2. Background Introduction
Channel estimation is essential for ensuring communication quality, with traditional OFDM-based methods exhibiting distinct advantages and limitations. The least squares (LSs) method [
5,
6], widely used for its computational simplicity, suffers from severe performance degradation in low-SNR scenarios due to its disregard for noise. Discrete Fourier transform (DFT)-based techniques [
7] effectively suppress noise through frequency-domain filtering while maintaining low complexity; however, their performance rapidly deteriorates when frequency offsets exceed 5% of the subcarrier spacing. The linear minimum mean square error (LMMSE) method [
8,
9], though capable of achieving near-optimal estimation under moderate-to-high SNRs, depends on prior knowledge of channel covariance and exhibits cubic computational complexity, limiting its scalability in large-scale MIMO systems.
Recent developments in deep learning have introduced data-driven alternatives. Deep neural networks (DNNs) [
10,
11,
12] demonstrate strong performance across varying pilot lengths through end-to-end learning, while convolutional neural networks (CNNs) [
13] utilize pilot position information to enhance estimation accuracy. Advanced frameworks such as CsiNet and CsiNet-LSTM [
14] improve the robustness of CSI feedback, and tensor-train DNNs (TT-DNNs) [
15] reduce parameter dimensionality for high-dimensional CSI, albeit with slower convergence. Hybrid approaches that integrate traditional techniques with DNNs [
13,
16] seek to balance complexity and adaptability, for instance, by leveraging spectral-time averaging to track channel variations.
For sparse channel estimation, traditional algorithms such as orthogonal matching pursuit (OMP) [
17] remain prevalent, though their effectiveness heavily relies on accurate sparsity level estimation. Enhanced OMP variants [
14,
15,
18,
19] exploit angular sparsity or introduce adaptive mechanisms to improve robustness, often at the cost of increased complexity. In contrast, deep learning-based methods, including CNN-based MIMO-OFDM estimators [
20] and DNN-enhanced OTFS systems [
21,
22] have shown superior performance over OMP, particularly in delay-Doppler domains.
Channel estimation guarantees communication quality and is related to the accuracy and stability of signal transmission. Modulation classification, as the basis of communication systems, is a key prerequisite for subsequent signal processing and information interpretation. The two are closely related and jointly promote the development of communication technology. Under this broad background, the security and stability of communication systems have become key research directions, and adversarial attacks and channel estimation are precisely the core issues among them. In the field of adversarial attacks, many research achievements have been remarkable. In the early days, after Szegedy et al. [
23] discovered that deep neural networks were vulnerable to slight adversarial interference, Wu et al. [
24,
25] proposed the adversarial transformation-enhanced transfer Attack (ATTA), which constructs an adversarial transformation network through adversarial learning to generate adversarial noise and thereby resist the distortion problem caused by the network.
The high-frequency component semantic similarity attack proposed by Luo et al. [
26] focuses on the high-frequency noise of the image. Chen et al.’s [
27] adversarial attack method based on adversarial generative networks (GANs), adGAN, reduces the performance of intelligent systems by leveraging adversarial generative networks. Xu et al. [
28] studied the perturbation pattern analysis of radio frequency signals. Wang et al. [
29] utilized Hamiltonian Monte Carlo to generate a series of adversarial samples.
With the in-depth research on the security of communication systems, the correlation between modulation classification and adversarial attacks has gradually emerged. In the context of modulation classification, Zhang et al. [
30] evaluated the performance and adversarial sensitivity of Transformer-based neural networks. Manoj et al. [
31] introduced multiple training methods to construct robust DNN models and evaluate them. Kotak and Elovicii [
32] applied attack assessment to evaluate the vulnerability of the Internet of Things device identification system and discovered new attack methods.
