Author of the publication

Robustness of Deep Learning-Based Specific Emitter Identification under Adversarial Attacks.

, , , , and . Remote. Sens., 14 (19): 4996 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fuzzy PD-Type Iterative Learning Control of a Single Pneumatic Muscle Actuator., , , , and . ICIRA (2), volume 10463 of Lecture Notes in Computer Science, page 812-822. Springer, (2017)Frequency-Selective Adversarial Attack Against Deep Learning-Based Wireless Signal Classifiers., , and . IEEE Trans. Inf. Forensics Secur., (2024)Minimum Power Adversarial Attacks in Communication Signal Modulation Classification with Deep Learning., , , , and . Cogn. Comput., 15 (2): 580-589 (March 2023)Blind Detection Techniques for Non-Cooperative Communication Signals Based on Deep Learning., , , and . IEEE Access, (2019)Application of Adversarial Examples in Communication Modulation Classification., , , and . ICDM Workshops, page 877-882. IEEE, (2019)Robustness of Deep Learning-Based Specific Emitter Identification under Adversarial Attacks., , , , and . Remote. Sens., 14 (19): 4996 (2022)High-Order Model-Free Adaptive Iterative Learning Control of Pneumatic Artificial Muscle With Enhanced Convergence., , , , , , and . IEEE Trans. Ind. Electron., 67 (11): 9548-9559 (2020)On the Redundancy-Error Tradeoff in Slepian-Wolf Coding and Channel Coding., , , and . ISIT, page 1326-1330. IEEE, (2007)Slepian-Wolf coding with a mismatched decoder., , and . ISIT, page 1428-1432. IEEE, (2008)A Greedy Renormalization Method for Arithmetic Coding., , , and . IEEE Trans. Commun., 55 (8): 1494-1503 (2007)