Picture for Brian Kim

Brian Kim

Mathematical Derivation Graphs: A Task for Summarizing Equation Dependencies in STEM Manuscripts

Add code
Oct 26, 2024
Viaarxiv icon

Experimental Study of Adversarial Attacks on ML-based xApps in O-RAN

Add code
Sep 07, 2023
Viaarxiv icon

Covert Communications via Adversarial Machine Learning and Reconfigurable Intelligent Surfaces

Add code
Dec 21, 2021
Figure 1 for Covert Communications via Adversarial Machine Learning and Reconfigurable Intelligent Surfaces
Figure 2 for Covert Communications via Adversarial Machine Learning and Reconfigurable Intelligent Surfaces
Figure 3 for Covert Communications via Adversarial Machine Learning and Reconfigurable Intelligent Surfaces
Figure 4 for Covert Communications via Adversarial Machine Learning and Reconfigurable Intelligent Surfaces
Viaarxiv icon

Adversarial Attacks against Deep Learning Based Power Control in Wireless Communications

Add code
Oct 12, 2021
Figure 1 for Adversarial Attacks against Deep Learning Based Power Control in Wireless Communications
Figure 2 for Adversarial Attacks against Deep Learning Based Power Control in Wireless Communications
Figure 3 for Adversarial Attacks against Deep Learning Based Power Control in Wireless Communications
Figure 4 for Adversarial Attacks against Deep Learning Based Power Control in Wireless Communications
Viaarxiv icon

Adversarial Attacks on Deep Learning Based mmWave Beam Prediction in 5G and Beyond

Add code
Mar 25, 2021
Figure 1 for Adversarial Attacks on Deep Learning Based mmWave Beam Prediction in 5G and Beyond
Figure 2 for Adversarial Attacks on Deep Learning Based mmWave Beam Prediction in 5G and Beyond
Figure 3 for Adversarial Attacks on Deep Learning Based mmWave Beam Prediction in 5G and Beyond
Figure 4 for Adversarial Attacks on Deep Learning Based mmWave Beam Prediction in 5G and Beyond
Viaarxiv icon

Channel Effects on Surrogate Models of Adversarial Attacks against Wireless Signal Classifiers

Add code
Dec 03, 2020
Figure 1 for Channel Effects on Surrogate Models of Adversarial Attacks against Wireless Signal Classifiers
Figure 2 for Channel Effects on Surrogate Models of Adversarial Attacks against Wireless Signal Classifiers
Figure 3 for Channel Effects on Surrogate Models of Adversarial Attacks against Wireless Signal Classifiers
Figure 4 for Channel Effects on Surrogate Models of Adversarial Attacks against Wireless Signal Classifiers
Viaarxiv icon

Adversarial Attacks with Multiple Antennas Against Deep Learning-Based Modulation Classifiers

Add code
Jul 31, 2020
Figure 1 for Adversarial Attacks with Multiple Antennas Against Deep Learning-Based Modulation Classifiers
Figure 2 for Adversarial Attacks with Multiple Antennas Against Deep Learning-Based Modulation Classifiers
Figure 3 for Adversarial Attacks with Multiple Antennas Against Deep Learning-Based Modulation Classifiers
Figure 4 for Adversarial Attacks with Multiple Antennas Against Deep Learning-Based Modulation Classifiers
Viaarxiv icon

How to Make 5G Communications "Invisible": Adversarial Machine Learning for Wireless Privacy

Add code
May 15, 2020
Figure 1 for How to Make 5G Communications "Invisible": Adversarial Machine Learning for Wireless Privacy
Figure 2 for How to Make 5G Communications "Invisible": Adversarial Machine Learning for Wireless Privacy
Figure 3 for How to Make 5G Communications "Invisible": Adversarial Machine Learning for Wireless Privacy
Figure 4 for How to Make 5G Communications "Invisible": Adversarial Machine Learning for Wireless Privacy
Viaarxiv icon

Channel-Aware Adversarial Attacks Against Deep Learning-Based Wireless Signal Classifiers

Add code
May 11, 2020
Figure 1 for Channel-Aware Adversarial Attacks Against Deep Learning-Based Wireless Signal Classifiers
Figure 2 for Channel-Aware Adversarial Attacks Against Deep Learning-Based Wireless Signal Classifiers
Figure 3 for Channel-Aware Adversarial Attacks Against Deep Learning-Based Wireless Signal Classifiers
Figure 4 for Channel-Aware Adversarial Attacks Against Deep Learning-Based Wireless Signal Classifiers
Viaarxiv icon

Over-the-Air Adversarial Attacks on Deep Learning Based Modulation Classifier over Wireless Channels

Add code
Feb 13, 2020
Figure 1 for Over-the-Air Adversarial Attacks on Deep Learning Based Modulation Classifier over Wireless Channels
Figure 2 for Over-the-Air Adversarial Attacks on Deep Learning Based Modulation Classifier over Wireless Channels
Figure 3 for Over-the-Air Adversarial Attacks on Deep Learning Based Modulation Classifier over Wireless Channels
Viaarxiv icon