Adversarial Attack and Defense on Deep Learning for Air Transportation Communication Jamming

被引:37
作者
Liu, Mingqian [1 ]
Zhang, Zhenju [1 ]
Chen, Yunfei [2 ]
Ge, Jianhua [1 ]
Zhao, Nan [3 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
[2] Univ Durham, Dept Engn, Durham DH1 3LE, England
[3] Dalian Univ Technol, Sch Informat & Commun Engn, Dalian 116024, Peoples R China
基金
中国国家自然科学基金;
关键词
Jamming; Atmospheric modeling; Wireless communication; Iterative methods; Perturbation methods; Receivers; Deep learning; Adversarial attack; adversarial defense; air transportation; communication jamming recognition; deep learning; EDGE; PRIVACY;
D O I
10.1109/TITS.2023.3262347
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Air transportation communication jamming recognition model based on deep learning (DL) can quickly and accurately identify and classify communication jamming, to improve the safety and reliability of air traffic. However, due to the vulnerability of deep learning, the jamming recognition model can be easily attacked by the attacker's carefully designed adversarial examples. Although some defense methods have been proposed, they have strong pertinence to attacks. Thus, new attack methods are needed to improve the defense performance of the model. In this work, we improve the existing attack methods and propose a double level attack method. By constructing the dynamic iterative step size and analyzing the class characteristics of the signals, this method can use the adversarial losses of feature layer and decision layer to generate adversarial examples with stronger attack performance. In order to improve the robustness of the recognition model, we use adversarial examples to train the model, and transfer the knowledge learned from the model to the jamming recognition models in other wireless communication environments by transfer learning. Simulation results show that the proposed attack and defense methods have good performance.
引用
收藏
页码:973 / 986
页数:14
相关论文
共 33 条
[1]  
Nguyen A, 2015, PROC CVPR IEEE, P427, DOI 10.1109/CVPR.2015.7298640
[2]   Towards Evaluating the Robustness of Neural Networks [J].
Carlini, Nicholas ;
Wagner, David .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :39-57
[3]   Boosting Adversarial Attacks with Momentum [J].
Dong, Yinpeng ;
Liao, Fangzhou ;
Pang, Tianyu ;
Su, Hang ;
Zhu, Jun ;
Hu, Xiaolin ;
Li, Jianguo .
2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2018, :9185-9193
[4]  
Eliardsson P, 2019, EMC EUR, P896, DOI [10.1109/EMCEurope.2019.8872082, 10.1109/emceurope.2019.8872082]
[5]  
Goodfellow IJ, 2015, INT C LEARN REPR ICL
[6]   Adversarial Attacks and Defense in Deep Reinforcement Learning (DRL)-Based Traffic Signal Controllers [J].
Haydari, Ammar ;
Zhang, Michael ;
Chuah, Chen-Nee .
IEEE OPEN JOURNAL OF INTELLIGENT TRANSPORTATION SYSTEMS, 2021, 2 :402-416
[7]   Deep Residual Learning for Image Recognition [J].
He, Kaiming ;
Zhang, Xiangyu ;
Ren, Shaoqing ;
Sun, Jian .
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, :770-778
[8]   Visualizing Deep Learning-Based Radio Modulation Classifier [J].
Huang, Liang ;
Zhang, You ;
Pan, Weijian ;
Chen, Jinyin ;
Qian, Li Ping ;
Wu, Yuan .
IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2021, 7 (01) :47-58
[9]   A Game-Theoretic Learning Approach for Anti-Jamming Dynamic Spectrum Access in Dense Wireless Networks [J].
Jia, Luliang ;
Xu, Yuhua ;
Sun, Youming ;
Feng, Shuo ;
Yu, Long ;
Anpalagan, Alagan .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (02) :1646-1656
[10]   ADMM-Net for Communication Interference Removal in Stepped-Frequency Radar [J].
Johnston, Jeremy ;
Li, Yinchuan ;
Lops, Marco ;
Wang, Xiaodong .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2021, 69 :2818-2832