Abstract is missing.
- A Machine Learning Approach for Detecting and Classifying Jamming Attacks Against OFDM-based UAVsJered Pawlak, Yuchen Li, Joshua Price, Matthew Wright, Khair Al Shamaileh, Quamar Niyaz, Vijay K. Devabhaktuni. 1-6 [doi]
- Adversarial Attacks on Deep Learning-based Floor Classification and Indoor LocalizationMohini Patil, Xuyu Wang, Xiangyu Wang, Shiwen Mao. 7-12 [doi]
- Adversarial Classification of the Attacks on Smart Grids Using Game Theory and Deep LearningKian Hamedani, Lingjia Liu 0001, Jithin Jagannath, Yang Cindy Yi. 13-18 [doi]
- Adversarial Learning for Cross Layer SecurityHesham Mohammed, Dola Saha. 19-24 [doi]
- Efficient and Privacy-preserving Distributed Learning in Cloud-Edge Computing SystemsYili Jiang, Kuan Zhang, Yi Qian, Rose Qingyang Hu. 25-30 [doi]
- Explainability-based Backdoor Attacks Against Graph Neural NetworksJing Xu, Minhui Xue, Stjepan Picek. 31-36 [doi]
- Inaudible Manipulation of Voice-Enabled Devices Through BackDoor Using Robust Adversarial Audio Attacks: Invited PaperMorriel Kasher, Michael Zhao, Aryeh Greenberg, Devin Gulati, Silvija Kokalj-Filipovic, Predrag Spasojevic. 37-42 [doi]
- Intermittent Jamming against Telemetry and Telecommand of Satellite Systems and A Learning-driven Detection StrategySelen Gecgel, Gunes Karabulut Kurt. 43-48 [doi]
- Learning Model for Cyber-attack Index Based Virtual Wireless Network SelectionNaveen Naik Sapavath, Danda B. Rawat. 49-54 [doi]
- Low-cost Influence-Limiting Defense against Adversarial Machine Learning Attacks in Cooperative Spectrum SensingZhengping Luo, Shangqing Zhao, Rui Duan, Zhuo Lu, Yalin E. Sagduyu, Jie Xu 0001. 55-60 [doi]
- Machine Learning-Assisted Wireless PHY Key Generation with Reconfigurable Intelligent SurfacesLong Jiao, Guohua Sun, Junqing Le, Kai Zeng 0001. 61-66 [doi]
- Multi-Agent Reinforcement Learning Approaches to RF Fingerprint EnhancementJoseph M. Carmack, Steve Schmidt, Scott Kuzdeba. 67-72 [doi]
- Poisoning Attack Anticipation in Mobile Crowdsensing: A Competitive Learning-Based StudyAlexandre Prud'Homme, Burak Kantarci. 73-78 [doi]
- RiftNeXt™: Explainable Deep Neural RF Scene ClassificationSteve Schmidt, James Stankowicz, Joseph M. Carmack, Scott Kuzdeba. 79-84 [doi]
- SWIPEGAN: Swiping Data Augmentation Using Generative Adversarial Networks for Smartphone User AuthenticationAttaullah Buriro, Francesco Ricci, Bruno Crispo. 85-90 [doi]
- Variational Leakage: The Role of Information Complexity in Privacy LeakageAmir Ahooye Atashin, Behrooz Razeghi, Deniz Gündüz, Slava Voloshynovskiy. 91-96 [doi]