Search Results for author: Brian Kim

Found 9 papers, 0 papers with code

TRACTOR: Traffic Analysis and Classification Tool for Open RAN

no code implementations13 Dec 2023 Joshua Groen, Mauro Belgiovine, Utku Demir, Brian Kim, Kaushik Chowdhury

5G and beyond cellular networks promise remarkable advancements in bandwidth, latency, and connectivity.

Covert Communications via Adversarial Machine Learning and Reconfigurable Intelligent Surfaces

no code implementations21 Dec 2021 Brian Kim, Tugba Erpek, Yalin E. Sagduyu, Sennur Ulukus

Results from different network topologies show that adversarial perturbation and RIS interaction vector can be jointly designed to effectively increase the signal detection accuracy at the receiver while reducing the detection accuracy at the eavesdropper to enable covert communications.

BIG-bench Machine Learning

Adversarial Attacks against Deep Learning Based Power Control in Wireless Communications

no code implementations16 Sep 2021 Brian Kim, Yi Shi, Yalin E. Sagduyu, Tugba Erpek, Sennur Ulukus

The DNN that corresponds to a regression model is trained with channel gains as the input and returns transmit powers as the output.

Adversarial Attacks on Deep Learning Based mmWave Beam Prediction in 5G and Beyond

no code implementations25 Mar 2021 Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Sennur Ulukus

Deep learning provides powerful means to learn from spectrum data and solve complex tasks in 5G and beyond such as beam selection for initial access (IA) in mmWave communications.

Adversarial Attack

Channel Effects on Surrogate Models of Adversarial Attacks against Wireless Signal Classifiers

no code implementations3 Dec 2020 Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Kemal Davaslioglu, Sennur Ulukus

The transmitter is equipped with a deep neural network (DNN) classifier for detecting the ongoing transmissions from the background emitter and transmits a signal if the spectrum is idle.

Adversarial Attack

Adversarial Attacks with Multiple Antennas Against Deep Learning-Based Modulation Classifiers

no code implementations31 Jul 2020 Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Kemal Davaslioglu, Sennur Ulukus

First, we show that multiple independent adversaries, each with a single antenna cannot improve the attack performance compared to a single adversary with multiple antennas using the same total power.

How to Make 5G Communications "Invisible": Adversarial Machine Learning for Wireless Privacy

no code implementations15 May 2020 Brian Kim, Yalin E. Sagduyu, Kemal Davaslioglu, Tugba Erpek, Sennur Ulukus

We consider the problem of hiding wireless communications from an eavesdropper that employs a deep learning (DL) classifier to detect whether any transmission of interest is present or not.

BIG-bench Machine Learning

Over-the-Air Adversarial Attacks on Deep Learning Based Modulation Classifier over Wireless Channels

no code implementations5 Feb 2020 Brian Kim, Yalin E. Sagduyu, Kemal Davaslioglu, Tugba Erpek, Sennur Ulukus

In the meantime, the adversary makes over-the-air transmissions that are received as superimposed with the transmitter's signals to fool the classifier at the receiver into making errors.

Adversarial Attack

Cannot find the paper you are looking for? You can Submit a new open access paper.