As an important application scenario of communication systems, wireless communication has concrete manifestations and further development in which the above research results are presented. In wireless communication, Sadeghi et al. [
33] proposed an adversarial attack method for automatic modulation identification. Lin et al. [
34] explored its threats and impacts on automatic modulation recognition. Sandler et al. [
35] verified the effectiveness of the attack in the form of external interference. Cohen et al. [
36] improved robustness by increasing the noisy training data. Kim et al. [
37] studied the channel influence and proposed a channel-aware attack method. Meanwhile, frequency-domain attacks emerged. Guo et al. [
38] utilized the low-frequency component attack algorithm, and Sharma et al. [
39] discovered different responses of the defense model to high- and low-frequency disturbances. Duan et al. [
40] proposed the adversarial attack on DNNs by dropping information (AdvDrop) attack on neural networks.
Despite these advancements, significant challenges remain. Traditional methods struggle in complex and dynamic environments, sparse estimators falter when ideal sparsity assumptions are violated, and deep learning-based approaches still require improved generalization and robustness. To address these issues, we propose a novel channel estimation framework that enhances both accuracy and robustness. Additionally, we introduce a frequency-domain adversarial sample generation method that leverages channel state information to assess the critical role of accurate estimation in communication security. This work bridges the gap between performance and robustness, contributing to the development of reliable and secure wireless communication systems.
5. Channel Aware Adversarial Sample Generation Method Based on Frequency Domain Transformation
Channel estimation guarantees communication quality and is related to the accuracy and stability of signal transmission. Modulation classification, as the basis of communication systems, is a key prerequisite for subsequent signal processing and information interpretation. The two are closely related and jointly promote the development of communication technology. Under this broad background, the security and stability of communication systems have become key research directions, and adversarial attacks and channel estimation are precisely the core issues among them.
In recent years, the research on adversarial attacks based on frequency-domain information has revealed the frequency-domain sensitivity characteristics of deep learning from two dimensions: attack methods and model mechanisms. At the level of attack methods, researchers have found that low-frequency components and high-frequency components have the same influence on model decision-making. Although the existing defense mechanisms can effectively suppress high-frequency disturbances, there are still significant loopholes in the defense against low-frequency disturbances.
At the model mechanism level, research shows that deep neural networks have significant frequency-domain perception preferences. On the one hand, the model can capture high-frequency features that are difficult for humans to detect, but is extremely sensitive to high-frequency noise. On the other hand, network decision-making overly relies on spectral amplitude information while ignoring the robustness characterization of phase characteristics. Further research has found that the key discrimination frequency bands of samples of different categories are specific. This category difference in frequency sensitivity provides an opportunity for targeted frequency-domain attacks. The current defense methods enhance robustness through strategies such as high-frequency noise suppression and phase protection. However, breakthroughs are still needed in cross-band attack defense and dynamic spectrum registration, which points out the direction for subsequent research.
From the above content, it can be known that different frequency components in the existing research contribute differently to the model decision-making. Then, different frequency components also have guiding significance for the generation of adversarial samples. Based on this, this paper proposes an adversarial sample generation method based on channel awareness for frequency-domain transformation. At the same time, it can verify the importance of accurate channel estimation in adversarial attacks on communication systems. Provide new solutions for the security and reliability of communication systems.
In this section, the Fourier transform is adopted to transform the signal from a continuous time series signal in the time-domain to the frequency domain for analysis. The specific mathematical expression is as follows:
where
represents an odd function. When both the function and its Fourier transform undergo discretization processing, the discrete Fourier transform (DFT) can be obtained. For radio signals that are usually modulated by I/Q modulators, the I/Q two-channel signals can be expressed as:
For a signal with a sampling length of
L, it can be expressed as:
Therefore, the discrete Fourier transform of the modulated signal of length
L in the I/Q two channels can be expressed as:
Correspondingly, the frequency-domain signal can be converted into a time-domain signal through the inverse discrete Fourier transform, and its expression is:
Based on the existing research and analysis, if the sensitivity of different frequency components of the sample to model recognition can be explored and malicious disturbances can be generated guided by this, the generated adversarial samples will be more targeted and threatening. For this purpose, this section proposes a frequency-domain signal processing method based on random masks. By inputting samples under different frequency distributions and observing the feedback of the model, the specific operation process
can be expressed as:
where
and
represent the discrete Fourier transform and inverse discrete Fourier transform,
represents random noise obeying a Gaussian distribution.
represents the mask matrix, whose elements are random samples in a uniform distribution, and ⊙ represents the Hadamar product, which is the product of each element in matrix operations. The frequency domain conversion process F can be seen as shown on
Figure 2.
