Zhao, T, Tang, Z, Zhang, T, Phan, H, Wang, Y, Shi, C, Yuan, B, and Chen, Y. Stealthy Backdoor Attack on RF Signal Classification. Retrieved from https://par.nsf.gov/biblio/10454223. International Conference on Computing Communication and Networking Technologies .
Zhao, T, Tang, Z, Zhang, T, Phan, H, Wang, Y, Shi, C, Yuan, B, & Chen, Y. Stealthy Backdoor Attack on RF Signal Classification. International Conference on Computing Communication and Networking Technologies, (). Retrieved from https://par.nsf.gov/biblio/10454223.
Zhao, T, Tang, Z, Zhang, T, Phan, H, Wang, Y, Shi, C, Yuan, B, and Chen, Y.
"Stealthy Backdoor Attack on RF Signal Classification". International Conference on Computing Communication and Networking Technologies (). Country unknown/Code not available. https://par.nsf.gov/biblio/10454223.
@article{osti_10454223,
place = {Country unknown/Code not available},
title = {Stealthy Backdoor Attack on RF Signal Classification},
url = {https://par.nsf.gov/biblio/10454223},
abstractNote = {},
journal = {International Conference on Computing Communication and Networking Technologies},
author = {Zhao, T and Tang, Z and Zhang, T and Phan, H and Wang, Y and Shi, C and Yuan, B and Chen, Y},
}
Warning: Leaving National Science Foundation Website
You are now leaving the National Science Foundation website to go to a non-government website.
Website:
NSF takes no responsibility for and exercises no control over the views expressed or the accuracy of
the information contained on this site. Also be aware that NSF's privacy policy does not apply to this site.