Research Article

Transferable Adversarial Attacks against Automatic Modulation Classifier in Wireless Communications

Figure 2

In this paper, the flow chart of modulation identification against attacks, the modulated signal is first data encapsulated, then the network gradient is obtained through the target network, and perturbation is added to the gradient to form an adversarial sample, which leads to the model recognition error.