{"id":"https://openalex.org/W4416281188","doi":"https://doi.org/10.1109/milcom64451.2025.11309917","title":"An Adversarial-Driven Experimental Study on Deep Learning for RF Fingerprinting","display_name":"An Adversarial-Driven Experimental Study on Deep Learning for RF Fingerprinting","publication_year":2025,"publication_date":"2025-10-06","ids":{"openalex":"https://openalex.org/W4416281188","doi":"https://doi.org/10.1109/milcom64451.2025.11309917"},"language":"en","primary_location":{"id":"doi:10.1109/milcom64451.2025.11309917","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom64451.2025.11309917","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2025 - 2025 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2507.14109","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111344240","display_name":"Xinyu Cao","orcid":null},"institutions":[{"id":"https://openalex.org/I8692664","display_name":"University of Oklahoma","ror":"https://ror.org/02aqsxs83","country_code":"US","type":"education","lineage":["https://openalex.org/I8692664"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Xinyu Cao","raw_affiliation_strings":["University of Oklahoma,Norman,OK"],"affiliations":[{"raw_affiliation_string":"University of Oklahoma,Norman,OK","institution_ids":["https://openalex.org/I8692664"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069137051","display_name":"Bhim M. Adhikari","orcid":"https://orcid.org/0000-0003-1164-0989"},"institutions":[{"id":"https://openalex.org/I78715868","display_name":"University of Arkansas at Fayetteville","ror":"https://ror.org/05jbt9m15","country_code":"US","type":"education","lineage":["https://openalex.org/I78715868"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bimal Adhikari","raw_affiliation_strings":["University of Arkansas,Fayetteville,AR"],"affiliations":[{"raw_affiliation_string":"University of Arkansas,Fayetteville,AR","institution_ids":["https://openalex.org/I78715868"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057883383","display_name":"Shangqing Zhao","orcid":"https://orcid.org/0000-0001-8543-2977"},"institutions":[{"id":"https://openalex.org/I8692664","display_name":"University of Oklahoma","ror":"https://ror.org/02aqsxs83","country_code":"US","type":"education","lineage":["https://openalex.org/I8692664"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shangqing Zhao","raw_affiliation_strings":["University of Oklahoma,Norman,OK"],"affiliations":[{"raw_affiliation_string":"University of Oklahoma,Norman,OK","institution_ids":["https://openalex.org/I8692664"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101424095","display_name":"Jingxian Wu","orcid":"https://orcid.org/0000-0002-9588-814X"},"institutions":[{"id":"https://openalex.org/I78715868","display_name":"University of Arkansas at Fayetteville","ror":"https://ror.org/05jbt9m15","country_code":"US","type":"education","lineage":["https://openalex.org/I78715868"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jingxian Wu","raw_affiliation_strings":["University of Arkansas,Fayetteville,AR"],"affiliations":[{"raw_affiliation_string":"University of Arkansas,Fayetteville,AR","institution_ids":["https://openalex.org/I78715868"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100997452","display_name":"Yanjun Pan","orcid":null},"institutions":[{"id":"https://openalex.org/I78715868","display_name":"University of Arkansas at Fayetteville","ror":"https://ror.org/05jbt9m15","country_code":"US","type":"education","lineage":["https://openalex.org/I78715868"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yanjun Pan","raw_affiliation_strings":["University of Arkansas,Fayetteville,AR"],"affiliations":[{"raw_affiliation_string":"University of Arkansas,Fayetteville,AR","institution_ids":["https://openalex.org/I78715868"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5111344240"],"corresponding_institution_ids":["https://openalex.org/I8692664"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.18213732,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"739","last_page":"744"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9861000180244446,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9861000180244446,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.005900000222027302,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.0007999999797903001,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.7226999998092651},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6822999715805054},{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.6715999841690063},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4668999910354614},{"id":"https://openalex.org/keywords/radio-frequency","display_name":"Radio