Search dblp for Publications

export results for "toc:db/conf/wisec/wiseml2020.bht:"

 download as .bib file

@inproceedings{DBLP:conf/wisec/0001DS20,
  author       = {Yi Shi and
                  Kemal Davaslioglu and
                  Yalin E. Sagduyu},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {Over-the-air membership inference attacks as privacy threats for deep
                  learning-based wireless signal classifiers},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Wireless Security and Machine
                  Learning, WiseML@WiSec 2020, Linz, Austria, July 13, 2020},
  pages        = {61--66},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395352.3404070},
  doi          = {10.1145/3395352.3404070},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/0001DS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ChaleBW20,
  author       = {Marc Chal{\'{e}} and
                  Nathaniel D. Bastian and
                  Jeffery Weir},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {Algorithm selection framework for cyber attack detection},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Wireless Security and Machine
                  Learning, WiseML@WiSec 2020, Linz, Austria, July 13, 2020},
  pages        = {37--42},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395352.3402623},
  doi          = {10.1145/3395352.3402623},
  timestamp    = {Fri, 24 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ChaleBW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/DelVecchioAH20,
  author       = {Matthew DelVecchio and
                  Vanessa Arndorfer and
                  William C. Headley},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {Investigating a spectral deception loss metric for training machine
                  learning-based evasion attacks},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Wireless Security and Machine
                  Learning, WiseML@WiSec 2020, Linz, Austria, July 13, 2020},
  pages        = {43--48},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395352.3402624},
  doi          = {10.1145/3395352.3402624},
  timestamp    = {Fri, 24 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/DelVecchioAH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/DraganovBMDR20,
  author       = {Andrew Draganov and
                  Carter Brown and
                  Enrico Mattei and
                  Cass Dalton and
                  Jaspreet Ranjit},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {Open set recognition through unsupervised and class-distance learning},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Wireless Security and Machine
                  Learning, WiseML@WiSec 2020, Linz, Austria, July 13, 2020},
  pages        = {7--12},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395352.3402901},
  doi          = {10.1145/3395352.3402901},
  timestamp    = {Fri, 24 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/DraganovBMDR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/FrancoCWG20,
  author       = {Horacio Franco and
                  Chris Cobo{-}Kroenke and
                  Stephanie Welch and
                  Martin Graciarena},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {Wideband spectral monitoring using deep learning},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Wireless Security and Machine
                  Learning, WiseML@WiSec 2020, Linz, Austria, July 13, 2020},
  pages        = {19--24},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395352.3402620},
  doi          = {10.1145/3395352.3402620},
  timestamp    = {Fri, 24 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/FrancoCWG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/FritschekSW20,
  author       = {Rick Fritschek and
                  Rafael F. Schaefer and
                  Gerhard Wunder},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {Deep learning based wiretap coding via mutual information estimation},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Wireless Security and Machine
                  Learning, WiseML@WiSec 2020, Linz, Austria, July 13, 2020},
  pages        = {74--79},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395352.3402654},
  doi          = {10.1145/3395352.3402654},
  timestamp    = {Fri, 24 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/FritschekSW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Kokalj-Filipovic20,
  author       = {Silvija Kokalj{-}Filipovic and
                  Morriel Kasher and
                  Michael Zhao and
                  Predrag Spasojevic},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {Detecting acoustic backdoor transmission of inaudible messages using
                  deep learning},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Wireless Security and Machine
                  Learning, WiseML@WiSec 2020, Linz, Austria, July 13, 2020},
  pages        = {80--85},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395352.3402629},
  doi          = {10.1145/3395352.3402629},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/Kokalj-Filipovic20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/LiuKA20,
  author       = {Jinxin Liu and
                  Burak Kantarci and
                  Carlisle Adams},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {Machine learning-driven intrusion detection for Contiki-NG-based IoT
                  networks exposed to {NSL-KDD} dataset},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Wireless Security and Machine
                  Learning, WiseML@WiSec 2020, Linz, Austria, July 13, 2020},
  pages        = {25--30},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395352.3402621},
  doi          = {10.1145/3395352.3402621},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/LiuKA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/LuciaC20,
  author       = {Michael J. De Lucia and
                  Chase Cotton},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {A network security classifier defense: against adversarial machine
                  learning attacks},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Wireless Security and Machine
                  Learning, WiseML@WiSec 2020, Linz, Austria, July 13, 2020},
  pages        = {67--73},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395352.3402627},
  doi          = {10.1145/3395352.3402627},
  timestamp    = {Fri, 24 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/LuciaC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/LuoZLS020,
  author       = {Zhengping Luo and
                  Shangqing Zhao and
                  Zhuo Lu and
                  Yalin E. Sagduyu and
                  Jie Xu},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {Adversarial machine learning based partial-model attack in IoT},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Wireless Security and Machine
                  Learning, WiseML@WiSec 2020, Linz, Austria, July 13, 2020},
  pages        = {13--18},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395352.3402619},
  doi          = {10.1145/3395352.3402619},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/LuoZLS020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/PatelWM20,
  author       = {Mansi Patel and
                  Xuyu Wang and
                  Shiwen Mao},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {Data augmentation with conditional {GAN} for automatic modulation
                  classification},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Wireless Security and Machine
                  Learning, WiseML@WiSec 2020, Linz, Austria, July 13, 2020},
  pages        = {31--36},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395352.3402622},
  doi          = {10.1145/3395352.3402622},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/PatelWM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/RestucciaDARCIM20,
  author       = {Francesco Restuccia and
                  Salvatore D'Oro and
                  Amani Al{-}Shawabka and
                  Bruno Costa Rendon and
                  Kaushik R. Chowdhury and
                  Stratis Ioannidis and
                  Tommaso Melodia},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {Generalized wireless adversarial deep learning},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Wireless Security and Machine
                  Learning, WiseML@WiSec 2020, Linz, Austria, July 13, 2020},
  pages        = {49--54},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395352.3402625},
  doi          = {10.1145/3395352.3402625},
  timestamp    = {Thu, 22 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/RestucciaDARCIM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ShuCCT20,
  author       = {Dule Shu and
                  Weilin Cong and
                  Jiaming Chai and
                  Conrad S. Tucker},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {Encrypted rich-data steganography using generative adversarial networks},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Wireless Security and Machine
                  Learning, WiseML@WiSec 2020, Linz, Austria, July 13, 2020},
  pages        = {55--60},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395352.3402626},
  doi          = {10.1145/3395352.3402626},
  timestamp    = {Fri, 24 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ShuCCT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ShuLKT20,
  author       = {Dule Shu and
                  Nandi O. Leslie and
                  Charles A. Kamhoua and
                  Conrad S. Tucker},
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {Generative adversarial attacks against intrusion detection systems
                  using active learning},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Wireless Security and Machine
                  Learning, WiseML@WiSec 2020, Linz, Austria, July 13, 2020},
  pages        = {1--6},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395352.3402618},
  doi          = {10.1145/3395352.3402618},
  timestamp    = {Fri, 24 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ShuLKT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2020wiseml,
  editor       = {Ren{\'{e}} Mayrhofer and
                  Michael Roland},
  title        = {Proceedings of the 2nd {ACM} Workshop on Wireless Security and Machine
                  Learning, WiseML@WiSec 2020, Linz, Austria, July 13, 2020},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395352},
  doi          = {10.1145/3395352},
  isbn         = {978-1-4503-8007-2},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/2020wiseml.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics