{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T18:34:34Z","timestamp":1772303674950,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:00:00Z","timestamp":1624838400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["202987"],"award-info":[{"award-number":["202987"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,28]]},"DOI":"10.1145\/3468218.3469051","type":"proceedings-article","created":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T17:52:26Z","timestamp":1624297946000},"page":"55-60","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Low-cost Influence-Limiting Defense against Adversarial Machine Learning Attacks in Cooperative Spectrum Sensing"],"prefix":"10.1145","author":[{"given":"Zhengping","family":"Luo","sequence":"first","affiliation":[{"name":"University of South Florida"}]},{"given":"Shangqing","family":"Zhao","sequence":"additional","affiliation":[{"name":"University of South Florida"}]},{"given":"Rui","family":"Duan","sequence":"additional","affiliation":[{"name":"University of South Florida"}]},{"given":"Zhuo","family":"Lu","sequence":"additional","affiliation":[{"name":"University of South Florida"}]},{"given":"Yalin E.","family":"Sagduyu","sequence":"additional","affiliation":[{"name":"Intelligent Automation Inc."}]},{"given":"Jie","family":"Xu","sequence":"additional","affiliation":[{"name":"University of Miami"}]}],"member":"320","published-online":{"date-parts":[[2021,6,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2010.12.003"},{"key":"e_1_3_2_1_2_1","volume-title":"\"Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks.\" In Network and Distributed System Security Symposium (NDSS)","author":"Farhadi Ali","year":"2011","unstructured":"Fatemieh, Omid, Ali Farhadi , Ranveer Chandra , and Carl A. Gunter . \"Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks.\" In Network and Distributed System Security Symposium (NDSS) . 2011 . Fatemieh, Omid, Ali Farhadi, Ranveer Chandra, and Carl A. Gunter. \"Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks.\" In Network and Distributed System Security Symposium (NDSS). 2011."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2422735"},{"key":"e_1_3_2_1_4_1","volume-title":"IEEE","author":"Chen Lin","year":"2014","unstructured":"Wang, Wei, Lin Chen , Kang G. Shin , and Lingjie Duan . \"Secure cooperative spectrum sensing and access against intelligent malicious behaviors.\" In IEEE INFOCOM 2014-IEEE Conference on Computer Communications, pp. 1267--1275 . IEEE , 2014 . Wang, Wei, Lin Chen, Kang G. Shin, and Lingjie Duan. \"Secure cooperative spectrum sensing and access against intelligent malicious behaviors.\" In IEEE INFOCOM 2014-IEEE Conference on Computer Communications, pp. 1267--1275. IEEE, 2014."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.061510.090395"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2707407"},{"key":"e_1_3_2_1_7_1","volume-title":"IEEE","author":"Song Min","year":"2012","unstructured":"Chen, Changlong, Min Song , Chunsheng Xin , and Mansoor Alam . \"A robust malicious user detection scheme in cooperative spectrum sensing.\" In 2012 IEEE Global Communications Conference (GLOBECOM), pp. 4856--4861 . IEEE , 2012 . Chen, Changlong, Min Song, Chunsheng Xin, and Mansoor Alam. \"A robust malicious user detection scheme in cooperative spectrum sensing.\" In 2012 IEEE Global Communications Conference (GLOBECOM), pp. 4856--4861. IEEE, 2012."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.091510.100315"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.131120"},{"key":"e_1_3_2_1_10_1","volume-title":"IEEE","author":"Park J-M.","year":"2008","unstructured":"Chen, Ruiliang, J-M. Park , and Kaigui Bian . \"Robust distributed spectrum sensing in cognitive radio networks.\" In IEEE INFOCOM 2008-The 27th Conference on Computer Communications, pp. 1876--1884 . IEEE , 2008 . Chen, Ruiliang, J-M. Park, and Kaigui Bian. \"Robust distributed spectrum sensing in cognitive radio networks.\" In IEEE INFOCOM 2008-The 27th Conference on Computer Communications, pp. 1876--1884. IEEE, 2008."},{"key":"e_1_3_2_1_11_1","volume-title":"IEEE","author":"Securing Yalin E.","year":"2014","unstructured":"Sagduyu, Yalin E. \" Securing cognitive radio networks with dynamic trust against spectrum sensing data falsification.