Communications Aware Adversarial Residual Networks for Over the Air Evasion Attacks

被引:2
作者
Flowers, Bryse [1 ]
Buehrer, R. Michael [1 ]
Headley, William C. [1 ]
机构
[1] Virginia Polytech Inst & State Univ, Bradley Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
来源
MILCOM 2019 - 2019 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM) | 2019年
关键词
RECOGNITION;
D O I
10.1109/milcom47813.2019.9020716
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recent work in adversarial radio frequency machine learning has demonstrated the use of untargeted adversarial machine learning techniques for over the air evasion of raw inphase and quadrature based Automatic Modulation Classification Deep Neural Networks. However, most of the proposed methodologies only consider the effect of adversarial machine learning on the underlying transmission as an evaluation metric or don't consider it at all. Furthermore, all of the proposed techniques require gradient computation for each example in order to craft an adversarial perturbation, which makes deployment of these adversarial methodologies to communications hardware difficult. The current work addresses both of these shortcomings. First, methodology is developed that directly accounts for the bit error rate of the underlying transmission in the adversarial optimization problem. Additionally, the learned model for perturbation creation is encapsulated in a fully convolutional adversarial residual network. Once the parameters of this network are learned, it can be easily deployed. The methodology is found to perform equivalently or better than a comparison adversarial evasion attack using the well known Fast Gradient Sign Method.
引用
收藏
页数:8
相关论文
共 18 条
[1]   Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey [J].
Akhtar, Naveed ;
Mian, Ajmal .
IEEE ACCESS, 2018, 6 :14410-14430
[2]   On the Limitations of Targeted Adversarial Evasion Attacks Against Deep Learning Enabled Modulation Recognition [J].
Bair, Samuel ;
DelVecchio, Matthew ;
Flowers, Bryse ;
Michaels, Alan J. ;
Headley, William C. .
PROCEEDINGS OF THE 2019 ACM WORKSHOP ON WIRELESS SECURITY AND MACHINE LEARNING (WISEML '19), 2019, :25-30
[3]  
Baluja S, 2018, AAAI CONF ARTIF INTE, P2687
[4]   Survey of automatic modulation classification techniques: classical approaches and new trends [J].
Dobre, O. A. ;
Abdi, A. ;
Bar-Ness, Y. ;
Su, W. .
IET COMMUNICATIONS, 2007, 1 (02) :137-156
[5]   Boosting Adversarial Attacks with Momentum [J].
Dong, Yinpeng ;
Liao, Fangzhou ;
Pang, Tianyu ;
Su, Hang ;
Zhu, Jun ;
Hu, Xiaolin ;
Li, Jianguo .
2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2018, :9185-9193
[6]  
Flowers B., 2019, IEEE T INF FOREN SEC, P1
[7]  
Goodfellow I J, 2015, P INT C LEARN REPR I
[8]  
Hameed M. Z., 2019, ARXIV190210674
[9]  
Hauser SC, 2017, IEEE MILIT COMMUN C, P121, DOI 10.1109/MILCOM.2017.8170853
[10]  
He K., 2016, CVPR, DOI [10.1109/CVPR.2016.90, DOI 10.1109/CVPR.2016.90]