Adversarial Attacks Against Acoustic Monitoring of Industrial Machines

被引:2
作者
Ntalampiras, Stavros [1 ]
机构
[1] Univ Milan, Dept Comp Sci, I-20133 Milan, Italy
关键词
Monitoring; Valves; Fans; Spectrogram; Acoustics; Pumps; Predictive models; Acoustic monitoring; adversarial machine learning; audio signal processing; convolutional neural network; industrial machine health; DIAGNOSIS; CLASSIFICATION;
D O I
10.1109/JIOT.2022.3194703
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The recent rise of adversarial machine learning exposed the serious vulnerabilities existing in current frameworks depending on the smooth operation of such automated solutions. This article focuses on the critical field of monitoring the health of industrial machines based on the respective acoustic emissions. After building an audio-based monitoring solution using log-Mel spectrograms and convolutional neural networks, we systematically evaluate the applicability of four types of adversarial attacks: 1) fast gradient sign; 2) projected gradient descent; 3) Jacobian saliency map; and 4) Carlini and Wagner $\ell _{\infty }$ . Seeing the problem from the attacker perspective, we designed two different attack types, aiming at inducing either false positives or false negatives. We define three figures of merit specifically designed to assess the performance of each attack type from diverse points of view. The experimental setup relies on a publicly available data set including acoustic emissions representing four industrial machines, i.e., fan, pump, slider rail, and valve.
引用
收藏
页码:2832 / 2839
页数:8
相关论文
共 33 条
  • [1] Towards Evaluating the Robustness of Neural Networks
    Carlini, Nicholas
    Wagner, David
    [J]. 2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 39 - 57
  • [2] Audio Adversarial Examples: Targeted Attacks on Speech-to-Text
    Carlini, Nicholas
    Wagner, David
    [J]. 2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, : 1 - 7
  • [3] Casey M., 2001, Organised Sound, V6, P153, DOI DOI 10.1017/S1355771801002126
  • [4] Data Analytics for Fault Localization in Complex Networks
    Cheng, Maggie X.
    Wu, Wei Biao
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (05): : 701 - 708
  • [5] ADAGIO: Interactive Experimentation with Adversarial Attack and Defense for Audio
    Das, Nilaksh
    Shanbhogue, Madhuri
    Chen, Shang-Tse
    Chen, Li
    Kounavis, Michael E.
    Chau, Duen Horng
    [J]. MACHINE LEARNING AND KNOWLEDGE DISCOVERY IN DATABASES, ECML PKDD 2018, PT III, 2019, 11053 : 677 - 681
  • [6] A Robust Approach for Securing Audio Classification Against Adversarial Attacks
    Esmaeilpour, Mohammad
    Cardinal, Patrick
    Koerich, Alessandro
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 2147 - 2159
  • [7] Fault Feature Selection and Diagnosis of Rolling Bearings Based on EEMD and Optimized Elman_AdaBoost Algorithm
    Fu, Qiang
    Jing, Bo
    He, Pengju
    Si, Shuhao
    Wang, Yun
    [J]. IEEE SENSORS JOURNAL, 2018, 18 (12) : 5024 - 5034
  • [8] Goodfellow I., 2015, P INT C LEARN REPR
  • [9] Adversarial Training in Affective Computing and Sentiment Analysis: Recent Advances and Perspectives
    Han, Jing
    Zhang, Zixing
    Cummins, Nicholas
    Schuller, Bjoern
    [J]. IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE, 2019, 14 (02) : 68 - 81
  • [10] Perceptually Constrained Fast Adversarial Audio Attacks
    Henry, Jason
    Ergezer, Mehmet
    Orescanin, Marko
    [J]. 20TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2021), 2021, : 819 - 824