Articles with "legitimate receiver" as a keyword



Photo by headwayio from unsplash

Secure wireless communication via adversarial machine learning: A Priori vs. A Posteriori

Sign Up to like & get
recommendations!
Published in 2021 at "ICT Express"

DOI: 10.1016/j.icte.2021.06.005

Abstract: Abstract This paper considers wireless communication system consisted of one transmitter, one legitimate receiver, and one eavesdropper. The transmitter transmits perturbation-added signal (i.e. adversarial example) with a certain modulation type, while the legitimate receiver and… read more here.

Keywords: wireless communication; secure wireless; communication via; priori posteriori ... See more keywords
Photo by nampoh from unsplash

Pilot Spoofing Attack Detection and Countermeasure

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Communications"

DOI: 10.1109/tcomm.2018.2797989

Abstract: In a time-division duplex multiple antenna system, the channel state information can be estimated using reverse training. A pilot spoofing (contamination) attack occurs when during the training phase, an adversary (spoofer) also sends synchronized, identical… read more here.

Keywords: attack; pilot spoofing; detection; legitimate receiver ... See more keywords