An interpretability security framework for intelligent decision support systems based on saliency map

被引:2
作者
Zhang, Denghui [1 ]
Gu, Zhaoquan [2 ,3 ]
Ren, Lijing [1 ,2 ]
Shafiq, Muhammad [1 ]
机构
[1] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou 510000, Peoples R China
[2] Peng Cheng Lab, Dept New Networks, Shenzhen 518055, Peoples R China
[3] Harbin Inst Technol, Dept Comp Sci & Technol, Shenzhen 518055, Peoples R China
关键词
Decision support systems; AI security; Interpretability; Saliency map;
D O I
10.1007/s10207-023-00689-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Benefiting from the high-speed transmission and super-low latency, the Fifth Generation (5G) networks are playing an important role in contemporary society. The accessibility and friendly experience provided by 5G results in the generation of massive data, which are recklessly transmitted in various forms and in turn, promote the development of big data and intelligent decision support systems (DSS). Although AI (Artificial Intelligence) can boost DSS to obtain high recognition performance on large-scale data, an adversarial sample generated by deliberately adding subtle noise to a clear sample will cause AI models to give false output with high confidence, which increases concerns about AI. It is necessary to enhance its interpretability and security when adopting AI in areas where decision-making is crucial. In this paper, we study the challenges posed by the next-generation DSS in the era of 5G and big data. To build trust in AI, the saliency map is adopted as a visualization method to reveal the vulnerability of neural networks. The visualization method is further taken to identify imperceptible adversarial samples and reasons for the misclassification of high-accuracy models. Finally, we conduct extensive experiments on large-scale datasets to verify the effectiveness of the visualization method in enhancing AI security for 5G-enabled DSS.
引用
收藏
页码:1249 / 1260
页数:12
相关论文
共 45 条
[1]   Emerging IoT Applications in Sustainable Smart Cities for COVID-19: Network Security and Data Preservation Challenges with Future Directions [J].
Adil, Muhammad ;
Khan, Muhammad Khurram .
SUSTAINABLE CITIES AND SOCIETY, 2021, 75 (75)
[2]   Security for 5G and Beyond [J].
Ahmad, Ijaz ;
Shahabuddin, Shahriar ;
Kumar, Tanesh ;
Okwuibe, Jude ;
Gurtov, Andrei ;
Ylianttila, Mika .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04) :3682-3722
[3]   Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey [J].
Akhtar, Naveed ;
Mian, Ajmal .
IEEE ACCESS, 2018, 6 :14410-14430
[4]   Towards Evaluating the Robustness of Neural Networks [J].
Carlini, Nicholas ;
Wagner, David .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :39-57
[5]   Probabilistic Jacobian-Based Saliency Maps Attacks [J].
Combey, Theo ;
Loison, Antonio ;
Faucher, Maxime ;
Hajri, Hatem .
MACHINE LEARNING AND KNOWLEDGE EXTRACTION, 2020, 2 (04) :558-578
[6]   A Survey of Deep Learning and Its Applications: A New Paradigm to Machine Learning [J].
Dargan, Shaveta ;
Kumar, Munish ;
Ayyagari, Maruthi Rohit ;
Kumar, Gulshan .
ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING, 2020, 27 (04) :1071-1092
[7]  
Dash A., 2021, ARXIV
[8]  
Dosilovic FK, 2018, 2018 41ST INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), P210, DOI 10.23919/MIPRO.2018.8400040
[9]  
Duan R, 2021, ADVERSARIAL LASER BE
[10]   Emerging Technologies for 5G-IoV Networks: Applications, Trends and Opportunities [J].
Duan, Wei ;
Gu, Jinyuan ;
Wen, Miaowen ;
Zhang, Guoan ;
Ji, Yancheng ;
Mumtaz, Shahid .
IEEE NETWORK, 2020, 34 (05) :283-289