- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources2
- Resource Type
-
20
- Availability
-
11
- Author / Contributor
- Filter by Author / Creator
-
-
Berian, A. (1)
-
Bose, T. (1)
-
Ditzler, G. (1)
-
Lazos, L (1)
-
Samy, I (1)
-
Staab, K. (1)
-
Tandon, R (1)
-
Tandon, R. (1)
-
Teku, N. (1)
-
#Tyler Phillips, Kenneth E. (0)
-
& *Soto, E. (0)
-
& Ahmed, Khadija. (0)
-
& Akcil-Okan, O. (0)
-
& Akuom, D. (0)
-
& Andrews-Larson, C. (0)
-
& Archibald, J. (0)
-
& Attari, S. Z. (0)
-
& Ayala, O. (0)
-
& Babbitt, W. (0)
-
& Baek, Y. (0)
-
- Filter by Editor
-
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
:Chaosong Huang, Gang Lu (0)
-
A. Beygelzimer (0)
-
A. Ghate, K. Krishnaiyer (0)
-
A. I. Sacristán, J. C. (0)
-
A. Weinberg, D. Moore-Russo (0)
-
A. Weinberger (0)
-
A.I. Sacristán, J.C. Cortés-Zavala (0)
-
A.I., Dimitrova (0)
-
ACS (0)
-
AIAA (0)
-
AIAA Propulsion and Energy 2021 (0)
-
AIAA SciTech (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Modulation Classification (MC) is the problem of classifying the modulation format of a wireless signal. In the wireless communications pipeline, MC is the first operation performed on the received signal and is critical for reliable decoding. This paper considers the problem of secure MC, where a transmitter (Alice) wants to maximize MC accuracy at a legitimate receiver (Bob) while minimizing MC accuracy at an eavesdropper (Eve). This work introduces novel adversarial learning techniques for secure MC. We present adversarial filters in which Alice uses a carefully designed adversarial filter to mask the transmitted signal, that can maximize MC accuracy atmore »Free, publicly-accessible full text available October 1, 2022
-
Samy, I ; Tandon, R ; Lazos, L ( , Abstracts of papers - IEEE International Symposium on Information Theory)