Furthermore, the signal data processed by Equation (
42) are input into the target classification model and the model gradient information
g is obtained. In order to obtain more reliable frequency-domain sensitivity information, in this section, the process
T is selected for
N times, that is, the noise
and mask
generated in each round, and a set of gradient information
is obtained, where
. After completion, continue to sum the
N gradients and calculate the average value. The total gradient information highlights the sensitive regions of the model for robust rows and key features, thereby guiding adversarial samples to be generated in a more threatening direction. Each generated mask element follows a uniform distribution. In this section, the weights of the time-domain and frequency-domain components of each gradient are set to 1.
Finally, the obtained gradient information is combined with the attack algorithm in Equation (
12) to generate adversarial samples. To sum up, the complete adversarial attack algorithm based on frequency-domain transformation can be summarized as the following formula:
where
represents the limit of the disturbance
,
,
I represents the number of iterations
represents the sign function,
represents the iteration step size,
represents the target model loss function, and
H represents the channel matrix information.
Next, consider a wireless communication system composed of one transmitter, m receivers, and one adversary. All nodes are equipped with an antenna and operate on the same channel. Each receiver uses a neural network to classify the signals it receives into the modulation type used by the transmitter. Meanwhile, the opponent transmits disturbance signals through the air, deceiving the classifier on the receiver into making mistakes in modulation classification, thereby enabling the attack to succeed.
The deep neural network classifier at the ith receiving end is denoted as , where a represents the parameters of the neural network at the ith receiving end and C is the number of modulation types. Here, , and p is the dimension of the complex input (in-phase/orthogonal component), which can also be expressed as the concatenation of two real input numbers. The classifier assigns the modulation type to each input , where is the output of the ith classifier for the kth modulation type.
The channel from the transmitting end to the ith receiving end is denoted as , and the channel from the opponent to the receiving end is denoted as . The vector forms are represented by and . When there is no adversarial attack, the transmitting end sends signal x, and the signal received by the ith receiving end is . When there is an adversarial attack, if the attacker transmits a perturbation signal , the signal at the ith receiving end is , where and are diagonal matrices as mentioned earlier, and is Gaussian noise.
Suppose the adversarial disturbance
and the transmitting signal
x are synchronously superimposed at the receiving end to ensure the effectiveness of the attack. To achieve the concealment and energy efficiency of the attack, the adversarial perturbation
needs to satisfy the power constraint
, where
is the preset maximum perturbation power budget. The attacker needs to design a universal perturbation
for the input signal
x and all receiver classifiers
by solving the following optimization problems (
44):
In optimization problems (
44), the objective is to minimize the perturbation power (minimize the
norm) to ensure that the perturbation power does not exceed the budget
while satisfying all receiver classification errors. It should be noted that due to the complexity of the decision boundary of deep neural networks, the optimal solution may not be obtained at point
.
The analysis will be carried out from the single-receiver scenario (m = 1), and the receiver index i will be omitted to simplify the expression. For targeted attacks, the attacker designs the perturbation by minimizing the loss function . Based on the fast gradient method (FGM), the loss function can be linearly approximated as . Minimization is achieved by setting , and is the scaling factor used to constrain the adversarial disturbance power to .
