ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1906.00076
  4. Cited By
IoT Network Security from the Perspective of Adversarial Deep Learning

IoT Network Security from the Perspective of Adversarial Deep Learning

31 May 2019
Y. Sagduyu
Yi Shi
T. Erpek
    AAML
ArXiv (abs)PDFHTML

Papers citing "IoT Network Security from the Perspective of Adversarial Deep Learning"

33 / 33 papers shown
Title
Enabling AutoML for Zero-Touch Network Security: Use-Case Driven Analysis
Enabling AutoML for Zero-Touch Network Security: Use-Case Driven Analysis
Li Yang
Mirna El Rajab
Abdallah Shami
Sami Muhaidat
154
9
0
28 Feb 2025
Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networks
Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networks
Li Yang
Shimaa A. Naser
Abdallah Shami
Sami Muhaidat
Lyndon Ong
Merouane Debbah
105
2
0
28 Feb 2025
Vaccinating Federated Learning for Robust Modulation Classification in
  Distributed Wireless Networks
Vaccinating Federated Learning for Robust Modulation Classification in Distributed Wireless Networks
Hunmin Lee
Hongju Seong
Wonbin Kim
Hyeokchan Kwon
Daehee Seo
53
0
0
16 Oct 2024
Securing NextG Systems against Poisoning Attacks on Federated Learning:
  A Game-Theoretic Solution
Securing NextG Systems against Poisoning Attacks on Federated Learning: A Game-Theoretic Solution
Y. Sagduyu
T. Erpek
Yi Shi
AAML
67
2
0
28 Dec 2023
AIR: Threats of Adversarial Attacks on Deep Learning-Based Information
  Recovery
AIR: Threats of Adversarial Attacks on Deep Learning-Based Information Recovery
Jinyin Chen
Jie Ge
Shilian Zheng
Linhui Ye
Haibin Zheng
Weiguo Shen
Keqiang Yue
Xiaoniu Yang
AAML
49
2
0
17 Aug 2023
Mitigating Adversarial Vulnerability through Causal Parameter Estimation
  by Adversarial Double Machine Learning
Mitigating Adversarial Vulnerability through Causal Parameter Estimation by Adversarial Double Machine Learning
Byung-Kwan Lee
Junho Kim
Yonghyun Ro
AAML
95
9
0
14 Jul 2023
Demystifying Causal Features on Adversarial Examples and Causal
  Inoculation for Robust Network by Adversarial Instrumental Variable
  Regression
Demystifying Causal Features on Adversarial Examples and Causal Inoculation for Robust Network by Adversarial Instrumental Variable Regression
Junho Kim
Byung-Kwan Lee
Yonghyun Ro
CMLAAML
91
18
0
02 Mar 2023
Adversarial Machine Learning and Defense Game for NextG Signal
  Classification with Deep Learning
Adversarial Machine Learning and Defense Game for NextG Signal Classification with Deep Learning
Y. Sagduyu
AAML
50
2
0
22 Dec 2022
Secure and Trustworthy Artificial Intelligence-Extended Reality (AI-XR)
  for Metaverses
Secure and Trustworthy Artificial Intelligence-Extended Reality (AI-XR) for Metaverses
Adnan Qayyum
M. A. Butt
Hassan Ali
Muhammad Usman
O. Halabi
Ala I. Al-Fuqaha
Q. Abbasi
Muhammad Ali Imran
Junaid Qadir
84
37
0
24 Oct 2022
Wild Networks: Exposure of 5G Network Infrastructures to Adversarial
  Examples
Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples
Giovanni Apruzzese
Rodion Vladimirov
A.T. Tastemirova
Pavel Laskov
AAML
100
16
0
04 Jul 2022
A Deep Learning Approach to Create DNS Amplification Attacks
A Deep Learning Approach to Create DNS Amplification Attacks
Jared Mathews
Prosenjit Chatterjee
S. Banik
Cory Nance
AAML
32
1
0
29 Jun 2022
Masking Adversarial Damage: Finding Adversarial Saliency for Robust and
  Sparse Network
Masking Adversarial Damage: Finding Adversarial Saliency for Robust and Sparse Network
Byung-Kwan Lee
Junho Kim
Y. Ro
AAML
52
20
0
06 Apr 2022
Distilling Robust and Non-Robust Features in Adversarial Examples by
  Information Bottleneck
Distilling Robust and Non-Robust Features in Adversarial Examples by Information Bottleneck
Junho Kim
Byung-Kwan Lee
Yong Man Ro
AAML
51
46
0
06 Apr 2022
AdIoTack: Quantifying and Refining Resilience of Decision Tree Ensemble
  Inference Models against Adversarial Volumetric Attacks on IoT Networks
AdIoTack: Quantifying and Refining Resilience of Decision Tree Ensemble Inference Models against Adversarial Volumetric Attacks on IoT Networks
Arman Pashamokhtari
Gustavo E. A. P. A. Batista
Hassan Habibi Gharakheili
AAML
68
9
0
18 Mar 2022
Machine Learning in NextG Networks via Generative Adversarial Networks
Machine Learning in NextG Networks via Generative Adversarial Networks
E. Ayanoglu
Kemal Davaslioglu
