Discover the SciOpen Platform and Achieve Your Research Goals with Ease.
Search articles, authors, keywords, DOl and etc.
The Space-Air-Ground-Sea Integrated Networks (SAGSIN) significantly enhance global communication by merging satellite, aviation, terrestrial, and marine networks. Crucial to SAGSIN’s functionality and security is spectrum monitoring using deep learning-based Automatic Modulation Classification (AMC), essential for processing and classifying complex modulation signals. However, these AMC models are susceptible to adversarial attacks. Thus, we introduce the Deep Time-Frequency Denoising Transformation (DTFDT) defense method to mitigate the impact of adversarial attacks. The DTFDT method is comprised of a deep denoising module and a transformation module. The denoising module maps signals into the time-frequency domain, amplifying the differences between benign and adversarial examples, aiding in the elimination of adversarial perturbations. Concurrently, the transformation module develops a learnable network, generating example-specific transformation matrices suited for signal data, which diminishes the effectiveness of attacks. Extensive evaluations on two datasets, RML2016.10a and DMRadio09.real, demonstrate the superior defense capabilities of DTFDT against various attacks.
J. Xu, M. A. Kishk, and M.-S. Alouini, Space-air-ground-sea integrated networks: Modeling and coverage analysis, IEEE Trans. Wirel. Commun., vol. 22, no. 9, pp. 6298–6313, 2023.
M. A. Khan, B. A. Alzahrani, A. Barnawi, A. Al-Barakati, A. Irshad, and S. A. Chaudhry, A resource friendly authentication scheme for space-air-ground-sea integrated maritime communication network, Ocean Eng., vol. 250, p. 110894, 2022.
P. P. Ray, A review on 6G for space-air-ground integrated network: Key enablers, open challenges, and future direction, J. King Saud Univ-Com, vol. 34, no. 9, pp. 6949–6976, 2022.
S. Peng, S. Sun, and Y.-D. Yao, A survey of modulation classification using deep learning: Signal representation and data preprocessing, IEE Trans. Neural Netw. Learn. Syst., vol. 33, no. 12, pp. 7020–7038, 2022.
C. Liu, X. Fu, Y. Wang, L. Guo, Y. Liu, Y. Lin, H. Zhao, and G. Gui, Overcoming data limitations: A few-shot specific emitter identification method using self-supervised learning and adversarial augmentation, IEEE Trans. Inf. Forensics Secur., vol. 19, pp. 500–513, 2023.
F. Liu, Z. Zhang, and R. Zhou, Automatic modulation recognition based on CNN and GRU, Tsinghua Science and Technology, vol. 27, no. 2, pp. 422–431, 2022.
T. Balachander, K. Ramana, R. M. Mohana, G. Srivastava, and T. R. Gadekallu, Cooperative spectrum sensing deployment for cognitive radio networks for internet of things 5G wireless communication, Tsinghua Science and Technology, vol. 29, no. 3, pp. 698–720, 2024.
P. Zhang, N. Chen, S. Shen, S. Yu, N. Kumar, and C.-H. Hsu, AI-enabled space-air-ground integrated networks: Management and optimization, IEEE Netw., vol. 38, no. 2, pp. 186–192, 2024.
M. Sadeghi and E. G. Larsson, Physical adversarial attacks against end-to-end autoencoder communication systems, IEEE Commun. Lett., vol. 23, no. 5, pp. 847–850, 2019.
D. Adesina, C.-C. Hsieh, Y. E. Sagduyu, and L. Qian, Adversarial machine learning in wireless communications using RF data: A review, IEEE Commun. Surv. Tutor., vol. 25, no. 1, pp. 77–100, 2023.
S. Zheng, L. Ye, X. Wang, J. Chen, H. Zhou, C. Lou, Z. Zhao, and X. Yang, Primary user adversarial attacks on deep learning-based spectrum sensing and the defense method, China Commun., vol. 18, no. 12, pp. 94–107, 2021.
J. Li, S. Zhang, J. Cao, and M. Tan, Learning defense transformations for counterattacking adversarial examples, Neural Netw., vol. 164, pp. 177–185, 2023.
B. Kim, Y. E. Sagduyu, K. Davaslioglu, T. Erpek, and S. Ulukus, Channel-aware adversarial attacks against deep learning-based wireless signal classifiers, IEEE Trans. Wirel. Commun., vol. 21, no. 6, pp. 3868–3880, 2022.
Y. Lin, H. Zhao, X. Ma, Y. Tu, and M. Wang, Adversarial attacks in modulation recognition with convolutional neural networks, IEEE Trans. Rel., vol. 70, no. 1, pp. 389–401, 2021.
K. W. McClintick, J. Harer, B. Flowers, W. C. Headley, and A. M. Wyglinski, Countering physical eavesdropper evasion with adversarial training, IEEE Open J. Commun. Soc., vol. 3, pp. 1820–1833, 2022.
Q. Tian, S. Zhang, S. Mao, and Y. Lin, Adversarial attacks and defenses for digital communication signals identification, Digit. Commun. Netw., doi: 10.1016/j.dcan.2022.10.010.
M. Portnoff, Time-frequency representation of digital signals and systems based on short-time fourier analysis, IEEE Trans. Acoust., Speech, Signal Process., vol. 28, no. 1, pp. 55–69, 1980.
The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).