{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T14:13:23Z","timestamp":1772115203669,"version":"3.50.1"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"17","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"UKRI through Academic Centre of Excellence in Cyber Security Research\u2014University of Warwick","award":["EP\/R007195\/1"],"award-info":[{"award-number":["EP\/R007195\/1"]}]},{"name":"National Hub for Edge","award":["AI EP\/Y028813\/1"],"award-info":[{"award-number":["AI EP\/Y028813\/1"]}]},{"DOI":"10.13039\/100014013","name":"UK Research and Innovation","doi-asserted-by":"publisher","award":["EP\/X012301\/1"],"award-info":[{"award-number":["EP\/X012301\/1"]}],"id":[{"id":"10.13039\/100014013","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100014013","name":"UK Research and Innovation","doi-asserted-by":"publisher","award":["EP\/X04047X\/1"],"award-info":[{"award-number":["EP\/X04047X\/1"]}],"id":[{"id":"10.13039\/100014013","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100014013","name":"UK Research and Innovation","doi-asserted-by":"publisher","award":["EP\/Y037243\/1"],"award-info":[{"award-number":["EP\/Y037243\/1"]}],"id":[{"id":"10.13039\/100014013","id-type":"DOI","asserted-by":"publisher"}]},{"name":"SERICS","award":["PE00000014"],"award-info":[{"award-number":["PE00000014"]}]},{"name":"FAIR through the MUR National Recovery and Resilience Plan"},{"name":"European Union\u2014NextGenerationEU","award":["PE00000013"],"award-info":[{"award-number":["PE00000013"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2025,9,1]]},"DOI":"10.1109\/jiot.2025.3580194","type":"journal-article","created":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T15:00:43Z","timestamp":1750086043000},"page":"35367-35379","source":"Crossref","is-referenced-by-count":3,"title":["Vision Transformer With Adversarial Indicator Token Against Adversarial Attacks in Radio Signal Classifications"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0964-3873","authenticated-orcid":false,"given":"Lu","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Mathematics and Computer Science, Swansea university, Swansea, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5255-7036","authenticated-orcid":false,"given":"Sangarapillai","family":"Lambotharan","sequence":"additional","affiliation":[{"name":"Institute for Digital Technologies, Loughborough University London, London, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8457-6477","authenticated-orcid":false,"given":"Gan","family":"Zheng","sequence":"additional","affiliation":[{"name":"School of Engineering, University of Warwick, Coventry, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5919-0713","authenticated-orcid":false,"given":"Guisheng","family":"Liao","sequence":"additional","affiliation":[{"name":"School of Electronic Engineering, Xidian University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3318-6812","authenticated-orcid":false,"given":"Xuekang","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronic Engineering, Faculty of Engineering, Imperial College London, London, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4103-9190","authenticated-orcid":false,"given":"Fabio","family":"Roli","sequence":"additional","affiliation":[{"name":"Department of Informatics, Bioengineering Robotics, and Systems Engineering, University of Genova, Genoa, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4715-212X","authenticated-orcid":false,"given":"Carsten","family":"Maple","sequence":"additional","affiliation":[{"name":"Warwick Manufacturing Group, University of Warwick, Coventry, U.K."}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.010.2100152"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TBC.2021.3122353"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3024234"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2952364"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3247162"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3141032"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3373497"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3338147"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2019.8685638"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2806489"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC49870.2020.9289261"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2018.2797022"},{"key":"ref13","article-title":"High-capacity complex convolutional neural networks for I\/Q modulation classification","volume-title":"arXiv:2010.10717","author":"Krzyston","year":"2020"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3053427"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3462544"},{"key":"ref16","article-title":"Fast deep learning for automatic modulation classification","volume-title":"arXiv:1901.05850","author":"Ramjee","year":"2019"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3167107"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3194508"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2024.3485083"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/WPMC55625.2022.10014833"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3164935"},{"key":"ref22","article-title":"An image is worth 16\u00d716 words: Transformers for image recognition at scale","volume-title":"arXiv:2010.11929","author":"Dosovitskiy","year":"2021"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00061"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01204"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685815"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-019-1211-x"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICME46284.2020.9102805"},{"key":"ref28","first-page":"1","article-title":"TextAttack: A framework for adversarial attacks in NLP","volume-title":"Proc. EMNLP","author":"Morris"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-87664-7_7"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103134"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2018.2867459"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2021.3083099"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2021.3114154"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10001138"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2022.3159659"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO55093.2022.9909941"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9533949"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20083-0_28"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3215188"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9747508"},{"key":"ref41","article-title":"Patch-Fool: Are vision transformers always robust against adversarial perturbations?","volume-title":"arXiv:2203.08392","author":"Fu","year":"2025"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.06083"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3264418"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/IVMSP54334.2022.9816267"},{"key":"ref45","first-page":"1","article-title":"Radio machine learning dataset generation with GNU radio","volume-title":"Proc. GNU Radio Conf.","author":"O\u2019Shea"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2022.103476"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11134518\/11037376.pdf?arnumber=11037376","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,25]],"date-time":"2025-08-25T20:48:04Z","timestamp":1756154884000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11037376\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,1]]},"references-count":47,"journal-issue":{"issue":"17"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3580194","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,1]]}}}