
-
Polyphone Disambiguition in Mandarin Chinese with Semi-Supervised Learning
The majority of Chinese characters are monophonic, i.e.their pronunciati...
read it
-
Adversarial Machine Learning for Flooding Attacks on 5G Radio Access Network Slicing
Network slicing manages network resources as virtual resource blocks (RB...
read it
-
How to Attack and Defend 5G Radio Access Network Slicing with Reinforcement Learning
Reinforcement learning (RL) for network slicing is considered in the 5G ...
read it
-
Adversarial Machine Learning for 5G Communications Security
Machine learning provides automated means to capture complex dynamics of...
read it
-
High order asymptotic preserving discontinuous Galerkin methods for gray radiative transfer equations
In this paper, we will develop a class of high order asymptotic preservi...
read it
-
Reinforcement Learning for Dynamic Resource Optimization in 5G Radio Access Network Slicing
The paper presents a reinforcement learning solution to dynamic resource...
read it
-
Multi-View Fusion of Sensor Data for Improved Perception and Prediction in Autonomous Driving
We present an end-to-end method for object detection and trajectory pred...
read it
-
Generative Adversarial Network in the Air: Deep Adversarial Learning for Wireless Signal Spoofing
The spoofing attack is critical to bypass physical-layer signal authenti...
read it
-
Over-the-Air Membership Inference Attacks as Privacy Threats for Deep Learning-based Wireless Signal Classifiers
This paper presents how to leak private information from a wireless sign...
read it
-
Deep Learning for Wireless Communications
Existing communication systems exhibit inherent limitations in translati...
read it
-
When Wireless Security Meets Machine Learning: Motivation, Challenges, and Research Directions
Wireless systems are vulnerable to various attacks such as jamming and e...
read it
-
Coherent Communications in Self-Organizing Networks with Distributed Beamforming
Coherent communications aim to support higher data rates and extended co...
read it
-
Cross-layer Design and SDR Implementation of DSA, Backpressure Routing and Network Coding
A cross-layer cognitive radio system is designed to support unicast and ...
read it
-
Adversarial Deep Learning for Over-the-Air Spectrum Poisoning Attacks
An adversarial deep learning approach is presented to launch over-the-ai...
read it
-
QoS and Jamming-Aware Wireless Networking Using Deep Reinforcement Learning
The problem of quality of service (QoS) and jamming-aware communications...
read it
-
Deep Learning for RF Signal Classification in Unknown and Dynamic Spectrum Environments
Dynamic spectrum access (DSA) benefits from detection and classification...
read it
-
IoT Network Security from the Perspective of Adversarial Deep Learning
Machine learning finds rich applications in Internet of Things (IoT) net...
read it
-
Generative Adversarial Network for Wireless Signal Spoofing
The paper presents a novel approach of spoofing wireless signals by usin...
read it
-
Spectrum Data Poisoning with Adversarial Deep Learning
Machine learning has been widely applied in wireless communications. How...
read it
-
Generative Adversarial Networks for Black-Box API Attacks with Limited Training Data
As online systems based on machine learning are offered to public or pai...
read it
-
Active Deep Learning Attacks under Strict Rate Limitations for Online API Calls
Machine learning has been applied to a broad range of applications and s...
read it
-
Deep Learning for Launching and Mitigating Wireless Jamming Attacks
An adversarial machine learning approach is introduced to launch jamming...
read it
-
Deep Supervised Hashing with Triplet Labels
Hashing is one of the most popular and powerful approximate nearest neig...
read it