In the MRPP attack [
37], the attacker maximizes the perturbation power at the receiving end by selecting perturbations and analyzes the impact of this power on the classifier decision-making process. To achieve this goal, attackers need to make full use of the channel characteristics between the attacker and the receiving end. Specifically, if the target attack disturbance
is multiplied by the conjugate
of channel
, the received power can be maximized along the channel direction. After being transmitted through the channel, the disturbance power at the receiving end becomes
. Through this operation, the adversarial attack not only maintains the consistency of the perturbation direction with the channel but also maximizes the transmission efficiency of the perturbation energy through the channel gain. Ultimately, the attacker needs to generate targeted perturbations for all possible modulation types and calculate the scaling factor to meet the power constraints of the opponent. The calculation of the scaling factor
has been obtained from reference [
33] and will not be elaborated here.
Based on the above derivation and combined with the methods mentioned in the previous section, the adversarial sensing adversarial perturbation generation algorithm based on frequency-domain transformation can be obtained. The specific details are given in Algorithm 1.
Algorithm 1 Adversarial example generation algorithm channel sensing and frequency-domain transformation (FTHA). |
- Input :
Classification model f with parameters , clean sample x, true label y, norm bound , iteration count I, frequency transformation count N, coordination factor , noise with standard deviation , mask M, representing channel matrix to receiver, representing conjugate of channel matrix - Output :
Adversarial sample - 1:
, , follows Gaussian distribution , M follows uniform distribution -
- 2:
for to I do - 3:
for to N do - 4:
Random frequency transformation: -
- 5:
Gradient calculation: - 6:
end for - 7:
Compute average gradient: - 8:
Channel information perturbation: -
- 9:
- 10:
end for - 11:
- 12:
return
|
7. Simulation Result
7.1. Channel Estimation
In this section, the experiments for verifying the effectiveness of the proposed method are described in detail, and the experimental results are presented. This experiment is built based on the OFDM communication system. The application scenario is set as transmission by a single antenna and reception by a single user. The channel model selected is the Rayleigh channel. The Pytorch toolkit is selected as the deep learning development tool, and all deep learning models are trained on NVIDIA Tesla V100-PCIE. We make full use of its powerful functions of deep learning model construction and training to provide strong support for the implementation of the SDNet and SDRNet frameworks. The sample size is set at 2000, and the signal data are generated by using the QPSK modulation method. To obtain the test set, the output of the OMP algorithm is used as the input data of the neural network, thereby providing basic data support for the subsequent network performance evaluation.
In the network compilation stage, the Adam optimizer is selected for training because it performs well in parameter optimization and can effectively adjust network parameters to improve model performance. The learning rate is set to 0.0005 to maintain a stable update during the training process. The mean square error is adopted as the loss function throughout the training process, and the loss of the validation set is taken as the key evaluation index to measure the training effect and generalization ability of the model. Furthermore, in all experiments, other parameters were kept uniform, and the number of loop iterations was fixed at 100 times to ensure the scientificity and comparability of the experimental results, facilitating the accurate evaluation of the performance of different methods. Secondly, the default system parameters used in the channel simulation are summarized as shown in
Table 1.
Figure 7 and
Figure 8 present a detailed analysis of the mean square error (MSE) and bit error rate (BER) of different channel estimation algorithms under a signal-to-noise ratio of 0–20 dB. The results show that the MSE and BER of all methods decrease as the signal-to-noise ratio increases. This is because a higher transmission power can effectively resist noise interference.
Based on the LS algorithm in low SNR and poor performance, a high signal-to-noise ratio is better. This is because the LS algorithm regards the channel as a definite but unknown constant and uses linear estimation, which is extremely sensitive to noise. In comparison, the performance of the MMSE algorithm is slightly better because it takes into account the prior statistical characteristics of the channel and uses weighted coefficients for linear estimation. The OMP algorithm estimates by gradually selecting the most relevant sparse channel components, which can effectively utilize the channel sparsity and have a higher estimation accuracy than the previous two.