\" In 2014 IEEE Military Communications Conference, pp. 235--241 . IEEE , 2014 . Sagduyu, Yalin E. \"Securing cognitive radio networks with dynamic trust against spectrum sensing data falsification.\" In 2014 IEEE Military Communications Conference, pp. 235--241. IEEE, 2014."},{"issue":"2","key":"e_1_3_2_1_12_1","first-page":"774","article-title":"\"Collaborative spectrum sensing in the presence of Byzantine attacks in cognitive radio networks","volume":"59","author":"Singh Ankit","year":"2010","unstructured":"Rawat, Ankit Singh , Priyank Anand , Hao Chen , and Pramod K. Varshney . \"Collaborative spectrum sensing in the presence of Byzantine attacks in cognitive radio networks .\" IEEE Transactions on Signal Processing 59 , no. 2 ( 2010 ): 774 -- 786 . Rawat, Ankit Singh, Priyank Anand, Hao Chen, and Pramod K. Varshney. \"Collaborative spectrum sensing in the presence of Byzantine attacks in cognitive radio networks.\" IEEE Transactions on Signal Processing 59, no. 2 (2010): 774--786.","journal-title":"IEEE Transactions on Signal Processing"},{"key":"e_1_3_2_1_13_1","volume-title":"meet AI: Learning-empowered attacks in cooperative spectrum sensing.\" IEEE Transactions on Mobile Computing","author":"Zhao Shangqing","year":"2020","unstructured":"Luo, Zhengping, Shangqing Zhao , Zhuo Lu , Jie Xu , and Yalin Sagduyu . \" When attackers meet AI: Learning-empowered attacks in cooperative spectrum sensing.\" IEEE Transactions on Mobile Computing ( 2020 ). Luo, Zhengping, Shangqing Zhao, Zhuo Lu, Jie Xu, and Yalin Sagduyu. \"When attackers meet AI: Learning-empowered attacks in cooperative spectrum sensing.\" IEEE Transactions on Mobile Computing (2020)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.2200\/S00861ED1V01Y201806AIM039"},{"key":"e_1_3_2_1_15_1","volume-title":"a review.\" arXiv preprint arXiv:2012.14392","author":"Hsieh Chung-Chu","year":"2020","unstructured":"Adesina, Damilola, Chung-Chu Hsieh , Yalin E. Sagduyu , and Lijun Qian . \" Adversarial machine learning in wireless communications using RF data : a review.\" arXiv preprint arXiv:2012.14392 ( 2020 ). Adesina, Damilola, Chung-Chu Hsieh, Yalin E. Sagduyu, and Lijun Qian. \"Adversarial machine learning in wireless communications using RF data: a review.\" arXiv preprint arXiv:2012.14392 (2020)."},{"key":"e_1_3_2_1_16_1","volume-title":"motivation, challenges, and research Directions.\" arXiv preprint arXiv:2001.08883","author":"Yalin","year":"2020","unstructured":"Sagduyu, Yalin E., Yi Shi , Tugba Erpek , William Headley , Bryse Flowers , George Stantchev , and Zhuo Lu. \"When wireless security meets machine learning : motivation, challenges, and research Directions.\" arXiv preprint arXiv:2001.08883 ( 2020 ). Sagduyu, Yalin E., Yi Shi, Tugba Erpek, William Headley, Bryse Flowers, George Stantchev, and Zhuo Lu. \"When wireless security meets machine learning: motivation, challenges, and research Directions.\" arXiv preprint arXiv:2001.08883 (2020)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Erpek Tugba Tim O'Shea Yalin E. Sagduyu Yi Shi and T. Charles Clancy. \"Deep learning for wireless communications.\" in Development and Analysis of Deep Learning Architectures Springer (2020).  Erpek Tugba Tim O'Shea Yalin E. Sagduyu Yi Shi and T. Charles Clancy. \"Deep learning for wireless communications.\" in Development and Analysis of Deep Learning Architectures Springer (2020).","DOI":"10.1007\/978-3-030-31764-5_9"},{"issue":"1","key":"e_1_3_2_1_18_1","first-page":"2","article-title":"Deep learning for launching and mitigating wireless jamming attacks","volume":"5","author":"Sagduyu Yalin E.","year":"2018","unstructured":"Erpek, Tugba, Yalin E. Sagduyu , and Yi Shi . \" Deep learning for launching and mitigating wireless jamming attacks .\" IEEE Transactions on Cognitive Communications and Networking 5 , no. 1 ( 2018 ): 2 -- 14 . Erpek, Tugba, Yalin E. Sagduyu, and Yi Shi. \"Deep learning for launching and mitigating wireless jamming attacks.\" IEEE Transactions on Cognitive Communications and Networking 5, no. 1 (2018): 2--14.","journal-title":"IEEE Transactions on Cognitive Communications and Networking"},{"key":"e_1_3_2_1_19_1","first-page":"407","article-title":"Spectrum data poisoning with adversarial deep learning","author":"Erpek Tugba","year":"2018","unstructured":"Shi, Yi, Tugba Erpek , Yalin E Sagduyu , and Jason Li . \" Spectrum data poisoning with adversarial deep learning .