Y. Sagduyu
GAN
65
34
0
09 Mar 2022
Jamming Attacks on Federated Learning in Wireless Networks
Jamming Attacks on Federated Learning in Wireless Networks
Yi Shi
Y. Sagduyu
93
12
0
13 Jan 2022
When Machine Learning Meets Spectrum Sharing Security: Methodologies and
  Challenges
When Machine Learning Meets Spectrum Sharing Security: Methodologies and Challenges
Qun Wang
Haijian Sun
R. Hu
Arupjyoti Bhuyan
81
24
0
12 Jan 2022
Adversarial Attacks against Deep Learning Based Power Control in
  Wireless Communications
Adversarial Attacks against Deep Learning Based Power Control in Wireless Communications
Brian Kim
Yi Shi
Y. Sagduyu
T. Erpek
S. Ulukus
AAML
83
27
0
16 Sep 2021
Membership Inference Attack and Defense for Wireless Signal Classifiers
  with Deep Learning
Membership Inference Attack and Defense for Wireless Signal Classifiers with Deep Learning
Yi Shi
Y. Sagduyu
78
17
0
22 Jul 2021
Adversarial Attacks on Deep Learning Based mmWave Beam Prediction in 5G
  and Beyond
Adversarial Attacks on Deep Learning Based mmWave Beam Prediction in 5G and Beyond
Brian Kim
Y. Sagduyu
T. Erpek
S. Ulukus
AAML
78
23
0
25 Mar 2021
Adversarial Machine Learning for 5G Communications Security
Adversarial Machine Learning for 5G Communications Security
Y. Sagduyu
T. Erpek
Yi Shi
AAML
85
43
0
07 Jan 2021
Channel Effects on Surrogate Models of Adversarial Attacks against
  Wireless Signal Classifiers
Channel Effects on Surrogate Models of Adversarial Attacks against Wireless Signal Classifiers
Brian Kim
Y. Sagduyu
T. Erpek
Kemal Davaslioglu
S. Ulukus
AAML
64
20
0
03 Dec 2020
How to Make 5G Communications "Invisible": Adversarial Machine Learning
  for Wireless Privacy
How to Make 5G Communications "Invisible": Adversarial Machine Learning for Wireless Privacy
Brian Kim
Y. Sagduyu
Kemal Davaslioglu
T. Erpek
S. Ulukus
AAML
51
29
0
15 May 2020
Deep Learning for Wireless Communications
Deep Learning for Wireless Communications
T. Erpek
Tim O'Shea
Y. Sagduyu
Yi Shi
T. Clancy
92
138
0
12 May 2020
Channel-Aware Adversarial Attacks Against Deep Learning-Based Wireless
  Signal Classifiers
Channel-Aware Adversarial Attacks Against Deep Learning-Based Wireless Signal Classifiers
Brian Kim
Y. Sagduyu
Kemal Davaslioglu
T. Erpek
S. Ulukus
AAML
89
119
0
11 May 2020
When Wireless Security Meets Machine Learning: Motivation, Challenges,
  and Research Directions
When Wireless Security Meets Machine Learning: Motivation, Challenges, and Research Directions
Y. Sagduyu
Yi Shi
T. Erpek
William C. Headley
Bryse Flowers
G. Stantchev
Zhuo Lu
AAML
73
39
0
24 Jan 2020
The Threat of Adversarial Attacks on Machine Learning in Network
  Security -- A Survey
The Threat of Adversarial Attacks on Machine Learning in Network Security -- A Survey
Olakunle Ibitoye
Rana Abou-Khamis
Mohamed el Shehaby
Ashraf Matrawy
M. O. Shafiq
AAML
95
70
0
06 Nov 2019
Trojan Attacks on Wireless Signal Classification with Adversarial
  Machine Learning
Trojan Attacks on Wireless Signal Classification with Adversarial Machine Learning
Kemal Davaslioglu
Y. Sagduyu
AAML
56
58
0
23 Oct 2019
Real-Time and Embedded Deep Learning on FPGA for RF Signal
  Classification
Real-Time and Embedded Deep Learning on FPGA for RF Signal Classification
S. Soltani
Y. Sagduyu
Raqibul Hasan
Kemal Davaslioglu
Hongmei Deng
T. Erpek
48
32
0
13 Oct 2019
Deep Learning for RF Signal Classification in Unknown and Dynamic
  Spectrum Environments
Deep Learning for RF Signal Classification in Unknown and Dynamic Spectrum Environments
Yi Shi
Kemal Davaslioglu
Y. Sagduyu
William C. Headley
Michael Fowler
Gilbert Green
49
93
0
25 Sep 2019
When Attackers Meet AI: Learning-empowered Attacks in Cooperative
  Spectrum Sensing
When Attackers Meet AI: Learning-empowered Attacks in Cooperative Spectrum Sensing
Z. Luo
Shangqing Zhao
Zhuo Lu
Jie Xu
Y. Sagduyu
AAML
81
53
0
04 May 2019
Machine Learning in IoT Security: Current Solutions and Future
  Challenges
Machine Learning in IoT Security: Current Solutions and Future Challenges
Fatima Hussain
Rasheed Hussain
Syed Ali Hassan
Ekram Hossain
87
536
0
14 Mar 2019
The Best Defense Is a Good Offense: Adversarial Attacks to Avoid
  Modulation Detection
The Best Defense Is a Good Offense: Adversarial Attacks to Avoid Modulation Detection
Muhammad Zaid Hameed
András Gyorgy
Deniz Gunduz
AAML
83
73
0
27 Feb 2019
1