no code implementations • 3 Feb 2023 • Laura Crosara, Francesco Ardizzon, Stefano Tomasin, Nicola Laurenti
We first derive the optimal attack strategy against a Gaussian transmission from Alice, by minimizing an outer bound on the achievable error probability region of the spoofing detection test.