Different from traditional algorithms, the framework proposed in this paper adopts a nonlinear and multi-layer neural network structure, which can estimate more complex channels. Overall, SDNet and SDRNet perform exceptionally well across the full signal-to-noise ratio range, with their MSE significantly lower than that of OMP, LS, and MMSE. Among them, SDRNet performed the most prominently. At 20 dB, the MSE was as low as 0.00004, showing significant advantages. This is attributed to SDRNet integrating multiple residual blocks on the basis of SDNet, retaining the output results of the previous module, and making full use of the features. Therefore, regardless of the environment of low signal-to-noise ratio (0–4 dB), medium signal-to-noise ratio (6–12 dB), or high signal-to-noise ratio (14–20 dB), the MSE and BER of SDRNet remain at a relatively low level, highlighting its superiority and robustness in channel estimation. These data strongly prove the effectiveness of SDNet and SDRNet in channel estimation, and further verify the performance advantages of the proposed method.
Figure 9 shows the MSE comparison of the proposed method under the same number of pilots, the same channel sparsity, and different pilot interval schemes. For SDNet, as the pilot interval I increases, the MSE initially shows an upward trend (from I = 4 to I = 8), and then significantly increases at I = 12. This indicates that under a smaller pilot interval, SDNet can better utilize the pilot signal for channel estimation. However, when the pilot interval is too large, the performance will decline significantly.
For SDRNet, MSE decreases slowly with the increase in the pilot interval I, but the overall change is not significant. This indicates that SDRNet is relatively insensitive to the change in pilot intervals and can maintain relatively stable performance under different pilot intervals. Under most pilot intervals, the MSE of SDRNet is generally lower than that of SDNet, especially at larger pilot intervals (such as I = 12), the performance advantage of SDRNet is more obvious. This indicates that SDRNet may have adopted more effective algorithms or structures in channel estimation and can provide better performance under different pilot intervals. Moreover, the MSE curve of SDRNet is smoother, showing better stability and robustness.
Figure 10 shows the comparison of MSE performance of different pilot quantity schemes under the same pilot interval and channel sparsity. For SDNet, as the number of pilots increases (Nc = 8 to 32), the MSE decreases significantly, mainly due to the cyclic prefix (CP) improving signal continuity and reducing time-domain aliasing. However, when the pilot is too much (Nc = 64), the MSE slightly rebounds, which might be due to an increase in pilot overhead or interference. The MSE of SDRNet continuously and smoothly decreases with the increase in pilot frequency, indicating that it can utilize pilot resources more efficiently. Overall, the variation range of MSE in the two methods is limited, indicating that they are not sensitive to the number of pilots, which is conducive to reducing the system overhead.
Figure 11 compares the MSE performance changes in SDNet and SDRNet under different channel sparsity (K = 3, 6, 9). When the sparsity of SDNet increases from K = 3 to K = 6, the MSE slightly decreases, indicating that a moderate increase in sparsity is conducive to improving the accuracy of channel estimation. However, when the sparsity further increases to K = 9 and K = 12, the MSE rises significantly, indicating that an excessively high sparsity will make the channel overly complex and reduce the estimation performance. In contrast, the MSE of SDRNet slightly decreased from K = 3 to K = 6, and then remained stable, demonstrating strong robustness to changes in sparsity. This indicates that SDRNet can better adapt to channel environments with different sparsity, while the performance of SDNet depends more on the reasonable selection of sparsity.
7.2. Adversarial Sample Generation Based on Frequency Conversion and Channel Awareness
To verify the effectiveness of the FTHA method, this study conducted a phased and progressive experiment for verification. Firstly, in the benchmark environment of the ideal channel, by comparing with traditional attack methods, the advantages of FTA in terms of perturbation efficiency and concealment are verified. Further, we introduce multi-dimensional channel conditions to construct an adversarial attack and defense test platform in real communication scenarios, and compare and analyze the performance differences between FTHA and the classic channel-aware attack strategies, as well as traditional attack methods considering channel conditions in key indicators such as attack success rates.
