Implementation of:
K. McClintick et al., “Fooling Supervised Learning Eavesdroppers: Exploiting Classifier Fragility and Wireless Protocol Robustness,” IEEE Transactions on Information Forensics and Security, vol. x, no. y, month, 2021.
and:
K. McClintick et al., “Reproduction of Evaluating Adversarial Evasion Attacks in the Context of Wireless Communications and Convolutional Radio Modulation Recognition Networks,” Proceedings of the 2021 CPS-IoTBench Conference, Spring 2021.