Sign Up to like & get
recommendations!
0
Published in 2021 at "ICT Express"
DOI: 10.1016/j.icte.2021.06.005
Abstract: Abstract This paper considers wireless communication system consisted of one transmitter, one legitimate receiver, and one eavesdropper. The transmitter transmits perturbation-added signal (i.e. adversarial example) with a certain modulation type, while the legitimate receiver and…
read more here.
Keywords:
wireless communication;
secure wireless;
communication via;
priori posteriori ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Transactions on Communications"
DOI: 10.1109/tcomm.2018.2797989
Abstract: In a time-division duplex multiple antenna system, the channel state information can be estimated using reverse training. A pilot spoofing (contamination) attack occurs when during the training phase, an adversary (spoofer) also sends synchronized, identical…
read more here.
Keywords:
attack;
pilot spoofing;
detection;
legitimate receiver ... See more keywords