{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T06:12:25Z","timestamp":1774678345379,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T00:00:00Z","timestamp":1594598400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["CNS-1717969"],"award-info":[{"award-number":["CNS-1717969"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,13]]},"DOI":"10.1145\/3395352.3402619","type":"proceedings-article","created":{"date-parts":[[2020,7,16]],"date-time":"2020-07-16T18:24:28Z","timestamp":1594923868000},"page":"13-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":46,"title":["Adversarial machine learning based partial-model attack in IoT"],"prefix":"10.1145","author":[{"given":"Zhengping","family":"Luo","sequence":"first","affiliation":[{"name":"University of South Florida"}]},{"given":"Shangqing","family":"Zhao","sequence":"additional","affiliation":[{"name":"University of South Florida"}]},{"given":"Zhuo","family":"Lu","sequence":"additional","affiliation":[{"name":"University of South Florida"}]},{"given":"Yalin E.","family":"Sagduyu","sequence":"additional","affiliation":[{"name":"Intelligent Automation Inc"}]},{"given":"Jie","family":"Xu","sequence":"additional","affiliation":[{"name":"University of Miami"}]}],"member":"320","published-online":{"date-parts":[[2020,7,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"e_1_3_2_1_2_1","volume-title":"Internet of things (iot): A vision, architectural elements, and future directions,\" Future generation computer systems","author":"Gubbi J.","unstructured":"J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, \"Internet of things (iot): A vision, architectural elements, and future directions,\" Future generation computer systems, vol. 29, no. 7, pp. 1645--1660, 2013."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.106522"},{"key":"e_1_3_2_1_4_1","first-page":"636","volume-title":"IEEE","author":"Fernandes E.","year":"2016","unstructured":"E. Fernandes, J. Jung, and A. Prakash, \"Security analysis of emerging smart home applications,\" in 2016 IEEE Symposium on Security and Privacy (SP). IEEE, 2016, pp. 636--654."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2306328"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3333501"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2017.10.002"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/3276449"},{"key":"e_1_3_2_1_9_1","first-page":"77","volume-title":"Springer","author":"Barriga J. K. D.","year":"2016","unstructured":"J. K. D. Barriga, C. D. G. Romero, and J. I. R. Molano, \"Proposal of a standard architecture of iot for smart cities,\" in International Workshop on Learning Technology for Education Challenges. Springer, 2016, pp. 77--89."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2295032"},{"key":"e_1_3_2_1_11_1","first-page":"174","volume-title":"IEEE","author":"Plageras A. P.","year":"2017","unstructured":"A. P. Plageras, K. E. Psannis, B. Gupta, C. Stergiou, B.-G Kim, and Y. Ishibashi, \"Solutions for inter-connectivity and security in a smart hospital building,\" in 2017 IEEE 15th International Conference on Industrial Informatics (INDIN). IEEE, 2017, pp. 174--179."},{"key":"e_1_3_2_1_12_1","first-page":"525","volume-title":"Secure machine learning scenario from big data in cloud computing via internet of things network,\" in Handbook of Computer Networks and Cyber Security","author":"Stergiou C. L.","year":"2020","unstructured":"C. L. Stergiou, A. P. Plageras, K. E. Psannis, and B. B. Gupta, \"Secure machine learning scenario from big data in cloud computing via internet of things network,\" in Handbook of Computer Networks and Cyber Security. Springer, 2020, pp. 525--554."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1002\/nem.1930"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1007\/978-3-030-30367-9_5","volume-title":"Machine learning for iot,\" in Intelligent Internet of Things","author":"Firouzi F.","year":"2020","unstructured":"F. Firouzi, B. Farahani, F. Ye, and M. Barzegari, \"Machine learning for iot,\" in Intelligent Internet of Things. Springer, 2020, pp. 243--313."},{"key":"e_1_3_2_1_15_1","first-page":"1097","volume-title":"Imagenet classification with deep convolutional neural networks,\" in Advances in neural information processing systems","author":"Krizhevsky A.","year":"2012","unstructured":"A. Krizhevsky, I. Sutskever, and G. E. Hinton, \"Imagenet classification with deep convolutional neural networks,\" in Advances in neural information processing systems, 2012, pp. 1097--1105."},{"key":"e_1_3_2_1_16_1","first-page":"223","article-title":"Deep learning for wireless communications, in development and analysis of deep learning architectures","author":"Erpek T.","year":"2020","unstructured":"T. Erpek, T. J. O'Shea, Y. E. Sagduyu, Y. Shi, and T. C. Clancy, \"Deep learning for wireless communications, in development and analysis of deep learning architectures.