\" In IEEE Military Communications Conference (MILCOM) , pp. 407 -- 412 . IEEE, 2018 . Shi, Yi, Tugba Erpek, Yalin E Sagduyu, and Jason Li. \"Spectrum data poisoning with adversarial deep learning.\" In IEEE Military Communications Conference (MILCOM), pp. 407--412. IEEE, 2018.","journal-title":"IEEE Military Communications Conference (MILCOM)"},{"key":"e_1_3_2_1_20_1","first-page":"1","volume-title":"Communication and Networking (SECON)","author":"Yalin","year":"2019","unstructured":"Sagduyu, Yalin E., Yi Shi , and Tugba Erpek . \"IoT network security from the perspective of adversarial deep learning.\" IEEE International Conference on Sensing , Communication and Networking (SECON) , pp. 1 -- 9 . IEEE 2019 . Sagduyu, Yalin E., Yi Shi, and Tugba Erpek. \"IoT network security from the perspective of adversarial deep learning.\" IEEE International Conference on Sensing, Communication and Networking (SECON), pp. 1--9. IEEE 2019."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2950398"},{"key":"e_1_3_2_1_22_1","volume-title":"ACM","author":"Zhao Shangqing","year":"2020","unstructured":"Luo, Zhengping, Shangqing Zhao , Zhuo Lu , Yalin E. Sagduyu , and Jie Xu. \" Adversarial machine learning based partial-model attack in IoT.\" ACM Workshop on Wireless Security and Machine Learning (WiseML), pp. 13--18 . ACM , 2020 . Luo, Zhengping, Shangqing Zhao, Zhuo Lu, Yalin E. Sagduyu, and Jie Xu. \"Adversarial machine learning based partial-model attack in IoT.\" ACM Workshop on Wireless Security and Machine Learning (WiseML), pp. 13--18. ACM, 2020."},{"key":"e_1_3_2_1_23_1","volume-title":"IEEE","author":"Harras Khaled A.","year":"2017","unstructured":"Saeed, Ahmed, Khaled A. Harras , Ellen Zegura , and Mostafa Ammar . \"Local and low-cost white space detection.\" In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 503--516 . IEEE , 2017 . Saeed, Ahmed, Khaled A. Harras, Ellen Zegura, and Mostafa Ammar. \"Local and low-cost white space detection.\" In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 503--516. IEEE, 2017."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6619571"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.4752688"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Wolpert David H. and William G. Macready. \"No free lunch theorems for optimization.\" IEEE transactions on evolutionary computation 1 no. 1 (1997):  67--82.  Wolpert David H. and William G. Macready. \"No free lunch theorems for optimization.\" IEEE transactions on evolutionary computation 1 no. 1 (1997): 67--82.","DOI":"10.1109\/4235.585893"},{"key":"e_1_3_2_1_27_1","volume-title":"from phenomena to black-box attacks using adversarial samples.\" arXiv preprint arXiv:1605.07277","author":"McDaniel Patrick","year":"2016","unstructured":"Papernot, Nicolas, Patrick McDaniel , and Ian Goodfellow . \" Transferability in machine learning : from phenomena to black-box attacks using adversarial samples.\" arXiv preprint arXiv:1605.07277 ( 2016 ). Papernot, Nicolas, Patrick McDaniel, and Ian Goodfellow. \"Transferability in machine learning: from phenomena to black-box attacks using adversarial samples.\" arXiv preprint arXiv:1605.07277 (2016)."}],"event":{"name":"WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"Abu Dhabi United Arab Emirates","acronym":"WiSec '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468218.3469051","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3468218.3469051","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3468218.3469051","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3468218.3469051","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:50Z","timestamp":1750195490000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468218.3469051"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,28]]},"references-count":27,"alternative-id":["10.1145\/3468218.3469051","10.1145\/3468218"],"URL":"https:\/\/doi.org\/10.1145\/3468218.3469051","relation":{},"subject":[],"published":{"date-parts":[[2021,6,28]]},"assertion":[{"value":"2021-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}