This section mainly introduces the specific implementation process and testing of adversarial samples based on frequency-domain transformation with channel awareness. As a result, the task experiments on signal modulation recognition in this chapter were conducted in the RadiOML 2016.10A public dataset Proceed. RadioML2016 is an open-source benchmark dataset in the field of wireless communication, mainly used for modulation identification tasks. This dataset was released by Tim O’Shea et al. in 2016, aiming to provide a standardized test platform for the performance evaluation of deep learning models in complex wireless signal processing tasks. Its core objective is to promote the application of machine learning in fields such as wireless communication security and spectrum sensing by simulating the signal characteristics in real communication environments. It includes 11 modulation methods, covering common digital modulations (such as BPSK, QPSK, 16QAM, 64QAM) and analog modulations (such as AM and FM). Each sample is IQ data In complex form (in-phase and quadrature components), with a sampling length of 128 time points, which can completely capture the time-domain characteristics of the signal. By adding Gaussian white noise (AWGN) with different signal-to-noise ratios, the noise interference in actual communication is simulated.
Furthermore, some data introduce channel distortions such as multipath fading and frequency shift. The dataset contains approximately 2.2 million samples in total, which are evenly distributed hierarchically by modulation type and SNR to ensure the comprehensiveness of training and evaluation. It is usually divided into the training set (80%), the validation set (10%), and the test set (10%), supporting the model development of supervised learning tasks.
For the target task, namely the model of automatic modulation recognition, the commonly used models of automatic modulation recognition selected in the experiments of this chapter are as follows:
(1) CNN1D: Modulation recognition model based on one-dimensional convolutional residual network;
(2) CNN2D: Modulation recognition model based on two-dimensional convolutional neural networks.
Firstly, without considering the channel information, in order to verify the effectiveness of the proposed adversarial attack algorithm based on frequency-domain transformation, this section selects multiple adversarial attack algorithms as baselines and compares them with the proposed method:
(1) FGSM: It generates adversarial samples by using the gradient information of the input data, and implements attacks by adding or subtracting the sign of the gradient on each element of the input data and multiplying it by a tiny perturbation.
(2) PGD: During the iterative process, adversarial samples are constructed by maximizing the loss function within the perturbation range to ensure that the generated samples have stronger interference.
(3) BIM: By applying minor disturbances to the original input and conducting multiple iterations to generate adversarial samples, the loss function is maximized within the disturbance range in each iteration.
(4) Autoattack (AA): Combining multiple attack methods to generate more deceptive adversarial samples in an automated manner;
(5) MIFGSM: On the basis of FGSM, a momentum term is introduced to generate adversarial samples through accelerated gradient descent.
Secondly, in order to verify the effectiveness of the proposed frequency-domain transformation adversarial attack algorithm based on channel awareness, the following attack algorithms based on channel information are selected as comparative experiments in this paper:
(1) Channel inversion attack: The attacker alters the characteristics of the wireless communication channel (such as channel gain, phase, etc.), causing abnormal changes in the channel state;
(2) Maximum disturbance power attack (MRPP): The attacker exploits the phase of the target communication channel obtained.
Adjust the power of the interfering signal in a targeted manner based on relevant information (such as channel status information, noise characteristics, etc.) and the size of the disturbance limited by power is changed to complete the attack.
As shown
Table 2, under the CNN1D model and the RadioML2016.10a dataset, the frequency-domain adversarial attack method (FTA) is significantly superior to other attack algorithms in terms of attack efficiency and perturbation concealment. Specifically, the misclassification rate of FTA is 2.3% higher than that of the suboptimal method AA. Meanwhile, its perturbation energy is the lowest among the comparison methods, decreasing by 3.9% and 10.7% respectively compared with PGD and BIM. This result indicates that FTA, through the frequency-domain sparse perturbation injection strategy, can effectively cross the classifier decision boundary under extremely small perturbations.
In terms of confidence offset, the adversarial samples generated by FTA show a high degree of directional misleading. The mean confidence of the error class is close to the theoretical upper limit 1, while the confidence of the correct class is compressed to a value close to zero, which is 85.3% lower than that of FGSM. Although the ACAC and ACTC indicators of FTA are not significantly different from some mature methods (such as MIFGSM), its unique frequency-domain masking mechanism achieves the optimal balance between attack effectiveness and concealment by suppressing the disturbance of redundant frequency bands.
