Defending edge computing based metaverse AI against adversarial attacks

被引:4
作者
Yi, Zhangao [1 ]
Qian, Yongfeng [1 ]
Chen, Min [2 ,3 ]
Alqahtani, Salman A. [4 ]
Hossain, M. Shamim [5 ]
机构
[1] China Univ Geosci, Sch Comp Sci, Wuhan 430074, Peoples R China
[2] South China Univ Technol, Sch Comp Sci & Engn, Guangzhou 510640, Peoples R China
[3] Pazhou Lab, Guangzhou 510640, Peoples R China
[4] King Saud Univ, Coll Comp & Informat Sci, Dept Comp Engn, Riyadh 11574, Saudi Arabia
[5] King Saud Univ, Coll Comp & Informat Sci, Dept Software Engn, Riyadh 11543, Saudi Arabia
关键词
Metaverse; Edge computing; Neural network; Adversarial attack; Denoising;
D O I
10.1016/j.adhoc.2023.103263
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The metaverse, as an impressive technology, can achieve outstanding performance in many fields. With the development of deep neural networks (DNNs), more and more metaverse artificial intelligence (AI) applications are emerging, which have low tolerance for delay. The edge computing based metaverse AI can overcome this problem. However, these AI applications bring new challenges of high reliability, especially DNNs are subject to the security risk of adversarial attacks that generate small and imperceptible noise and cause classifier to make predictions with a high error probability. To meet the reliability requirements of AI applications, in this paper, we propose a security mechanism against adversarial attacks in edge computing based metaverse AI applications. This mechanism utilizes a modified ResNet model that defends against adversarial attacks. We deploy it on the edge cloud to preprocess the data uploaded by metaverse AI applications. In order to achieve a better model performance, we use multiple residual network blocks to build this neural network model on the basis of autoencoder. To assist the model to produce defensively high-quality images, we utilize several convolution layers with various step sizes to process multi-scale images and design to use multiple types of samples with different properties together for the model training. We evaluate our method with experiments on MNIST, CIFAR-10, and CIFAR-100 datasets, and against five attacks such as FGSM and DeepFool attacks. We show that our method achieves 96% defence success rate in MNIST and significantly outperforms existing denoising methods in terms of residual network block, multi-scale image, and training methods.
引用
收藏
页数:8
相关论文
共 28 条
[1]   Compute- and Data-Intensive Networks: The Key to the Metaverse [J].
Cai, Yang ;
Llorca, Jaime ;
Tulino, Antonia M. ;
Molisch, Andreas F. .
2022 1ST INTERNATIONAL CONFERENCE ON 6G NETWORKING (6GNET), 2022,
[2]   Towards Evaluating the Robustness of Neural Networks [J].
Carlini, Nicholas ;
Wagner, David .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :39-57
[3]  
Gu SX, 2015, Arxiv, DOI arXiv:1412.5068
[4]   A privacy protection approach in edge-computing based on maximized dnn partition strategy with energy saving [J].
Guo, Chaopeng ;
Lin, Zhengqing ;
Song, Jie .
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2023, 12 (01)
[5]   Deep Residual Learning for Image Recognition [J].
He, Kaiming ;
Zhang, Xiangyu ;
Ren, Shaoqing ;
Sun, Jian .
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, :770-778
[6]  
Goodfellow IJ, 2015, Arxiv, DOI arXiv:1412.6572
[7]  
Jin GQ, 2019, INT CONF ACOUST SPEE, P3842, DOI [10.1109/icassp.2019.8683044, 10.1109/ICASSP.2019.8683044]
[8]  
Kalaria D, 2022, Arxiv, DOI arXiv:2208.13838
[9]   Edge computing: A survey [J].
Khan, Wazir Zada ;
Ahmed, Ejaz ;
Hakak, Saqib ;
Yaqoob, Ibrar ;
Ahmed, Arif .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 97 :219-235
[10]  
Krizhevsky A., 2009, Cifar-100 dataset