default search action
WiseML@WiSec 2022: San Antonio, TX, USA
- Murtuza Jadliwala:
WiseML@WiSec 2022: Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning, San Antonio, TX, USA, 19 May 2022. ACM 2022, ISBN 978-1-4503-9277-8 - John Davies:
Accelerating RF Autonomy for Uncertain Environments. 1 - Ceren Cömert, Michel Kulhandjian, Omer Melih Gul, Azzedine Touazi, Cliff Ellement, Burak Kantarci, Claude D'Amours:
Analysis of Augmentation Methods for RF Fingerprinting under Impaired Channels. 3-8 - Steven M. Hernandez, Eyuphan Bulut:
Online Stream Sampling for Low-Memory On-Device Edge Training for WiFi Sensing. 9-14 - Frost Mitchell, Aniqua Baset, Neal Patwari, Sneha Kumar Kasera, Aditya Bhaskara:
Deep Learning-based Localization in Limited Data Regimes. 15-20 - Shivenkumar Parmar, Xuyu Wang, Chao Yang, Shiwen Mao:
Voice Fingerprinting for Indoor Localization with a Single Microphone Array and Deep Learning. 21-26 - Michael Hegarty, Yalin E. Sagduyu, Tugba Erpek, Yi Shi:
Deep Learning for Spectrum Awareness and Covert Communications via Unintended RF Emanations. 27-32 - Scott Kuzdeba, Josh Robinson, Joseph M. Carmack, David Couto:
Systems View to Designing RF Fingerprinting for Real-World Operations. 33-38 - Amir-Hossein Yazdani Abyaneh, Marwan Krunz:
Automatic Machine Learning for Multi-Receiver CNN Technology Classifiers. 39-44 - Xue Wei, Dola Saha:
KNEW: Key Generation using NEural Networks from Wireless Channels. 45-50 - Jithin Jagannath, Kian Hamedani, Collin Farquhar, Keyvan Ramezanpour, Anu Jagannath:
MR-iNet Gym: Framework for Edge Deployment of Deep Reinforcement Learning on Embedded Software Defined Radio. 51-56 - Stefanos Koffas, Jing Xu, Mauro Conti, Stjepan Picek:
Can You Hear It?: Backdoor Attacks via Ultrasonic Triggers. 57-62 - Tao Hou, Tao Wang, Zhuo Lu, Yao Liu, Yalin E. Sagduyu:
Undermining Deep Learning Based Channel Estimation via Adversarial Wireless Signal Fabrication. 63-68 - Yang Hu, Batoul Taki, Waheed U. Bajwa, Manoop Talasila, Mukesh Mantan, Syed Anwar Aftab:
A Machine Learning-Driven Analysis of Phantom E911 Calls. 69-74 - Ya Jiang, Long Jiao, Liang Zhao, Kai Zeng:
Beam Pattern Fingerprinting with Missing Features for Spoofing Attack Detection in Millimeter-Wave Networks. 75-80 - Jithin Jagannath, Keyvan Ramezanpour, Anu Jagannath:
Digital Twin Virtualization with Machine Learning for IoT and Beyond 5G Networks: Research Directions for Security and Optimal Control. 81-86
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.