no code implementations • 4 Jul 2022 • Giovanni Apruzzese, Rodion Vladimirov, Aliya Tastemirova, Pavel Laskov
ML, however, is known to be vulnerable to adversarial examples; moreover, as our paper will show, the 5G context is exposed to a yet another type of adversarial ML attacks that cannot be formalized with existing threat models.