{"id":"https://openalex.org/W4401508292","doi":"https://doi.org/10.1109/infocom52122.2024.10621289","title":"Explanation-Guided Backdoor Attacks on Model-Agnostic RF Fingerprinting","display_name":"Explanation-Guided Backdoor Attacks on Model-Agnostic RF Fingerprinting","publication_year":2024,"publication_date":"2024-05-20","ids":{"openalex":"https://openalex.org/W4401508292","doi":"https://doi.org/10.1109/infocom52122.2024.10621289"},"language":"en","primary_location":{"id":"doi:10.1109/infocom52122.2024.10621289","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom52122.2024.10621289","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2024 - IEEE Conference on Computer Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002596887","display_name":"Tianya Zhao","orcid":"https://orcid.org/0000-0002-3808-7549"},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Tianya Zhao","raw_affiliation_strings":["Florida International University,Knight Foundation School of Computing and Information Sciences,Miami,FL,US,33199"],"affiliations":[{"raw_affiliation_string":"Florida International University,Knight Foundation School of Computing and Information Sciences,Miami,FL,US,33199","institution_ids":["https://openalex.org/I19700959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043788836","display_name":"Xuyu Wang","orcid":"https://orcid.org/0000-0002-4759-8674"},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xuyu Wang","raw_affiliation_strings":["Florida International University,Knight Foundation School of Computing and Information Sciences,Miami,FL,US,33199"],"affiliations":[{"raw_affiliation_string":"Florida International University,Knight Foundation School of Computing and Information Sciences,Miami,FL,US,33199","institution_ids":["https://openalex.org/I19700959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100717357","display_name":"Junqing Zhang","orcid":"https://orcid.org/0000-0002-3502-2926"},"institutions":[{"id":"https://openalex.org/I146655781","display_name":"University of Liverpool","ror":"https://ror.org/04xs57h96","country_code":"GB","type":"education","lineage":["https://openalex.org/I146655781"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Junqing Zhang","raw_affiliation_strings":["University of Liverpool,Department of Electrical Engineering and Electronics,Liverpool,United Kingdom,L69 3GJ"],"affiliations":[{"raw_affiliation_string":"University of Liverpool,Department of Electrical Engineering and Electronics,Liverpool,United Kingdom,L69 3GJ","institution_ids":["https://openalex.org/I146655781"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080122431","display_name":"Shiwen Mao","orcid":"https://orcid.org/0000-0002-7052-0007"},"institutions":[{"id":"https://openalex.org/I82497590","display_name":"Auburn University","ror":"https://ror.org/02v80fc35","country_code":"US","type":"education","lineage":["https://openalex.org/I82497590"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shiwen Mao","raw_affiliation_strings":["Auburn University,Department of Electrical and Computer Engineering,Auburn,AL,US,36849"],"affiliations":[{"raw_affiliation_string":"Auburn University,Department of Electrical and Computer Engineering,Auburn,AL,US,36849","institution_ids":["https://openalex.org/I82497590"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5002596887"],"corresponding_institution_ids":["https://openalex.org/I19700959"],"apc_list":null,"apc_paid":null,"fwci":5.4622,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.96290154,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"221","last_page":"230"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9538999795913696,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9538999795913696,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.913100004196167,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9713582992553711},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6211451292037964},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4493475556373596}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9713582992553711},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6211451292037964},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4493475556373596}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infocom52122.2024.10621289","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom52122.2024.10621289","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2024 - IEEE Conference on Computer Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":53,"referenced_works":["https://openalex.org/W1874399837","https://openalex.org/W1945616565","https://openalex.org/W1957358593","https://openalex.org/W2101431076","https://openalex.org/W2296719434","https://openalex.org/W2516809705","https://openalex.org/W2543927648","https://openalex.org/W2748789698","https://openalex.org/W2771036112","https://openalex.org/W2774423163","https://openalex.org/W2803989302","https://openalex.org/W2807363941","https://openalex.org/W2889741439","https://openalex.org/W2903139904","https://openalex.org/W2962700793","https://openalex.org/W2963001136","https://openalex.org/W2990270730","https://openalex.org/W3034414373","https://openalex.org/W3042368254","https://openalex.org/W3044223678","https://openalex.org/W3047279638","https://openalex.org/W3083185154","https://openalex.org/W3093239278","https://openalex.org/W3105108969","https://openalex.org/W3111389230","https://openalex.org/W3154667606","https://openalex.org/W3155871095","https://openalex.org/W3156452696","https://openalex.org/W3172135703","https://openalex.org/W3172553205","https://openalex.org/W3176020692","https://openalex.org/W3181667991","https://openalex.org/W4206541522","https://openalex.org/W4214537185","https://openalex.org/W4214569028","https://openalex.org/W4214680449","https://openalex.org/W4283205753","https://openalex.org/W4283214572","https://openalex.org/W4295308277","https://openalex.org/W4298140072","https://openalex.org/W4378976916","https://openalex.org/W4384519137","https://openalex.org/W4386243277","https://openalex.org/W4386361537","https://openalex.org/W6640425456","https://openalex.org/W6743581629","https://openalex.org/W6745272055","https://openalex.org/W6746523225","https://openalex.org/W6746897123","https://openalex.org/W6750462152","https://openalex.org/W6781420246","https://openalex.org/W6784558051","https://openalex.org/W6787959460"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W4320031223","https://openalex.org/W4200629851","https://openalex.org/W4281902577","https://openalex.org/W4309417370","https://openalex.org/W4292107232","https://openalex.org/W3009072493","https://openalex.org/W4386080799","https://openalex.org/W3140988292"],"abstract_inverted_index":{"Despite":[0],"the":[1,22,31,44,81,88,127,139,149],"proven":[2],"capabilities":[3],"of":[4,33,46,83,90,151],"deep":[5],"neural":[6],"networks":[7],"(DNNs)":[8],"for":[9],"radio":[10],"frequency":[11,128],"(RF)":[12],"fingerprinting,":[13],"their":[14],"security":[15],"vulnerabilities":[16],"have":[17,29],"been":[18],"largely":[19],"overlooked.":[20],"Unlike":[21],"extensively":[23],"studied":[24],"image":[25],"domain,":[26],"few":[27],"works":[28],"explored":[30],"threat":[32],"backdoor":[34,51,92,102],"attacks":[35],"on":[36,54],"RF":[37,48,121],"signals.":[38],"In":[39],"this":[40,132],"paper,":[41],"we":[42,104,143],"analyze":[43],"susceptibility":[45],"DNN-based":[47],"fingerprinting":[49],"to":[50,63,79],"attacks,":[52],"focusing":[53],"a":[55,95],"more":[56],"practical":[57],"scenario":[58],"where":[59],"attackers":[60],"lack":[61],"access":[62],"control":[64],"model":[65],"gradients":[66],"and":[67,77,85,113],"training":[68],"processes.":[69],"We":[70],"propose":[71],"leveraging":[72],"explainable":[73],"machine":[74],"learning":[75],"techniques":[76],"autoencoders":[78],"guide":[80],"selection":[82],"positions":[84],"values,":[86],"enabling":[87],"creation":[89],"effective":[91],"triggers":[93],"in":[94,138],"model-agnostic":[96],"manner.":[97],"To":[98],"comprehensively":[99],"evaluate":[100],"our":[101,155],"attack,":[103],"employ":[105],"four":[106],"diverse":[107],"datasets":[108],"with":[109,145],"two":[110],"protocols":[111],"(Wi-Fi":[112],"LoRa)":[114],"across":[115],"various":[116],"DNN":[117],"architectures.":[118],"Given":[119],"that":[120],"signals":[122],"are":[123],"often":[124],"transformed":[125],"into":[126],"or":[129],"time-frequency":[130,140],"domains,":[131],"study":[133],"also":[134],"assesses":[135],"attack":[136],"efficacy":[137],"domain.":[141],"Furthermore,":[142],"experiment":[144],"potential":[146],"defenses,":[147],"demonstrating":[148],"difficulty":[150],"fully":[152],"safeguarding":[153],"against":[154],"attacks.":[156]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":5}],"updated_date":"2026-03-09T08:58:05.943551","created_date":"2025-10-10T00:00:00"}