\" Springer, 2020, pp. 223--266.","journal-title":"Springer"},{"key":"e_1_3_2_1_17_1","first-page":"506","volume-title":"Practical black-box attacks against machine learning,\" in Proceedings of the 2017 ACM on Asia conference on computer and communications security","author":"Papernot N.","year":"2017","unstructured":"N. Papernot, P. McDaniel, I. Goodfellow, S. Jha, Z. B. Celik, and A. Swami, \"Practical black-box attacks against machine learning,\" in Proceedings of the 2017 ACM on Asia conference on computer and communications security, 2017, pp. 506--519."},{"key":"e_1_3_2_1_18_1","volume-title":"Adversarial examples in the physical world,\" arXiv preprint arXiv:1607.02533","author":"Kurakin A.","year":"2016","unstructured":"A. Kurakin, I. Goodfellow, and S. Bengio, \"Adversarial examples in the physical world,\" arXiv preprint arXiv:1607.02533, 2016."},{"key":"e_1_3_2_1_19_1","volume-title":"How to steal a machine learning classifier with deep learning,\" in IEEE Symposium on Technologies for Homeland Security (HST)","author":"Shi Y.","year":"2017","unstructured":"Y. Shi, Y. E. Sagduyu, and A. Grushin, \"How to steal a machine learning classifier with deep learning,\" in IEEE Symposium on Technologies for Homeland Security (HST), 2017."},{"key":"e_1_3_2_1_20_1","first-page":"211","article-title":"Vulnerability detection and analysis in adversarial deep learning, in guide to vulnerability analysis for computer networks and systems","author":"Shi Y.","year":"2018","unstructured":"Y. Shi, Y. E. Sagduyu, K. Davaslioglu, and R. Levy, \"Vulnerability detection and analysis in adversarial deep learning, in guide to vulnerability analysis for computer networks and systems.\" Springer, 2018, pp. 211--234.","journal-title":"Springer"},{"key":"e_1_3_2_1_21_1","volume-title":"When wireless security meets machine learning: Motivation, challenges, and research directions","author":"Sagduyu Y. E.","year":"2020","unstructured":"Y. E. Sagduyu, Y. Shi, T. Erpek, W. Headley, B. Flowers, G. Stantchev, and Z. Lu, \"When wireless security meets machine learning: Motivation, challenges, and research directions,\" 2020, available on arXiv:2001.08883."},{"key":"e_1_3_2_1_22_1","volume-title":"Adversarial deep learning for cognitive radio security: Jamming attack and defense strategies,\" in IEEE ICC 2018 Workshop on Promises and Challenges of Machine Learning in Communication Networks","author":"Shi Y.","year":"2018","unstructured":"Y. Shi, Y. E. Sagduyu, T. Erpek, K. Davaslioglu, Z. Lu, and J. Li, \"Adversarial deep learning for cognitive radio security: Jamming attack and defense strategies,\" in IEEE ICC 2018 Workshop on Promises and Challenges of Machine Learning in Communication Networks, 2018."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2018.2884910"},{"key":"e_1_3_2_1_24_1","volume-title":"Over-the-air adversarial attacks on deep learning based modulation classifier over wireless channels,\" in Conference on Information Sciences and Systems (CISS)","author":"Kim B.","year":"2020","unstructured":"B. Kim, Y. E. Sagduyu, K. Davaslioglu, T. Erpek, and S. Ulukus, \"Over-the-air adversarial attacks on deep learning based modulation classifier over wireless channels,\" in Conference on Information Sciences and Systems (CISS), 2020."},{"key":"e_1_3_2_1_25_1","volume-title":"Channel-aware adversarial attacks against deep learning-based wireless signal classifiers","author":"Kim B.","year":"2020","unstructured":"B. Kim, Y. E. Sagduyu, K. Davaslioglu, T. Erpek, and S. Ulukus, \"Channel-aware adversarial attacks against deep learning-based wireless signal classifiers,\" 2020, available on arXiv:2005.05321."},{"key":"e_1_3_2_1_26_1","volume-title":"IoT network security from the perspective of adversarial deep learning,\" in IEEE SECON Workshop on Machine Learning for Communication and Networking in IoT","author":"Sagduyu Y. E.","year":"2019","unstructured":"Y. E. Sagduyu, Y. Shi, and T. Erpek, \"IoT network security from the perspective of adversarial deep learning,\" in IEEE SECON Workshop on Machine Learning for Communication and Networking in IoT, 2019."},{"issue":"1","key":"e_1_3_2_1_27_1","first-page":"2","article-title":"Adversarial deep learning for over-the-air spectrum poisoning attacks","author":"Sagduyu Y. E.","year":"2019","unstructured":"Y. E. Sagduyu, T. Erpek, and Y. Shi, \"Adversarial deep learning for over-the-air spectrum poisoning attacks,\" IEEE Transactions on Mobile Computing, no. 1, pp. 2--14, 2019.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"e_1_3_2_1_28_1","volume-title":"Spectrum data poisoning with adversarial deep learning,\" in IEEE Military Communications Conference (MILCOM)","author":"Shi Y.","year":"2018","unstructured":"Y. Shi, T. Erpek, Y. E. Sagduyu, and J. Li, \"Spectrum data poisoning with adversarial deep learning,\" in IEEE Military Communications Conference (MILCOM), 2018."