FDA3: Federated Defense Against Adversarial Attacks for Cloud-Based IIoT Applications

被引:43
作者
Song, Yunfei [1 ]
Liu, Tian [1 ]
Wei, Tongquan [1 ]
Wang, Xiangfeng [1 ]
Tao, Zhe [2 ]
Chen, Mingsong [1 ,3 ]
机构
[1] East China Normal Univ, MoE Engn Res Ctr Software Hardware Codesign Techn, Shanghai 200062, Peoples R China
[2] Huawei, Godel Lab, Shanghai 201206, Peoples R China
[3] Tongji Univ, Shanghai Inst Intelligent Sci & Technol, Shanghai 200092, Peoples R China
关键词
Adversarial attack; adversarial training; convolutional neural network robustness; federated defense; industrial Internet of things (IIoT); ROBUSTNESS;
D O I
10.1109/TII.2020.3005969
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Along with the proliferation of artificial intelligence and Internet of things (IoT) techniques, various kinds of adversarial attacks are increasingly emerging to fool deep neural networks (DNNs) used by industrial IoT (IIoT) applications. Due to biased training data or vulnerable underlying models, imperceptible modifications on inputs made by adversarial attacks may result in devastating consequences. Although existing methods are promising in defending such malicious attacks, most of them can only deal with limited existing attack types, which makes the deployment of large-scale IIoT devices a great challenge. To address this problem, in this article, we present an effective federated defense approach named FDA3 that can aggregate defense knowledge against adversarial examples from different sources. Inspired by federated learning, our proposed cloud-based architecture enables the sharing of defense capabilities against different attacks among IIoT devices. Comprehensive experimental results show that the generated DNNs by our approach can not only resist more malicious attacks than existing attack-specific adversarial training methods, but also prevent IIoT applications from new attacks.
引用
收藏
页码:7830 / 7838
页数:9
相关论文
共 32 条
[1]  
Aivodji UM, 2019, IEEE SEC PRIV WORKS, P175, DOI 10.1109/SPW.2019.00041
[2]  
[Anonymous], 2018, EUR C COMP VIS
[3]  
[Anonymous], 2019, P 56 ANN DES AUT C 2
[4]  
Bonawitz Keith, 2019, P MACHINE LEARNING S, P374, DOI 10.48550/arXiv.1902.01046
[5]   Integration of Cloud computing and Internet of Things: A survey [J].
Botta, Alessio ;
de Donato, Walter ;
Persico, Valerio ;
Pescape, Antonio .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 56 :684-700
[6]   Towards Evaluating the Robustness of Neural Networks [J].
Carlini, Nicholas ;
Wagner, David .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :39-57
[7]   Deep learning IoT system for online stroke detection in skull computed tomography images [J].
Dourado, Carlos M. J. M., Jr. ;
da Silva, Suane Pires P. ;
da Nobrega, Raul Victor M. ;
Barros, Antonio Carlos da S. ;
Reboucas Filho, Pedro P. ;
de Albuquerque, Victor Hugo C. .
COMPUTER NETWORKS, 2019, 152 :25-39
[8]   Artificial Intelligence for Detection, Estimation, and Compensation of Malicious Attacks in Nonlinear Cyber-Physical Systems and Industrial IoT [J].
Farivar, Faezeh ;
Haghighi, Mohammad Sayad ;
Jolfaei, Alireza ;
Alazab, Mamoun .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (04) :2716-2725
[9]   Object Classification Using CNN-Based Fusion of Vision and LIDAR in Autonomous Vehicle Environment [J].
Gao, Hongbo ;
Cheng, Bo ;
Wang, Jianqiang ;
Li, Keqiang ;
Zhao, Jianhui ;
Li, Deyi .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (09) :4224-4231
[10]  
Goodfellow I. J., 2014, 3 INT C LEARNING REP