skip to main content
10.1145/3468218acmconferencesBook PagePublication PageswisecConference Proceedingsconference-collections
WiseML '21: Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning
ACM2021 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks Abu Dhabi United Arab Emirates 28 June 2021- 2 July 2021
ISBN:
978-1-4503-8561-9
Published:
28 June 2021
Sponsors:
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 03 Mar 2025Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
short-paper
Open Access
A Machine Learning Approach for Detecting and Classifying Jamming Attacks Against OFDM-based UAVs

In this paper, a machine learning (ML) approach is proposed to detect and classify jamming attacks on unmanned aerial vehicles (UAVs). Four attack types are implemented using software-defined radio (SDR); namely, barrage, single-tone, successive-pulse, ...

short-paper
Public Access
Adversarial Attacks on Deep Learning-based Floor Classification and Indoor Localization

With the great advances in location-based services (LBS), Wi-Fi localization has attracted great interest due to its ubiquitous availability in indoor environments. Deep neural network (DNN) is a powerful method to achieve high localization performance ...

short-paper
Adversarial Classification of the Attacks on Smart Grids Using Game Theory and Deep Learning

Smart grids are vulnerable to cyber-attacks. This paper proposes a game-theoretic approach to evaluate the variations caused by an attacker on the power measurements. Adversaries can gain financial benefits through the manipulation of the meters of ...

short-paper
Adversarial Learning for Cross Layer Security

Spectrum access in the next generation wireless networks will be congested, competitive, and vulnerable to malicious intents of strong adversaries. This compels us to rethink wireless security for a cross-layer solution addressing it as a joint problem ...

short-paper
Open Access
Efficient and Privacy-preserving Distributed Learning in Cloud-Edge Computing Systems

Machine learning and cloud computing have been integrated in diverse applications to provide intelligent services. With powerful computational ability, the cloud server can execute machine learning algorithm efficiently. However, since accurate machine ...

short-paper
Open Access
Explainability-based Backdoor Attacks Against Graph Neural Networks

Backdoor attacks represent a serious threat to neural network models. A backdoored model will misclassify the trigger-embedded inputs into an attacker-chosen target label while performing normally on other benign inputs. There are already numerous works ...

short-paper
Inaudible Manipulation of Voice-Enabled Devices Through BackDoor Using Robust Adversarial Audio Attacks: Invited Paper

The BackDoor system provides a method for inaudibly transmitting messages that are recorded by unmodified receiver microphones as if they were transmitted audibly. Adversarial Audio attacks allow for an audio sample to sound like one message but be ...

short-paper
Intermittent Jamming against Telemetry and Telecommand of Satellite Systems and A Learning-driven Detection Strategy

Towards sixth-generation networks (6G), satellite communication systems, especially based on Low Earth Orbit (LEO) networks, become promising due to their unique and comprehensive capabilities. These advantages are accompanied by a variety of challenges ...

short-paper
Public Access
Learning Model for Cyber-attack Index Based Virtual Wireless Network Selection

With the availability of different wireless networks in wireless virtualization, dynamic network selection in a given heterogeneous environment is challenging task when there is cyber security and data privacy requirements for wireless users. Selection ...

short-paper
Public Access
Low-cost Influence-Limiting Defense against Adversarial Machine Learning Attacks in Cooperative Spectrum Sensing

Cooperative spectrum sensing aims to improve the reliability of spectrum sensing by individual sensors for better utilization of the scarce spectrum bands, which gives the feasibility for secondary spectrum users to transmit their signals when primary ...

short-paper
Machine Learning-Assisted Wireless PHY Key Generation with Reconfigurable Intelligent Surfaces

The key generation rate (KGR) performance of wireless physical layer (PHY) key generation can be limited by the quasi-static slow fading environment. In this work, we aim to exploit the radio environment reconfiguration ability enabled by reconfigurable ...

short-paper
Public Access
Multi-Agent Reinforcement Learning Approaches to RF Fingerprint Enhancement

Deep learning based RF Fingerprinting has shown great promise for IoT device security. This work explores various multi-agent reinforcement learning approaches to enable RF Fingerprint enhancement for an ensemble of transmitters. A RiftNetTM ...

short-paper
Poisoning Attack Anticipation in Mobile Crowdsensing: A Competitive Learning-Based Study

Mobile Crowdsensing is prone to adversarial attacks particularly the data injection attacks to mislead the servers in the decision-making process. This paper aims to tackle the problem of threat anticipation from the standpoint of data poisoning attacks,...

short-paper
RiftNeXt™: Explainable Deep Neural RF Scene Classification

We propose a framework, RiftNeXtTM, to perform radio frequency (RF) scene context change detection and classification with Expert driven neural explainability. Our approach uses a deep learning based classifier to perform spectrum monitoring of Wi-Fi ...

short-paper
SWIPEGAN: Swiping Data Augmentation Using Generative Adversarial Networks for Smartphone User Authentication

Behavioral biometric-based smartphone user authentication schemes based on touch/swipe have shown to provide the desired usability. However, their accuracy is not yet considered up to the mark. This is primarily due to the lack of a sufficient number of ...

short-paper
Variational Leakage: The Role of Information Complexity in Privacy Leakage

We study the role of information complexity in privacy leakage about an attribute of an adversary's interest, which is not known a priori to the system designer. Considering the supervised representation learning setup and using neural networks to ...

  1. Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning

        Recommendations