{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T10:13:55Z","timestamp":1770286435738,"version":"3.49.0"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T00:00:00Z","timestamp":1676851200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T00:00:00Z","timestamp":1676851200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,2,20]]},"DOI":"10.1109\/icnc57223.2023.10074421","type":"proceedings-article","created":{"date-parts":[[2023,3,23]],"date-time":"2023-03-23T13:39:46Z","timestamp":1679578786000},"page":"288-292","source":"Crossref","is-referenced-by-count":3,"title":["Implementation of Real-Time Adversarial Attacks on DNN-based Modulation Classifier"],"prefix":"10.1109","author":[{"given":"Eyad","family":"Shtaiwi","sequence":"first","affiliation":[{"name":"University of Houston,Electrical and Computer Engineering Department,Houston,TX,USA"}]},{"given":"Ahmed Refaey","family":"Hussein","sequence":"additional","affiliation":[{"name":"The University of Guelph,School of Engineering,ON,Canada"}]},{"given":"Awais","family":"Khawar","sequence":"additional","affiliation":[{"name":"Federated Wireless"}]},{"given":"Ahmed","family":"Alkhateeb","sequence":"additional","affiliation":[{"name":"Arizona State University,School of Electrical, Computer and Energy Engineering,Tempe,AZ,USA"}]},{"given":"Ahmed","family":"Abdelhadi","sequence":"additional","affiliation":[{"name":"University of Houston,Department of Engineering Technology,Houston,TX,USA"}]},{"given":"Zhu","family":"Han","sequence":"additional","affiliation":[{"name":"University of Houston,Electrical and Computer Engineering Department,Houston,TX,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/AFRCON.2011.6072008"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/5326.897072"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.070015"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/9781118906507"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.1999.822675"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2000.904013"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2018.2797022"},{"key":"ref8","article-title":"Intriguing properties of neural networks","author":"Szegedy","year":"2013","journal-title":"ArXiv Preprint ArXiv:1312.6199"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2018.2867459"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3003571"},{"key":"ref13","article-title":"Ensemble adversarial training: Attacks and defenses","volume-title":"International Conference on Learning Representations","author":"Tram\u00e8r"},{"key":"ref14","doi-asserted-by":"crossref","article-title":"Mixture GAN For Modulation Classification Resiliency Against Adversarial Attacks","author":"Shtaiwi","DOI":"10.1109\/GLOBECOM48099.2022.10001138"},{"key":"ref15","article-title":"Radio machine learning dataset generation with GNU radio","volume-title":"Proceedings Of The GNU Radio Conference,","volume":"1","author":"O\u2019Shea"},{"key":"ref16","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv preprint arXiv:1412.6572"}],"event":{"name":"2023 International Conference on Computing, Networking and Communications (ICNC)","location":"Honolulu, HI, USA","start":{"date-parts":[[2023,2,20]]},"end":{"date-parts":[[2023,2,22]]}},"container-title":["2023 International Conference on Computing, Networking and Communications (ICNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10073968\/10073976\/10074421.pdf?arnumber=10074421","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T02:13:15Z","timestamp":1710382395000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10074421\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,20]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icnc57223.2023.10074421","relation":{},"subject":[],"published":{"date-parts":[[2023,2,20]]}}}