{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T15:56:57Z","timestamp":1767887817089,"version":"3.49.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T00:00:00Z","timestamp":1698624000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T00:00:00Z","timestamp":1698624000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,30]]},"DOI":"10.1109\/milcom58377.2023.10356224","type":"proceedings-article","created":{"date-parts":[[2023,12,25]],"date-time":"2023-12-25T19:37:01Z","timestamp":1703533021000},"page":"385-390","source":"Crossref","is-referenced-by-count":8,"title":["Adversarial Attacks on LoRa Device Identification and Rogue Signal Detection with Deep Learning"],"prefix":"10.1109","author":[{"given":"Yalin E.","family":"Sagduyu","sequence":"first","affiliation":[{"name":"Virginia Tech,Arlington,VA,USA"}]},{"given":"Tugba","family":"Erpek","sequence":"additional","affiliation":[{"name":"Virginia Tech,Arlington,VA,USA"}]}],"member":"263","reference":[{"key":"ref1","article-title":"LoRa for the internet of things","volume-title":"International Conference on Embedded Wireless Systems and Networks","author":"Bor"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2017.03.004"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/I2CACIS.2019.8825008"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599805"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31764-5_9"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/DySPAN.2017.7920754"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/DySPAN.2019.8935684"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3087250"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3098243.3098267"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3121606"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3466772.3467054"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3152404"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC52510.2021.9621015"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WACV45572.2020.9093371"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500447"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3324921.3329695"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2020.3010330"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2018.2867459"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2021.3124855"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3205184"},{"key":"ref21","article-title":"When wireless security meets machine learning: Motivation, challenges, and research directions","author":"Sagduyu","year":"2020"},{"key":"ref22","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2015"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500374"},{"key":"ref24","article-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2017"}],"event":{"name":"MILCOM 2023 - 2023 IEEE Military Communications Conference (MILCOM)","location":"Boston, MA, USA","start":{"date-parts":[[2023,10,30]]},"end":{"date-parts":[[2023,11,3]]}},"container-title":["MILCOM 2023 - 2023 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10356123\/10356124\/10356224.pdf?arnumber=10356224","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T20:31:40Z","timestamp":1705091500000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10356224\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,30]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/milcom58377.2023.10356224","relation":{},"subject":[],"published":{"date-parts":[[2023,10,30]]}}}