{"id":"https://openalex.org/W4320031173","doi":"https://doi.org/10.1109/milcom55135.2022.10017674","title":"Adversarial Machine Learning and Defense Game for NextG Signal Classification with Deep Learning","display_name":"Adversarial Machine Learning and Defense Game for NextG Signal Classification with Deep Learning","publication_year":2022,"publication_date":"2022-11-28","ids":{"openalex":"https://openalex.org/W4320031173","doi":"https://doi.org/10.1109/milcom55135.2022.10017674"},"language":"en","primary_location":{"id":"doi:10.1109/milcom55135.2022.10017674","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/milcom55135.2022.10017674","pdf_url":null,"source":{"id":"https://openalex.org/S4363608114","display_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089570143","display_name":"Yalin E. Sagduyu","orcid":"https://orcid.org/0000-0003-1576-5527"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yalin E. Sagduyu","raw_affiliation_strings":["National Security Institute, Virginia Tech,Arlington,VA,USA","National Security Institute, Virginia Tech, Arlington, VA, USA"],"affiliations":[{"raw_affiliation_string":"National Security Institute, Virginia Tech,Arlington,VA,USA","institution_ids":["https://openalex.org/I859038795"]},{"raw_affiliation_string":"National Security Institute, Virginia Tech, Arlington, VA, USA","institution_ids":["https://openalex.org/I859038795"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5089570143"],"corresponding_institution_ids":["https://openalex.org/I859038795"],"apc_list":null,"apc_paid":null,"fwci":0.3118,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.5433635,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1076","last_page":"1081"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9732999801635742,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.8399995565414429},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7179443836212158},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6317555904388428},{"id":"https://openalex.org/keywords/adversarial-machine-learning","display_name":"Adversarial machine learning","score":0.630475640296936},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6040558815002441},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.5430994629859924},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5201609134674072},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.4487510919570923},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3513612747192383},{"id":"https://openalex.org/keywords/mathematical-economics","display_name":"Mathematical economics","score":0.09404587745666504},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.0929705798625946}],"concepts":[{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.8399995565414429},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7179443836212158},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6317555904388428},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.630475640296936},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6040558815002441},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.5430994629859924},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5201609134674072},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.4487510919570923},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3513612747192383},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.09404587745666504},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0929705798625946},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/milcom55135.2022.10017674","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/milcom55135.2022.10017674","pdf_url":null,"source":{"id":"https://openalex.org/S4363608114","display_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7599999904632568,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W2132645110","https://openalex.org/W2132814903","https://openalex.org/W2623427976","https://openalex.org/W2809619574","https://openalex.org/W2853090665","https://openalex.org/W2888024549","https://openalex.org/W2907201671","https://openalex.org/W2945385671","https://openalex.org/W2946313841","https://openalex.org/W2963047971","https://openalex.org/W2964277700","https://openalex.org/W2968867107","https://openalex.org/W2971480956","https://openalex.org/W2983729222","https://openalex.org/W2986517689","https://openalex.org/W2995240473","https://openalex.org/W2996613410","https://openalex.org/W3002574533","https://openalex.org/W3003872486","https://openalex.org/W3023683268","https://openalex.org/W3025606635","https://openalex.org/W3042934865","https://openalex.org/W3047492485","https://openalex.org/W3087940812","https://openalex.org/W3195387997","https://openalex.org/W3200528697","https://openalex.org/W3213282580","https://openalex.org/W4295308277"],"related_works":["https://openalex.org/W4320018150","https://openalex.org/W2918664383","https://openalex.org/W2040808657","https://openalex.org/W3048732067","https://openalex.org/W4320855730","https://openalex.org/W106056076","https://openalex.org/W4383468834","https://openalex.org/W2135200719","https://openalex.org/W4384648009","https://openalex.org/W4303645823"],"abstract_inverted_index":{"This":[0,123],"paper":[1],"presents":[2],"a":[3,28,150],"game-theoretic":[4],"framework":[5],"to":[6,82,184,199,239,246,261],"study":[7],"the":[8,24,59,71,84,87,105,113,119,132,142,145,154,157,162,167,173,176,195,226,241,247,251,262,269],"interactions":[9,140],"of":[10,31,53,86,159,169,178,250,271],"attack":[11,81,129,205,264],"and":[12,51,97,144,172,203,265,268],"defense":[13,101,124,163,266],"for":[14,27,40,236],"deep":[15,36],"learning-based":[16],"NextG":[17,20,272],"signal":[18,273],"classification.":[19],"systems":[21],"such":[22,43,216],"as":[23,44,57,70,149,213],"one":[25],"envisioned":[26],"massive":[29],"number":[30],"IoT":[32],"devices":[33],"can":[34,76,103,220],"employ":[35],"neural":[37],"networks":[38],"(DNNs)":[39],"various":[41],"tasks":[42],"user":[45],"equipment":[46],"identification,":[47],"physical":[48],"layer":[49],"authentication,":[50],"detection":[52],"incumbent":[54],"users":[55],"(such":[56],"in":[58,112,244,256],"Citizens":[60],"Broadband":[61],"Radio":[62],"Service":[63],"(CBRS)":[64],"band).":[65],"By":[66],"training":[67,121],"another":[68],"DNN":[69],"surrogate":[72],"model,":[73,89],"an":[74,78,128],"adversary":[75,146,174],"launch":[77],"inference":[79],"(exploratory)":[80],"learn":[83],"behavior":[85],"victim":[88,114],"predict":[90],"successful":[91],"operation":[92,214],"modes":[93,215],"(e.g.,":[94,188],"channel":[95],"access),":[96],"jam":[98],"them.":[99],"A":[100,231],"mechanism":[102],"increase":[104],"adversary's":[106,120,196],"uncertainty":[107],"by":[108],"introducing":[109],"controlled":[110],"errors":[111],"model's":[115],"decisions":[116],"(i.e.,":[117,166],"poisoning":[118],"data).":[122],"is":[125,136,183,198,229,234,259,277],"effective":[126],"against":[127,275],"but":[130],"reduces":[131],"performance":[133,255],"when":[134],"there":[135],"no":[137,218],"attack.":[138],"The":[139,180,207,254],"between":[141],"defender":[143,155],"are":[147,211],"formulated":[148,235],"non-cooperative":[151],"game,":[152],"where":[153],"selects":[156,175],"probability":[158,177],"defending":[160],"or":[161,190],"level":[164],"itself":[165],"ratio":[168],"falsified":[170],"decisions)":[171],"attacking.":[179],"defender's":[181],"objective":[182,197],"maximize":[185],"its":[186,204,223],"reward":[187,202],"throughput":[189],"transmission":[191],"success":[192],"ratio),":[193],"whereas":[194],"minimize":[200],"this":[201],"cost.":[206],"Nash":[208,257],"equilibrium":[209,258],"strategies":[210],"determined":[212],"that":[217],"player":[219,238],"unilaterally":[221],"improve":[222],"utility":[224],"given":[225],"other's":[227],"strategy":[228],"fixed.":[230],"fictitious":[232],"play":[233,240],"each":[237],"game":[242],"repeatedly":[243],"response":[245],"empirical":[248],"frequency":[249],"opponent's":[252],"actions.":[253],"compared":[260],"fixed":[263],"cases,":[267],"resilience":[270],"classification":[274],"attacks":[276],"quantified.":[278]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2025-12-24T23:09:58.560324","created_date":"2025-10-10T00:00:00"}
