Export Citations
No abstract available.
Proceeding Downloads
A Machine Learning Approach for Detecting and Classifying Jamming Attacks Against OFDM-based UAVs
- Jered Pawlak,
- Yuchen Li,
- Joshua Price,
- Matthew Wright,
- Khair Al Shamaileh,
- Quamar Niyaz,
- Vijay Devabhaktuni
In this paper, a machine learning (ML) approach is proposed to detect and classify jamming attacks on unmanned aerial vehicles (UAVs). Four attack types are implemented using software-defined radio (SDR); namely, barrage, single-tone, successive-pulse, ...
Adversarial Attacks on Deep Learning-based Floor Classification and Indoor Localization
With the great advances in location-based services (LBS), Wi-Fi localization has attracted great interest due to its ubiquitous availability in indoor environments. Deep neural network (DNN) is a powerful method to achieve high localization performance ...
Adversarial Classification of the Attacks on Smart Grids Using Game Theory and Deep Learning
Smart grids are vulnerable to cyber-attacks. This paper proposes a game-theoretic approach to evaluate the variations caused by an attacker on the power measurements. Adversaries can gain financial benefits through the manipulation of the meters of ...
Adversarial Learning for Cross Layer Security
Spectrum access in the next generation wireless networks will be congested, competitive, and vulnerable to malicious intents of strong adversaries. This compels us to rethink wireless security for a cross-layer solution addressing it as a joint problem ...
Efficient and Privacy-preserving Distributed Learning in Cloud-Edge Computing Systems
Machine learning and cloud computing have been integrated in diverse applications to provide intelligent services. With powerful computational ability, the cloud server can execute machine learning algorithm efficiently. However, since accurate machine ...
Explainability-based Backdoor Attacks Against Graph Neural Networks
Backdoor attacks represent a serious threat to neural network models. A backdoored model will misclassify the trigger-embedded inputs into an attacker-chosen target label while performing normally on other benign inputs. There are already numerous works ...
Inaudible Manipulation of Voice-Enabled Devices Through BackDoor Using Robust Adversarial Audio Attacks: Invited Paper
- Morriel Kasher,
- Michael Zhao,
- Aryeh Greenberg,
- Devin Gulati,
- Silvija Kokalj-Filipovic,
- Predrag Spasojevic
The BackDoor system provides a method for inaudibly transmitting messages that are recorded by unmodified receiver microphones as if they were transmitted audibly. Adversarial Audio attacks allow for an audio sample to sound like one message but be ...
Intermittent Jamming against Telemetry and Telecommand of Satellite Systems and A Learning-driven Detection Strategy
Towards sixth-generation networks (6G), satellite communication systems, especially based on Low Earth Orbit (LEO) networks, become promising due to their unique and comprehensive capabilities. These advantages are accompanied by a variety of challenges ...
Learning Model for Cyber-attack Index Based Virtual Wireless Network Selection
With the availability of different wireless networks in wireless virtualization, dynamic network selection in a given heterogeneous environment is challenging task when there is cyber security and data privacy requirements for wireless users. Selection ...
Low-cost Influence-Limiting Defense against Adversarial Machine Learning Attacks in Cooperative Spectrum Sensing
Cooperative spectrum sensing aims to improve the reliability of spectrum sensing by individual sensors for better utilization of the scarce spectrum bands, which gives the feasibility for secondary spectrum users to transmit their signals when primary ...
Machine Learning-Assisted Wireless PHY Key Generation with Reconfigurable Intelligent Surfaces
The key generation rate (KGR) performance of wireless physical layer (PHY) key generation can be limited by the quasi-static slow fading environment. In this work, we aim to exploit the radio environment reconfiguration ability enabled by reconfigurable ...
Multi-Agent Reinforcement Learning Approaches to RF Fingerprint Enhancement
Deep learning based RF Fingerprinting has shown great promise for IoT device security. This work explores various multi-agent reinforcement learning approaches to enable RF Fingerprint enhancement for an ensemble of transmitters. A RiftNetTM ...
Poisoning Attack Anticipation in Mobile Crowdsensing: A Competitive Learning-Based Study
Mobile Crowdsensing is prone to adversarial attacks particularly the data injection attacks to mislead the servers in the decision-making process. This paper aims to tackle the problem of threat anticipation from the standpoint of data poisoning attacks,...
RiftNeXt™: Explainable Deep Neural RF Scene Classification
We propose a framework, RiftNeXtTM, to perform radio frequency (RF) scene context change detection and classification with Expert driven neural explainability. Our approach uses a deep learning based classifier to perform spectrum monitoring of Wi-Fi ...
SWIPEGAN: Swiping Data Augmentation Using Generative Adversarial Networks for Smartphone User Authentication
Behavioral biometric-based smartphone user authentication schemes based on touch/swipe have shown to provide the desired usability. However, their accuracy is not yet considered up to the mark. This is primarily due to the lack of a sufficient number of ...
Variational Leakage: The Role of Information Complexity in Privacy Leakage
We study the role of information complexity in privacy leakage about an attribute of an adversary's interest, which is not known a priori to the system designer. Considering the supervised representation learning setup and using neural networks to ...
- Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning