Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
  • Ojha N and Baray E. (2023). An Overview of Protocols-Based Security Threats and Countermeasures in WLAN 2023 4th International Conference for Emerging Technology (INCET). 10.1109/INCET57972.2023.10170514. 979-8-3503-3575-0. (1-6).

    https://ieeexplore.ieee.org/document/10170514/

  • Sikkanan S, T. S, S. K and M. K. (2023). 5G and 6G Wireless Communication. Innovative Smart Materials Used in Wireless Communication Technology. 10.4018/978-1-6684-7000-8.ch015. (284-310).

    https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-7000-8.ch015

  • Apruzzese G, Vladimirov R, Tastemirova A and Laskov P. Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples. IEEE Transactions on Network and Service Management. 10.1109/TNSM.2022.3188930. 19:4. (5312-5332).

    https://ieeexplore.ieee.org/document/9816059/

  • Sagduyu Y. (2022). Adversarial Machine Learning and Defense Game for NextG Signal Classification with Deep Learning MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM). 10.1109/MILCOM55135.2022.10017674. 978-1-6654-8534-0. (1076-1081).

    https://ieeexplore.ieee.org/document/10017674/

  • Manoj B, Santos P, Sadeghi M and Larsson E. (2022). Toward Robust Networks against Adversarial Attacks for Radio Signal Modulation Classification 2022 IEEE 23rd International Workshop on Signal Processing Advances in Wireless Communication (SPAWC). 10.1109/SPAWC51304.2022.9833926. 978-1-6654-9455-7. (1-5).

    https://ieeexplore.ieee.org/document/9833926/

  • Bout E, Loscri V and Gallais A. How Machine Learning Changes the Nature of Cyberattacks on IoT Networks: A Survey. IEEE Communications Surveys & Tutorials. 10.1109/COMST.2021.3127267. 24:1. (248-279).

    https://ieeexplore.ieee.org/document/9612604/

  • Zhu S, Wang S and Chen J. (2021). Application of Machine Learning in Space–Air–Ground Integrated Network Data Link. Communications, Signal Processing, and Systems. 10.1007/978-981-15-8411-4_210. (1596-1600).

    https://link.springer.com/10.1007/978-981-15-8411-4_210

  • Restuccia F, D'Oro S, Al-Shawabka A, Rendon B, Chowdhury K, Ioannidis S and Melodia T. Generalized wireless adversarial deep learning. Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning. (49-54).

    https://doi.org/10.1145/3395352.3402625