Stealthy Backdoor Attack in SAR Target Recognition With ASCM-Based Physically Realizable Triggers

被引:0
作者
Zeng, Fei [1 ]
Chen, Yuanjia [1 ]
Cong, Yulai [1 ]
Zhang, Lei [1 ]
Li, Sijia [1 ]
Xu, Jianqiang [1 ]
Duan, Jia [1 ]
机构
[1] Sun Yat Sen Univ, Sch Elect & Commun Engn, Shenzhen 518107, Peoples R China
来源
IEEE TRANSACTIONS ON RADAR SYSTEMS | 2025年 / 3卷
关键词
Training; Synthetic aperture radar; Security; Target recognition; Radar polarimetry; Perturbation methods; Electromagnetics; Data models; Real-time systems; Predictive models; Attributed scattering center model (ASCM); automatic target recognition (ATR); backdoor attack; physical attack; synthetic aperture radar (SAR); SCATTERING CENTER MODEL; ALGORITHM;
D O I
10.1109/TRS.2025.3582438
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Deep neural networks (DNNs) are extensively employed in synthetic aperture radar (SAR) automatic target recognition (ATR) systems; however, their security and reliability pose significant challenges in this high-risk domain. While considerable efforts have been made to address the vulnerability of DNNs to adversarial attacks, the SAR ATR community has not yet devoted substantial resources to investigating the newly emerging security risks associated with backdoor attacks, which are more threatening because of their attack flexibility, high stealthiness, and versatile attack modes. To investigate backdoor attacks in SAR ATR, we present an innovative method named ASCM-based physical backdoor attack (AMPBA), which generates a physically realizable trigger with clear electromagnetic characteristics and physical attributes based on the attributed scattering center model (ASCM). Specifically, the AMPBA embeds the trigger into limited training samples to produce a poisoned training dataset; after that, training of a DNN-based classifier would inject into it a stealthy backdoor that can be activated by the trigger (either digitally mimicking that of training or physically in practice for real-time attacks). To further enhance the threat level and practicability of the proposed AMPBA, we additionally propose a backdoor attack strategy called low-intensity training and high-intensity inference (LTHI), which utilizes low-intensity triggers during training to maximize stealthiness and high-intensity triggers during inference for enhanced attack performance. Extensive experiments based on the representative MSTAR dataset validate the effectiveness, stealthiness, and robustness of our AMPBA, which, alternatively, highlight the importance of designing effective backdoor defense mechanisms for high-risk applications.
引用
收藏
页码:947 / 962
页数:16
相关论文
共 80 条
[1]   Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey [J].
Akhtar, Naveed ;
Mian, Ajmal .
IEEE ACCESS, 2018, 6 :14410-14430
[2]   A scattering center model for SAR imagery [J].
Akyildiz, Y ;
Moses, RL .
SAR IMAGE ANALYSIS, MODELING, AND TECHNIQUES II, 1999, 3869 :76-85
[3]  
Barni M, 2019, IEEE IMAGE PROC, P101, DOI [10.1109/icip.2019.8802997, 10.1109/ICIP.2019.8802997]
[4]   Susceptibility & defense of satellite image-trained convolutional networks to backdoor attacks [J].
Brewer, Ethan ;
Lin, Jason ;
Runfola, Dan .
INFORMATION SCIENCES, 2022, 603 :244-261
[5]   Towards Evaluating the Robustness of Neural Networks [J].
Carlini, Nicholas ;
Wagner, David .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :39-57
[6]   An Empirical Study of Adversarial Examples on Remote Sensing Image Scene Classification [J].
Chen, Li ;
Xu, Zewei ;
Li, Qi ;
Peng, Jian ;
Wang, Shaowen ;
Li, Haifeng .
IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, 2021, 59 (09) :7419-7433
[7]   Feature-Enhanced Speckle Reduction via Low-Rank and Space-Angle Continuity for Circular SAR Target Recognition [J].
Chen, Lin ;
Jiang, Xue ;
Li, Zhou ;
Liu, Xingzhao ;
Zhou, Zhixin .
IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, 2020, 58 (11) :7734-7752
[8]  
Chen Weixin, 2022, Advances in Neural Information Processing Systems
[9]   BadNL: Backdoor Attacks against NLP Models with Semantic-preserving Improvements [J].
Chen, Xiaoyi ;
Salem, Ahmed ;
Chen, Dingfan ;
Backes, Michael ;
Ma, Shiqing ;
Shen, Qingni ;
Wu, Zhonghai ;
Zhang, Yang .
37TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2021, 2021, :554-569
[10]  
Chen XY, 2017, Arxiv, DOI arXiv:1712.05526