


default search action
WiseML@WiSec 2022: San Antonio, TX, USA
- Murtuza Jadliwala:

WiseML@WiSec 2022: Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning, San Antonio, TX, USA, 19 May 2022. ACM 2022, ISBN 978-1-4503-9277-8 - John Davies:

Accelerating RF Autonomy for Uncertain Environments. 1 - Ceren Cömert, Michel Kulhandjian, Omer Melih Gul

, Azzedine Touazi
, Cliff Ellement, Burak Kantarci, Claude D'Amours:
Analysis of Augmentation Methods for RF Fingerprinting under Impaired Channels. 3-8 - Steven M. Hernandez

, Eyuphan Bulut:
Online Stream Sampling for Low-Memory On-Device Edge Training for WiFi Sensing. 9-14 - Frost Mitchell, Aniqua Baset, Neal Patwari, Sneha Kumar Kasera, Aditya Bhaskara:

Deep Learning-based Localization in Limited Data Regimes. 15-20 - Shivenkumar Parmar, Xuyu Wang

, Chao Yang, Shiwen Mao:
Voice Fingerprinting for Indoor Localization with a Single Microphone Array and Deep Learning. 21-26 - Michael Hegarty, Yalin E. Sagduyu, Tugba Erpek, Yi Shi

:
Deep Learning for Spectrum Awareness and Covert Communications via Unintended RF Emanations. 27-32 - Scott Kuzdeba, Josh Robinson, Joseph M. Carmack, David Couto:

Systems View to Designing RF Fingerprinting for Real-World Operations. 33-38 - Amir-Hossein Yazdani Abyaneh, Marwan Krunz:

Automatic Machine Learning for Multi-Receiver CNN Technology Classifiers. 39-44 - Xue Wei, Dola Saha:

KNEW: Key Generation using NEural Networks from Wireless Channels. 45-50 - Jithin Jagannath, Kian Hamedani, Collin Farquhar, Keyvan Ramezanpour, Anu Jagannath:

MR-iNet Gym: Framework for Edge Deployment of Deep Reinforcement Learning on Embedded Software Defined Radio. 51-56 - Stefanos Koffas, Jing Xu

, Mauro Conti
, Stjepan Picek:
Can You Hear It?: Backdoor Attacks via Ultrasonic Triggers. 57-62 - Tao Hou, Tao Wang, Zhuo Lu, Yao Liu, Yalin E. Sagduyu:

Undermining Deep Learning Based Channel Estimation via Adversarial Wireless Signal Fabrication. 63-68 - Yang Hu, Batoul Taki, Waheed U. Bajwa, Manoop Talasila, Mukesh Mantan, Syed Anwar Aftab:

A Machine Learning-Driven Analysis of Phantom E911 Calls. 69-74 - Ya Jiang, Long Jiao, Liang Zhao, Kai Zeng:

Beam Pattern Fingerprinting with Missing Features for Spoofing Attack Detection in Millimeter-Wave Networks. 75-80 - Jithin Jagannath, Keyvan Ramezanpour, Anu Jagannath:

Digital Twin Virtualization with Machine Learning for IoT and Beyond 5G Networks: Research Directions for Security and Optimal Control. 81-86

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














