
Research Article
Adversarial Examples in Wireless Networks: A Comprehensive Survey
3 downloads
@INPROCEEDINGS{10.1007/978-3-031-04231-7_8, author={JianShuo Dong and Xueluan Gong and Meng Xue}, title={Adversarial Examples in Wireless Networks: A Comprehensive Survey}, proceedings={Edge Computing and IoT: Systems, Management and Security. Second EAI International Conference, ICECI 2021, Virtual Event, December 22--23, 2021, Proceedings}, proceedings_a={ICECI}, year={2022}, month={5}, keywords={Adversarial example attacks Wireless networks Deep learning}, doi={10.1007/978-3-031-04231-7_8} }
- JianShuo Dong
Xueluan Gong
Meng Xue
Year: 2022
Adversarial Examples in Wireless Networks: A Comprehensive Survey
ICECI
Springer
DOI: 10.1007/978-3-031-04231-7_8
Abstract
With the rapid development of deep learning technologies, more and more DNN models are employed in wireless communication tasks. While DNNs improve the service, they also incur potential security threats from malicious users. Adversarial Example is a generally discussed attack targeting the deep learning-based models, which undoubtedly threatens the security of deep learning-based wireless networks. In this paper, we widely investigate adversarial example attacks in wireless network scenarios. It helps us become aware of the adversarial example threats that DNNs used in wireless networks are exposed to, and more efforts are required to defend against these attacks.
Copyright © 2021–2025 ICST