As shown in
Table 3, under the experimental framework of the CNN2D model and the RadioML2016.10a dataset, the frequency-domain adversarial attack method (FTA) demonstrates balanced performance advantages. Although its attack success rate is slightly lower than that of the current optimal automatic attack AA, its disturbance concealment is significantly better than AA, reducing by 11.8% and 19.8%, respectively, compared with MIFGSM and FGSM. This result indicates that FTA, through the frequency-domain sparsification perturbation generation strategy, effectively inhibits the diffusion of redundant energy while ensuring the attack effectiveness, achieving an efficient balance between attack intensity and concealment.
Further analysis reveals that the confidence misleading ability of FTA differs from that of AA by only 2.3%, while its cross-model transferability is superior to that of AA, indicating that its perturbation mode has greater generalization potential. It is worth noting that all adversarial samples in the experimental design are derived from clean samples that can be correctly classified by the target model, resulting in a non-uniform distribution of the disturbance-to-signal ratio (PNR). This will cause local inconsistencies in the relationship between the norm and PNR, and it is necessary to optimize the data balance through dynamic signal-to-noise ratio sampling in subsequent studies.
Figure 12 shows the relationship between the classifier accuracy and PNR under the proposed target white-box adversarial attack with precise channel information and compares it with the channel inversion attack and the maximum perturbation power attack considering the information. It can be observed that the FTA algorithm without considering the channel effect has very poor performance, close to the no-attack situation in the low PNR region. This is because the wireless channel changes the phase and amplitude of the disturbance perceived by the receiver. Furthermore, compared with the MRPP attack, the target channel inversion attack performs poorly, which indicates the importance of the received perturbation power to the performance of the classifier at the receiver. The classification accuracy of the FTHA proposed in this paper is higher than that of MRPP and the channel inversion attack, indicating that it has better performance within a certain range of perturbation power.
It can be seen from
Table 4 and
Table 5 that under Gaussian channel conditions, the performance of the FTHA method on the CNN1D and CNN2D models is significantly better than that of other attack methods, especially in terms of the error classification rate and the average confidence of error class prediction. FTHA, as an improved method of adding channel information on the basis of FTA, can better adapt to the Gaussian channel environment and make full use of the channel characteristics to generate more threatening adversarial samples. On the CNN1D model, the misclassification rate of FTHA increased from 68.7% of FTA to 79.90%, while maintaining a relatively high average confidence level of error class prediction (0.935), indicating that it can mislead the model classification more effectively under channel conditions.
On the CNN2D model, FTHA further increased the misclassification rate to 80.50%, while ACAC reached 0.912, significantly higher than other methods, demonstrating its strong attack capability under complex models. In contrast, the performance of other methods such as FGSM and PGD in the Gaussian channel environment is relatively weak, especially in the CNN2D model. The misclassification rate of FGSM is only 28.00%, significantly lower than that of FTHA, which further highlights the advantages of FTHA under channel conditions. Overall, FTHA has demonstrated stronger attack capabilities and robustness in the Gaussian channel environment by combining channel information. Whether on the CNN1D or CNN2D models, it provides a better solution for adversarial sample generation.
It can be seen from the results of
Table 6 and
Table 7 that the accuracy of channel estimation has a decisive influence on the performance of the FTHA method, which directly reflects the key role of precise channel information in adversarial attacks. In CNN1D and CNN2D models, the performance of FTHA (SDRNet) has always been superior to other methods, especially in terms of the misclassification rate and the average confidence of misclass prediction. This is mainly because SDRNet can estimate the channel state more accurately, thereby generating more targeted adversarial samples. In contrast, FTHA (MMSE) has a significantly weaker attack effect than other methods due to its lower channel estimation accuracy. Especially in the CNN2D model, its MR Is only 77.50%, which is significantly lower than 80.50% of FTHA (SDRNet). This gap indicates that the error of channel estimation will directly affect the generation quality of adversarial samples, resulting in a decline in the attack effect.