JOURNAL ARTICLE

RF Domain Backdoor Attack on Signal Classification via Stealthy Trigger

Zijie TangTianming ZhaoTianfang ZhangHuy PhanYan WangCong ShiBo YuanYingying Chen

Year: 2024 Journal:   IEEE Transactions on Mobile Computing Vol: 23 (12)Pages: 11765-11780   Publisher: IEEE Computer Society

Abstract

Deep learning (DL) has recently become a key technology supporting radio frequency (RF) signal classification applications. Given the heavy DL training requirement, adopting outsourced training is a practical option for RF application developers. However, the outsourcing process exposes a security vulnerability that enables a backdoor attack. While backdoor attacks have been explored in the vision domain, it is rarely explored in the RF domain. In this work, we present a stealthy backdoor attack that targets DL-based RF signal classification. To realize such an attack, we extensively explore the characteristics of the RF data in different applications, which include RF modulation classification and RF fingerprint-based device identification. Then, we design a training-based backdoor trigger generation approach with different optimization procedures for two backdoor attack scenarios (i.e., poison-label and clean-label). Extensive experiments on two RF signal classification datasets show that the attack success rate is over 99.2%, while its classification accuracy for the clean data remains high (i.e., less than a 0.6% drop compared to the clean model). The low NMSE (less than 0.091) indicates the stealthiness of the attack. Additionally, we demonstrate that our attack can bypass existing defense strategies, such as Neural Cleanse and STRIP.

Keywords:
Backdoor Computer science Computer security Domain (mathematical analysis) Computer network

Metrics

9
Cited By
5.75
FWCI (Field Weighted Citation Impact)
43
Refs
0.94
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Wireless Signal Modulation Classification
Physical Sciences →  Computer Science →  Artificial Intelligence
Radar Systems and Signal Processing
Physical Sciences →  Engineering →  Aerospace Engineering
Cryptographic Implementations and Security
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

Stealthy graph backdoor attack based on feature trigger

Yang ChenBin ZhouHaixing Zhao

Journal:   Complex & Intelligent Systems Year: 2025 Vol: 11 (8)
JOURNAL ARTICLE

Simtrojan: Stealthy Backdoor Attack

Yankun RenLongfei LiJun Zhou

Year: 2021 Pages: 819-823
JOURNAL ARTICLE

Stealthy and Effective Clean-Label Backdoor Attack via Adaptive Frequency-Domain Suppression and Trigger Combination

Chaoying YuanJingpeng BaiShumei YuanWei Ni

Journal:   IEEE Transactions on Information Forensics and Security Year: 2025 Vol: 20 Pages: 11295-11310
JOURNAL ARTICLE

Stealthy Backdoor Attack Against Speaker Recognition Using Phase-Injection Hidden Trigger

Zhe YeDiqun YanLi DongJiacheng DengShui Yu

Journal:   IEEE Signal Processing Letters Year: 2023 Vol: 30 Pages: 1057-1061
© 2026 ScienceGate Book Chapters — All rights reserved.