{"id":"https://openalex.org/W7117662851","doi":"https://doi.org/10.1109/tce.2025.3649905","title":"MSAAD: Meta-Learning-Based Self-Adaptive Adversarial Defense for Specific Emitter Identification in Consumer Electronics","display_name":"MSAAD: Meta-Learning-Based Self-Adaptive Adversarial Defense for Specific Emitter Identification in Consumer Electronics","publication_year":2025,"publication_date":"2025-12-31","ids":{"openalex":"https://openalex.org/W7117662851","doi":"https://doi.org/10.1109/tce.2025.3649905"},"language":null,"primary_location":{"id":"doi:10.1109/tce.2025.3649905","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3649905","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034231010","display_name":"Mingfang Li","orcid":"https://orcid.org/0009-0008-1522-6842"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Mingfang Li","raw_affiliation_strings":["College of Information and Communication Engineering, Harbin Engineering University, Harbin, China"],"affiliations":[{"raw_affiliation_string":"College of Information and Communication Engineering, Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079854407","display_name":"Zheng Dou","orcid":null},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zheng Dou","raw_affiliation_strings":["College of Information and Communication Engineering, Harbin Engineering University, Harbin, China"],"affiliations":[{"raw_affiliation_string":"College of Information and Communication Engineering, Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121657553","display_name":"Yun Lin","orcid":null},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yun Lin","raw_affiliation_strings":["College of Information and Communication Engineering, Harbin Engineering University, Harbin, China"],"affiliations":[{"raw_affiliation_string":"College of Information and Communication Engineering, Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002200026","display_name":"Qiling Gao","orcid":null},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiling Gao","raw_affiliation_strings":["College of Information and Communication Engineering, Harbin Engineering University, Harbin, China"],"affiliations":[{"raw_affiliation_string":"College of Information and Communication Engineering, Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101045490","display_name":"Hang Jiang Hang Jiang","orcid":null},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hang Jiang","raw_affiliation_strings":["College of Information and Communication Engineering, Harbin Engineering University, Harbin, China"],"affiliations":[{"raw_affiliation_string":"College of Information and Communication Engineering, Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5034231010"],"corresponding_institution_ids":["https://openalex.org/I151727225"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.82595438,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"72","issue":"1","first_page":"2243","last_page":"2254"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.6456999778747559,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.6456999778747559,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.23770000040531158,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.05420000106096268,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8848000168800354},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.7278000116348267},{"id":"https://openalex.org/keywords/adaptability","display_name":"Adaptability","score":0.6820999979972839},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5069000124931335},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.4968999922275543},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.47609999775886536},{"id":"https://openalex.org/keywords/electronics","display_name":"Electronics","score":0.4074999988079071}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8848000168800354},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.7278000116348267},{"id":"https://openalex.org/C177606310","wikidata":"https://www.wikidata.org/wiki/Q5674297","display_name":"Adaptability","level":2,"score":0.6820999979972839},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6643999814987183},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5069000124931335},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.4968999922275543},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.47609999775886536},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4250999987125397},{"id":"https://openalex.org/C138331895","wikidata":"https://www.wikidata.org/wiki/Q11650","display_name":"Electronics","level":2,"score":0.4074999988079071},{"id":"https://openalex.org/C2778403875","wikidata":"https://www.wikidata.org/wiki/Q20312394","display_name":"Adversarial machine learning","level":3,"score":0.37450000643730164},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36980000138282776},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.2930000126361847},{"id":"https://openalex.org/C198531522","wikidata":"https://www.wikidata.org/wiki/Q485146","display_name":"Sample (material)","level":2,"score":0.287200003862381},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.2800000011920929},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2754000127315521},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.27230000495910645},{"id":"https://openalex.org/C133082901","wikidata":"https://www.wikidata.org/wiki/Q272826","display_name":"Electronic warfare","level":3,"score":0.2669000029563904},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.26440000534057617},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2533000111579895}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tce.2025.3649905","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3649905","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Deep":[0],"learning":[1],"(DL)-based":[2],"specific":[3],"emitter":[4],"identification":[5],"(SEI)":[6],"efficiently":[7],"enables":[8],"automatic":[9],"device":[10,37,171],"recognition":[11],"in":[12,108,181],"consumer":[13,182],"electronics":[14],"for":[15,52,78,173],"intelligent":[16,175],"content":[17,176],"retrieval":[18,177],"and":[19,39,60,101,142,156,178],"personalized":[20,179],"services.":[21],"However,":[22],"adversarial":[23,49,58,69,73,102,128,162],"attacks":[24,74],"can":[25,55],"manipulate":[26],"wireless":[27],"signal":[28],"features":[29],"to":[30,71,126,134,168],"deceive":[31],"DL-based":[32],"models":[33],"of":[34,164],"SEI,":[35,53],"compromising":[36],"authentication":[38,172],"system":[40],"security.":[41],"Therefore,":[42],"this":[43],"paper":[44],"proposes":[45],"a":[46,109,123,135],"meta-learning-based":[47],"self-adaptive":[48],"defense":[50,62,91,120],"(MSAAD)":[51],"which":[54],"dynamically":[56],"predict":[57],"perturbations":[59,67],"sample":[61],"weights.":[63],"Specifically,":[64],"the":[65,89,95,117,140,161,165],"predicted":[66,90],"guide":[68],"training":[70],"generate":[72],"with":[75],"different":[76,79,153,157],"intensities":[77],"samples,":[80],"enabling":[81],"fine-grained":[82],"robustness":[83,163],"against":[84],"varying":[85],"attack":[86],"intensities.":[87],"Meanwhile,":[88],"weights":[92],"adaptively":[93],"balance":[94],"loss":[96],"contributions":[97],"from":[98],"both":[99],"clean":[100],"examples.":[103,129],"Adaptive":[104],"parameter":[105],"adjustment":[106],"results":[107,114],"more":[110],"targeted":[111],"defense.":[112],"Experiment":[113],"indicate":[115],"that":[116],"proposed":[118],"adaptive":[119],"approach":[121],"achieves":[122],"better":[124],"adaptability":[125],"various":[127],"The":[130],"MSAAD":[131],"yields":[132],"up":[133],"64%":[136],"performance":[137],"gain":[138],"over":[139],"Baseline,":[141],"surpasses":[143],"several":[144],"state-of-the-art":[145],"methods":[146],"by":[147],"as":[148,150],"much":[149],"58%":[151],"under":[152],"signal-to-noise":[154],"ratios":[155],"attacks,":[158],"substantially":[159],"strengthening":[160],"SEI":[166],"model,":[167],"ensure":[169],"reliable":[170],"secure":[174],"services":[180],"electronics.":[183]},"counts_by_year":[],"updated_date":"2026-03-26T06:05:38.182114","created_date":"2025-12-31T00:00:00"}
