• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

用于下一代多天线隐蔽通信的对抗机器学习

Adversarial Machine Learning for NextG Covert Communications Using Multiple Antennas.

作者信息

Kim Brian, Sagduyu Yalin, Davaslioglu Kemal, Erpek Tugba, Ulukus Sennur

机构信息

Department of Electrical and Computer Engineering, University of Maryland, College Park, MD 20742, USA.

Virginia Tech, National Security Institute, Arlington, VA 24061, USA.

出版信息

Entropy (Basel). 2022 Jul 29;24(8):1047. doi: 10.3390/e24081047.

DOI:10.3390/e24081047
PMID:36010711
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9407147/
Abstract

This paper studies the privacy of wireless communications from an eavesdropper that employs a deep learning (DL) classifier to detect transmissions of interest. There exists one transmitter that transmits to its receiver in the presence of an eavesdropper. In the meantime, a cooperative jammer (CJ) with multiple antennas transmits carefully crafted adversarial perturbations over the air to fool the eavesdropper into classifying the received superposition of signals as noise. While generating the adversarial perturbation at the CJ, multiple antennas are utilized to improve the attack performance in terms of fooling the eavesdropper. Two main points are considered while exploiting the multiple antennas at the adversary, namely the power allocation among antennas and the utilization of channel diversity. To limit the impact on the bit error rate (BER) at the receiver, the CJ puts an upper bound on the strength of the perturbation signal. Performance results show that this adversarial perturbation causes the eavesdropper to misclassify the received signals as noise with a high probability while increasing the BER at the legitimate receiver only slightly. Furthermore, the adversarial perturbation is shown to become more effective when multiple antennas are utilized.

摘要

本文研究了无线通信的隐私问题,针对的是一个窃听者,该窃听者采用深度学习(DL)分类器来检测感兴趣的传输。存在一个发射机在有窃听者的情况下向其接收机进行传输。与此同时,一个具有多个天线的协作干扰器(CJ)在空中传输精心设计的对抗性扰动,以使窃听者将接收到的信号叠加误分类为噪声。在CJ处生成对抗性扰动时,利用多个天线来提高在欺骗窃听者方面的攻击性能。在敌手利用多个天线时考虑了两个要点,即天线之间的功率分配和信道分集的利用。为了限制对接收机处误码率(BER)的影响,CJ对扰动信号的强度设置了上限。性能结果表明,这种对抗性扰动会使窃听者以高概率将接收到的信号误分类为噪声,同时仅略微增加合法接收机处的BER。此外,当使用多个天线时,对抗性扰动会变得更有效。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4917/9407147/a9d2df43ab4f/entropy-24-01047-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4917/9407147/f0756656b24e/entropy-24-01047-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4917/9407147/f5a681f27d91/entropy-24-01047-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4917/9407147/35fa58fb7c4c/entropy-24-01047-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4917/9407147/c43c54cf48ab/entropy-24-01047-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4917/9407147/a9b4c5d70cbe/entropy-24-01047-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4917/9407147/413a1018f492/entropy-24-01047-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4917/9407147/bab9e3a59572/entropy-24-01047-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4917/9407147/b69c5b52b0d3/entropy-24-01047-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4917/9407147/917dbf0e5d89/entropy-24-01047-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4917/9407147/a172f26701a9/entropy-24-01047-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4917/9407147/140fdcb236eb/entropy-24-01047-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4917/9407147/a9d2df43ab4f/entropy-24-01047-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4917/9407147/f0756656b24e/entropy-24-01047-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4917/9407147/f5a681f27d91/entropy-24-01047-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4917/9407147/35fa58fb7c4c/entropy-24-01047-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4917/9407147/c43c54cf48ab/entropy-24-01047-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4917/9407147/a9b4c5d70cbe/entropy-24-01047-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4917/9407147/413a1018f492/entropy-24-01047-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4917/9407147/bab9e3a59572/entropy-24-01047-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4917/9407147/b69c5b52b0d3/entropy-24-01047-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4917/9407147/917dbf0e5d89/entropy-24-01047-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4917/9407147/a172f26701a9/entropy-24-01047-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4917/9407147/140fdcb236eb/entropy-24-01047-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/4917/9407147/a9d2df43ab4f/entropy-24-01047-g012.jpg

相似文献

1
Adversarial Machine Learning for NextG Covert Communications Using Multiple Antennas.用于下一代多天线隐蔽通信的对抗机器学习
Entropy (Basel). 2022 Jul 29;24(8):1047. doi: 10.3390/e24081047.
2
Physical Layer Security in Two-Way SWIPT Relay Networks with Imperfect CSI and a Friendly Jammer.具有不完美信道状态信息和友好干扰器的双向同时无线信息与能量传输中继网络中的物理层安全
Entropy (Basel). 2023 Jan 6;25(1):122. doi: 10.3390/e25010122.
3
Gaussian-Distributed Spread-Spectrum for Covert Communications.高斯分布扩频用于隐秘通信。
Sensors (Basel). 2023 Apr 18;23(8):4081. doi: 10.3390/s23084081.
4
Universal adversarial examples and perturbations for quantum classifiers.量子分类器的通用对抗样本与扰动
Natl Sci Rev. 2021 Jul 22;9(6):nwab130. doi: 10.1093/nsr/nwab130. eCollection 2022 Jun.
5
Adversarial Robustness of Deep Reinforcement Learning Based Dynamic Recommender Systems.基于深度强化学习的动态推荐系统的对抗鲁棒性
Front Big Data. 2022 May 3;5:822783. doi: 10.3389/fdata.2022.822783. eCollection 2022.
6
Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming.基于选择式放大转发与协作干扰的无线传感器网络安全多用户通信
Sensors (Basel). 2016 Nov 12;16(11):1908. doi: 10.3390/s16111908.
7
Crafting Adversarial Perturbations via Transformed Image Component Swapping.通过变换图像组件交换来生成对抗性扰动
IEEE Trans Image Process. 2022;31:7338-7349. doi: 10.1109/TIP.2022.3204206. Epub 2022 Nov 30.
8
Secrecy Coding Analysis of Short-Packet Full-Duplex Transmissions with Joint Iterative Channel Estimation and Decoding Processes.具有联合迭代信道估计与解码过程的短包全双工传输的保密编码分析
Sensors (Basel). 2022 Jul 14;22(14):5257. doi: 10.3390/s22145257.
9
Attack to Fool and Explain Deep Networks.攻击与解释深度神经网络
IEEE Trans Pattern Anal Mach Intell. 2022 Oct;44(10):5980-5995. doi: 10.1109/TPAMI.2021.3083769. Epub 2022 Sep 14.
10
Generalizable Data-Free Objective for Crafting Universal Adversarial Perturbations.用于生成通用对抗扰动的可推广无数据目标。
IEEE Trans Pattern Anal Mach Intell. 2019 Oct;41(10):2452-2465. doi: 10.1109/TPAMI.2018.2861800. Epub 2018 Jul 31.