},{"key":"e_1_3_2_1_29_1","volume-title":"When attackers meet AI: Learning-empowered attacks in cooperative spectrum sensing","author":"Luo Z.","year":"2019","unstructured":"Z. Luo, S. Zhao, Z. Lu, J. Xu, and Y. E. Sagduyu, \"When attackers meet AI: Learning-empowered attacks in cooperative spectrum sensing,\" 2019, available on arXiv:1905.01430."},{"key":"e_1_3_2_1_30_1","volume-title":"Trojan attacks on wireless signal classification with adversarial machine learning,\" in IEEE DySPAN Workshop on Data-Driven Dynamic Spectrum Sharing","author":"Davaslioglu K.","year":"2019","unstructured":"K. Davaslioglu and Y. E. Sagduyu, \"Trojan attacks on wireless signal classification with adversarial machine learning,\" in IEEE DySPAN Workshop on Data-Driven Dynamic Spectrum Sharing, 2019."},{"key":"e_1_3_2_1_31_1","volume-title":"Generative adversarial network for wireless signal spoofing,\" in ACM WiSec Workshop on Wireless Security and Machine Learning","author":"Shi Y.","year":"2019","unstructured":"Y. Shi, K. Davaslioglu, and Y. E. Sagduyu, \"Generative adversarial network for wireless signal spoofing,\" in ACM WiSec Workshop on Wireless Security and Machine Learning, 2019."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5978424"},{"key":"e_1_3_2_1_33_1","volume-title":"Generative adversarial learning for spectrum sensing,\" in IEEE International Conference on Communications (ICC)","author":"Davaslioglu K.","year":"2018","unstructured":"K. Davaslioglu and Y. E. Sagduyu, \"Generative adversarial learning for spectrum sensing,\" in IEEE International Conference on Communications (ICC), 2018."},{"key":"e_1_3_2_1_34_1","first-page":"1687","volume-title":"Sensitive information tracking in commodity iot,\" in 27th USENIX Security Symposium (USENIX Security 18)","author":"Celik Z. B.","year":"2018","unstructured":"Z. B. Celik, L. Babun, A. K. Sikder, H. Aksu, G. Tan, P. McDaniel, and A. S. Uluagac, \"Sensitive information tracking in commodity iot,\" in 27th USENIX Security Symposium (USENIX Security 18), 2018, pp. 1687--1704."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2014.09.005"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.02.009"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2020.103292"},{"key":"e_1_3_2_1_38_1","first-page":"1","volume-title":"Towards reliable multimodal sensing in aware environments,\" in Proceedings of the 2001 workshop on Perceptive user interfaces","author":"Stillman S.","year":"2001","unstructured":"S. Stillman and I. Essa, \"Towards reliable multimodal sensing in aware environments,\" in Proceedings of the 2001 workshop on Perceptive user interfaces, 2001, pp. 1--6."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2018.12.001"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Y. E. Sagduyu \"Securing cognitive radio networks with dynamic trust against spectrum sensing data falsification \" in IEEE Military Communications Conference (MILCOM) 2014.","DOI":"10.1109\/MILCOM.2014.44"},{"key":"e_1_3_2_1_41_1","first-page":"1322","volume-title":"Model inversion attacks that exploit confidence information and basic counter-measures,\" in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","author":"Fredrikson M.","year":"2015","unstructured":"M. Fredrikson, S. Jha, and T. Ristenpart, \"Model inversion attacks that exploit confidence information and basic counter-measures,\" in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015, pp. 1322--1333."},{"key":"e_1_3_2_1_42_1","first-page":"29","volume-title":"IEEE","author":"Doshi R.","year":"2018","unstructured":"R. Doshi, N. Apthorpe, and N. Feamster, \"Machine learning ddos detection for consumer internet of things devices,\" in 2018 IEEE Security and Privacy Workshops (SPW). IEEE, 2018, pp. 29--35."}],"event":{"name":"WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"Linz Austria","acronym":"WiSec '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 2nd ACM Workshop on Wireless Security and Machine Learning"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3395352.3402619","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3395352.3402619","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3395352.3402619","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:35Z","timestamp":1750199915000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3395352.3402619"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,13]]},"references-count":42,"alternative-id":["10.1145\/3395352.3402619","10.1145\/3395352"],"URL":"https:\/\/doi.org\/10.1145\/3395352.3402619","relation":{},"subject":[],"published":{"date-parts":[[2020,7,13]]},"assertion":[{"value":"2020-07-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}