145,185],"AMC":[53,117],"systems.":[54],"Specifically,":[55],"discuss":[57],"four":[58],"tactics,":[60],"namely,":[61],"untargeted":[62,66],"causative,":[63],"targeted":[64,69],"evasion,":[65,67],"backdoor":[70],"attacks.":[71],"We":[72,136],"present":[73],"new":[74,139],"specific":[75],"explanation":[76],"launch":[80],"these":[81,125,138],"attacks,":[82],"which":[83,190],"are":[84],"customized":[85],"versions":[86],"Saliency":[88],"Map,":[89],"Integrated":[90],"Gradient,":[91],"SHapley":[93],"Additive":[94],"exPlanations":[95],"(SHAP),":[96],"enhanced":[99],"Gradient-weighted":[100],"Class":[101],"Activation":[102],"Mapping":[103],"(Grad-CAM++)":[104],"techniques.":[105],"These":[106],"explanations":[107],"identify":[108],"most":[110],"contributory":[111],"data":[112,127],"points":[113],"classifier.":[118],"It":[119],"allows":[120],"an":[121],"attacker":[122],"perturb":[124],"identified":[126],"samples":[128],"using":[129],"Fast":[131],"Gradient":[132],"Sign":[133],"Method":[134],"(FGSM).":[135],"compare":[137],"XAI-guided":[140,154,183],"with":[142],"traditional":[143,159],"state-of-the-art":[144],"on":[146],"AMC.":[148],"Our":[149],"research":[150],"shows":[151],"that":[152],"threats":[155],"outperform":[156],"(negatively)":[157],"ones":[160],"terms":[162],"Robust":[164],"Accuracy":[165],"(RA)":[166],"metric,":[167],"Attack":[168],"Success":[169],"Rate":[170,174],"(ASR),":[171],"Fooling":[173],"(FR),":[175],"but":[176],"they":[177],"exhibit":[178],"higher":[179],"computational":[180,194],"complexity.":[181],"However,":[182],"require":[186],"fewer":[187],"perturbed":[188],"signals,":[189],"justifies":[191],"exhibited":[193],"cost.":[195]},"counts_by_year":[],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2026-03-12T00:00:00"}
