no code implementations • 20 Jan 2022 • Haidong Xie, Jia Tan, Xiaoying Zhang, Nan Ji, Haihua Liao, Zuguo Yu, Xueshuang Xiang, Naijin Liu
This leads to the problem of a malicious third party using a deep learning model to easily recognize the modulation format of the transmitted waveform.