frequency","score":0.45010000467300415},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.4205999970436096},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.34060001373291016}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7440000176429749},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.7226999998092651},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6822999715805054},{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.6715999841690063},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6003000140190125},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4668999910354614},{"id":"https://openalex.org/C74064498","wikidata":"https://www.wikidata.org/wiki/Q3396184","display_name":"Radio frequency","level":2,"score":0.45010000467300415},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.42800000309944153},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.4205999970436096},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.34060001373291016},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.33390000462532043},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.31439998745918274},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.3091000020503998},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.30239999294281006},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.299699991941452},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.27810001373291016},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2768000066280365},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.27129998803138733},{"id":"https://openalex.org/C204222849","wikidata":"https://www.wikidata.org/wiki/Q104954","display_name":"Radio-frequency identification","level":2,"score":0.25999999046325684}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/milcom64451.2025.11309917","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom64451.2025.11309917","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2025 - 2025 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2507.14109","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2507.14109","pdf_url":"https://arxiv.org/pdf/2507.14109","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"doi:10.48550/arxiv.2507.14109","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2507.14109","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2507.14109","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2507.14109","pdf_url":"https://arxiv.org/pdf/2507.14109","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W4394586037","https://openalex.org/W4402157651","https://openalex.org/W2889741439","https://openalex.org/W2903139904","https://openalex.org/W3092863397","https://openalex.org/W3095910127","https://openalex.org/W2937290901","https://openalex.org/W4385834141","https://openalex.org/W3097202331","https://openalex.org/W4309374915","https://openalex.org/W2096350752","https://openalex.org/W2163137659"],"related_works":[],"abstract_inverted_index":{"Radio":[0],"frequency":[1],"(RF)":[2],"fingerprinting,":[3],"which":[4],"extracts":[5],"unique":[6],"hardware":[7],"imperfections":[8],"of":[9,64,81],"radio":[10],"devices,":[11],"has":[12],"emerged":[13],"as":[14,109,127,177],"a":[15,93,104],"promising":[16],"physical-layer":[17],"device":[18,105],"identification":[19],"mechanism":[20],"in":[21,39,57],"zero":[22],"trust":[23],"architectures":[24],"and":[25,54,160],"beyond":[26],"5G":[27],"networks.":[28],"In":[29,72],"particular,":[30],"deep":[31],"learning":[32],"(DL)":[33],"methods":[34,175],"have":[35,45,68],"demonstrated":[36],"state-of-the-art":[37],"performance":[38],"this":[40,73,122],"domain.":[41],"However,":[42],"existing":[43],"approaches":[44,67],"primarily":[46],"focused":[47],"on":[48,116,147],"enhancing":[49],"system":[50],"robustness":[51],"against":[52],"temporal":[53],"spatial":[55],"variations":[56],"wireless":[58],"environments,":[59],"while":[60],"the":[61,78,138,152],"security":[62,79,174],"vulnerabilities":[63],"these":[65],"DL-based":[66,82],"often":[69],"been":[70],"overlooked.":[71],"work,":[74],"we":[75,141],"systematically":[76],"investigate":[77],"risks":[80],"RF":[83,156],"fingerprinting":[84],"systems":[85],"through":[86,172],"an":[87,128],"adversarial-driven":[88],"experimental":[89],"analysis.":[90],"We":[91],"observe":[92],"consistent":[94],"misclassification":[95],"behavior":[96,123],"for":[97],"DL":[98,145],"models":[99,146,153],"under":[100],"domain":[101],"shifts,":[102],"where":[103],"is":[106],"frequently":[107],"misclassified":[108],"another":[110],"specific":[111],"one.":[112],"Our":[113],"analysis":[114],"based":[115],"extensive":[117],"real-world":[118],"experiments":[119],"demonstrates":[120],"that":[121,143,167],"can":[124],"be":[125,169],"exploited":[126],"effective":[129],"backdoor":[130],"to":[131,135,154],"enable":[132],"external":[133],"attackers":[134],"intrude":[136],"into":[137],"system.":[139],"Furthermore,":[140],"show":[142],"training":[144],"raw":[148],"received":[149],"signals":[150],"causes":[151],"entangle":[155],"fingerprints":[157],"with":[158],"environmental":[159],"signal-pattern":[161],"features,":[162],"creating":[163],"additional":[164],"attack":[165],"vectors":[166],"cannot":[168],"mitigated":[170],"solely":[171],"post-processing":[173],"such":[176],"confidence":[178],"thresholds.":[179]},"counts_by_year":[],"updated_date":"2026-04-15T08:11:43.952461","created_date":"2025-10-10T00:00:00"}
