Papers
Topics
Authors
Recent
2000 character limit reached

Dual-Domain Constraints: Designing Covert and Efficient Adversarial Examples for Secure Communication (2510.24193v1)

Published 28 Oct 2025 in eess.SP

Abstract: The advancements in Automatic Modulation Classification (AMC) have propelled the development of signal sensing and identification technologies in non-cooperative communication scenarios but also enable eavesdroppers to effectively intercept user signals in wireless communication environments. To protect user privacy in communication links, we have optimized the adversarial example generation model and introduced a novel framework for generating adversarial perturbations for transmitted signals. This framework implements dual-domain constraints in both the time and frequency domains, ensuring that the adversarial perturbation cannot be filtered out. Comparative experiments confirm the superiority of the proposed method and the concealment of the adversarial examples it generates.

Summary

We haven't generated a summary for this paper yet.

Whiteboard

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.