no code implementations • 15 Aug 2020 • Alex Berian, Kory Staab, Noel Teku, Gregory Ditzler, Tamal Bose, Ravi Tandon
This paper considers the problem of secure modulation classification, where a transmitter (Alice) wants to maximize MC accuracy at a legitimate receiver (Bob) while minimizing MC accuracy at an eavesdropper (Eve).