{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:12:52Z","timestamp":1774627972773,"version":"3.50.1"},"reference-count":60,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000183","name":"U.S. Army Research Office","doi-asserted-by":"publisher","award":["W911NF-17-C-0090"],"award-info":[{"award-number":["W911NF-17-C-0090"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cogn. Commun. Netw."],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1109\/tccn.2020.3010330","type":"journal-article","created":{"date-parts":[[2020,7,20]],"date-time":"2020-07-20T20:52:10Z","timestamp":1595278330000},"page":"294-303","source":"Crossref","is-referenced-by-count":89,"title":["Generative Adversarial Network in the Air: Deep Adversarial Learning for Wireless Signal Spoofing"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6110-3084","authenticated-orcid":false,"given":"Yi","family":"Shi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2745-6764","authenticated-orcid":false,"given":"Kemal","family":"Davaslioglu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1576-5527","authenticated-orcid":false,"given":"Yalin E.","family":"Sagduyu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2949815"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2018.2796446"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-007-0088-8"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2467593"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2511071"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2018.2816659"},{"key":"ref37","author":"ferdowsi","year":"2018","journal-title":"Deep learning for signal authentication and security in massive Internet of Things systems"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2553666"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2582161"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5978424"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM47813.2019.9021098"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7263345"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.121102"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/GAMENETS.2009.5137394"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422223"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3324921.3329695"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/DySPAN.2019.8935782"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3324921.3328782"},{"key":"ref21","article-title":"Generative adversarial nets","author":"goodfellow","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CROWNCOM.2008.4562534"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM47813.2019.9020907"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2014.44"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2181839"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1800635"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2018.8553233"},{"key":"ref59","year":"2020","journal-title":"Vivado Design Suite HLx Editions&#x2014;Accelerating High Level Design"},{"key":"ref58","year":"2020","journal-title":"Nvidia tensorrt - programmable inference accelerator"},{"key":"ref57","year":"2020","journal-title":"Zynq ultrascale+ mpsoc"},{"key":"ref56","year":"2020","journal-title":"Jetson Nano Developer Kit"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2016.7524930"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2017-1111"},{"key":"ref53","author":"cohen","year":"2019","journal-title":"Certified adversarial robustness via randomized smoothing"},{"key":"ref52","author":"o\u2019shea","year":"2018","journal-title":"Approximating the void Learning stochastic channel models from observation with variational generative adversarial networks"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2950398"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2019.8824956"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2856854"},{"key":"ref12","author":"luo","year":"2019","journal-title":"When attackers meet AI Learning-empowered attacks in cooperative spectrum sensing"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2018.2867459"},{"key":"ref14","author":"flowers","year":"2019","journal-title":"Evaluating adversarial evasion attacks in the context of wireless communications"},{"key":"ref15","author":"hameed","year":"2019","journal-title":"The best defense is a good offense Adversarial attacks to avoid modulation detection"},{"key":"ref16","author":"kokalj-filipovic","year":"2019","journal-title":"Adversarial examples in rf deep learning Detection of the attack and its physical robustness"},{"key":"ref17","first-page":"1","article-title":"Over-the-air adversarial attacks on deep learning based modulation classifier over wireless channels","author":"kim","year":"2020","journal-title":"Proc Conf Inf Sci Syst (CISS)"},{"key":"ref18","author":"kim","year":"2020","journal-title":"Channel-aware adversarial attacks against deep learning-based wireless signal classifiers"},{"key":"ref19","author":"kim","year":"2020","journal-title":"How to make 5G communications &#x2018;Invisible&#x2019; Adversarial machine learning for wireless privacy"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2017.7943475"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44188-7_16"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-92624-7_9"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-01580-9","author":"vorobeychik","year":"2018","journal-title":"Adversarial machine learning"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2018.2884910"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2018.8403655"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2018.02.015"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599832"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2664043"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7452266"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.239"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2007.4292831"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3324921.3328788"},{"key":"ref41","first-page":"62","article-title":"Jamming signals classification using convolutional neural network","author":"wu y zhao","year":"2017","journal-title":"Proc IEEE Int Symp Signal Process Inf Technol (ISSPIT)"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700349"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2015.2488620"}],"container-title":["IEEE Transactions on Cognitive Communications and Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6687307\/9371452\/09144305.pdf?arnumber=9144305","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T13:49:24Z","timestamp":1667483364000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9144305\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3]]},"references-count":60,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tccn.2020.3010330","relation":{},"ISSN":["2332-7731","2372-2045"],"issn-type":[{"value":"2332-7731","type":"electronic"},{"value":"2372-2045","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3]]}}}