{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T16:52:07Z","timestamp":1774716727052,"version":"3.50.1"},"reference-count":56,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072406"],"award-info":[{"award-number":["62072406"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U21B2001"],"award-info":[{"award-number":["U21B2001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U19B2016"],"award-info":[{"award-number":["U19B2016"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Basic Scientific Research of China","award":["JCKY2023110C099"],"award-info":[{"award-number":["JCKY2023110C099"]}]},{"DOI":"10.13039\/501100004731","name":"Zhejiang Provincial Natural Science Foundation","doi-asserted-by":"publisher","award":["LDQ23F020001"],"award-info":[{"award-number":["LDQ23F020001"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Laboratory of Science and Technology on Information System Security","award":["61421110502"],"award-info":[{"award-number":["61421110502"]}]},{"name":"Key Research and Development Programs of Zhejiang Province","award":["2022C01018"],"award-info":[{"award-number":["2022C01018"]}]},{"name":"National Key Research and Development Projects of China","award":["2018AAA0100801"],"award-info":[{"award-number":["2018AAA0100801"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Wireless Commun."],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1109\/twc.2024.3374699","type":"journal-article","created":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T18:19:18Z","timestamp":1710440358000},"page":"10698-10711","source":"Crossref","is-referenced-by-count":2,"title":["AIR: Threats of Adversarial Attacks on Deep Learning-Based Information Recovery"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7153-2755","authenticated-orcid":false,"given":"Jinyin","family":"Chen","sequence":"first","affiliation":[{"name":"Institute of Cyberspace Security, Zhejiang University of Technology, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-5163-8765","authenticated-orcid":false,"given":"Jie","family":"Ge","sequence":"additional","affiliation":[{"name":"College of Information Engineering, Zhejiang University of Technology, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3089-4346","authenticated-orcid":false,"given":"Shilian","family":"Zheng","sequence":"additional","affiliation":[{"name":"Innovation Studio of Academician Yang, National Key Laboratory of Electromagnetic Space Security, Jiaxing, China"}]},{"given":"Linhui","family":"Ye","sequence":"additional","affiliation":[{"name":"Binjiang Institute, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8997-5343","authenticated-orcid":false,"given":"Haibin","family":"Zheng","sequence":"additional","affiliation":[{"name":"Institute of Cyberspace Security, Zhejiang University of Technology, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4662-2238","authenticated-orcid":false,"given":"Weiguo","family":"Shen","sequence":"additional","affiliation":[{"name":"Innovation Studio of Academician Yang, National Key Laboratory of Electromagnetic Space Security, Jiaxing, China"}]},{"given":"Keqiang","family":"Yue","sequence":"additional","affiliation":[{"name":"Key Laboratory of RF Circuits and Systems, Ministry of Education, Hangzhou Dianzi University, Hangzhou, Zhejiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3117-2211","authenticated-orcid":false,"given":"Xiaoniu","family":"Yang","sequence":"additional","affiliation":[{"name":"Innovation Studio of Academician Yang, National Key Laboratory of Electromagnetic Space Security, Jiaxing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/tiv.2023.3309548"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2023.3276218"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2022.3195358"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3103320"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2939938"},{"key":"ref6","first-page":"1","article-title":"On structure and implementation of algorithms for carrier and symbol synchronization in software defined radios","volume-title":"Proc. 10th Eur. Signal Process. Conf.","author":"Harris"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/VETEC.1995.504981"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/72.238312"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/26.771340"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2019.2943455"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2901066"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761319"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2898944"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2018.2832128"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2934004"},{"key":"ref16","article-title":"A survey on deep-learning based techniques for modeling and estimation of MassiveMIMO channels","author":"Zamanipour","year":"2019","journal-title":"arXiv:1910.03390"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/9781119562306.ch12"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/OPTIP.2017.8030690"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps45667.2019.9024433"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2016.7852251"},{"key":"ref21","article-title":"Near maximum likelihood decoding with deep learning","author":"Nachmani","year":"2018","journal-title":"arXiv:1801.02726"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2017.2788405"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2018.8645372"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761399"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2020.3018736"},{"key":"ref26","article-title":"Intriguing properties of neural networks","author":"Szegedy","year":"2013","journal-title":"arXiv:1312.6199"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CISS48834.2020.1570617416"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155389"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3025441"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2934069"},{"key":"ref31","article-title":"Adversarial examples in RF deep learning: Detection of the attack and its physical robustness","author":"Kokalj-Filipovic","year":"2019","journal-title":"arXiv:1902.06044"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/UCET.2019.8881843"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/icc42927.2021.9500374"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps50303.2020.9367473"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2018.2867459"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599832"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2019.8824956"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2950398"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1002\/ett.2848"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2021.12.006"},{"key":"ref41","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv:1412.6572"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"ref43","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017","journal-title":"arXiv:1706.06083"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref46","article-title":"Very deep convolutional networks for large-scale image recognition","author":"Simonyan","year":"2014","journal-title":"arXiv:1409.1556"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2020.3034610"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2021.3054520"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/tr.2022.3148114"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3324921.3328792"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/milcom.2018.8599707"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCIS.2019.8842663"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2021.3124855"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/iccw.2018.8403655"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/globalsip45357.2019.8969541"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2020.3030061"}],"container-title":["IEEE Transactions on Wireless Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7693\/10678775\/10472877.pdf?arnumber=10472877","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T04:39:20Z","timestamp":1726115960000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10472877\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9]]},"references-count":56,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/twc.2024.3374699","relation":{},"ISSN":["1536-1276","1558-2248"],"issn-type":[{"value":"1536-1276","type":"print"},{"value":"1558-2248","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9]]}}}