{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,16]],"date-time":"2026-05-16T16:21:06Z","timestamp":1778948466565,"version":"3.51.4"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/dyspan.2019.8935782","type":"proceedings-article","created":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T00:56:41Z","timestamp":1576803401000},"page":"1-6","source":"Crossref","is-referenced-by-count":70,"title":["Trojan Attacks on Wireless Signal Classification with Adversarial Machine Learning"],"prefix":"10.1109","author":[{"given":"Kemal","family":"Davaslioglu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yalin E.","family":"Sagduyu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref30","first-page":"2579","article-title":"Visualizing high-dimensional data using t-SNE","volume":"9","author":"van der maaten","year":"2008","journal-title":"Journal of Machine Learning Research"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.1988.13425"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1684(96)00165-X"},{"key":"ref12","article-title":"Radio machine learning dataset generation with GNU radio","author":"o\u2019shea","year":"2016","journal-title":"GNU Radio Conference"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/DySPAN.2019.8935684"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-01580-9","author":"vorobeychik","year":"2018","journal-title":"Adversarial machine learning"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2017.7943475"},{"key":"ref16","article-title":"Practical black-box attacks against deep learning systems using adversarial examples","author":"papernot","year":"2017","journal-title":"Proc ACM CSS"},{"key":"ref17","article-title":"Poisoning attacks against support vector machines","author":"biggio","year":"2012","journal-title":"Proc ICML"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2018.2867459"},{"key":"ref19","article-title":"Evaluating adversarial evasion attacks in the context of wireless communications","author":"flowers","year":"2019","journal-title":"arXiv preprint arXiv 1903 00066"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.123"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3324921.3329695"},{"key":"ref27","article-title":"Detecting backdoor attacks on deep neural networks by activation clustering","author":"chen","year":"2019","journal-title":"AAAI SafeAI"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422223"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2018.8403655"},{"key":"ref29","article-title":"Real-time and embedded deep learning on FPGA for RF signal classification","author":"soltani","year":"2019","journal-title":"Proc IEEE MILCOM"},{"key":"ref5","article-title":"Deep learning for signal authentication and security in massive internet of things systems","author":"ferdowsi","year":"2018","journal-title":"arXiv preprint arXiv 1803 00916"},{"key":"ref8","article-title":"BadNets: Identifying vulnerabilities in the machine learning model supply chain","author":"gu","year":"2017","journal-title":"Proc Mach Learn Comput Secur Workshop"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2018.2884910"},{"key":"ref2","article-title":"Deep sensing: Cooperative spectrum sensing based on convolutional neural networks","author":"lee","year":"2017","journal-title":"arXiv preprint arXiv 1705 08164"},{"key":"ref9","article-title":"Datasets & Competitions","year":"0","journal-title":"IEEE Comsoc Machine Learning For Communications Emerging Technologies Initiative"},{"key":"ref1","article-title":"Convolutional radio modulation recognition networks","author":"o\u2019shea","year":"2016","journal-title":"Proc Int Conf Eng App Neural Nets"},{"key":"ref20","article-title":"Adversarial examples in RF deep learning: detection of the attack and its physical robustness","author":"kokalj-filipovic","year":"2019","journal-title":"arXiv preprint arXiv 1902 05023"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599832"},{"key":"ref21","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2014","journal-title":"arXiv preprint arXiv 1412 6572"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2019.8824956"},{"key":"ref23","article-title":"When attackers meet AI: Learning-empowered attacks in cooperative spectrum sensing","author":"luo","year":"2019","journal-title":"arXiv preprint arXiv 1905 00571"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00031"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-94042-7_11"}],"event":{"name":"2019 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN)","location":"Newark, NJ, USA","start":{"date-parts":[[2019,11,11]]},"end":{"date-parts":[[2019,11,14]]}},"container-title":["2019 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8932652\/8935636\/08935782.pdf?arnumber=8935782","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,9]],"date-time":"2022-10-09T01:36:09Z","timestamp":1665279369000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8935782\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/dyspan.2019.8935782","relation":{},"subject":[],"published":{"date-parts":[[2019,11]]}}}