FDA3: Federated Defense Against Adversarial Attacks for Cloud-Based IIoT Applications

被引:43
作者
Song, Yunfei [1 ]
Liu, Tian [1 ]
Wei, Tongquan [1 ]
Wang, Xiangfeng [1 ]
Tao, Zhe [2 ]
Chen, Mingsong [1 ,3 ]
机构
[1] East China Normal Univ, MoE Engn Res Ctr Software Hardware Codesign Techn, Shanghai 200062, Peoples R China
[2] Huawei, Godel Lab, Shanghai 201206, Peoples R China
[3] Tongji Univ, Shanghai Inst Intelligent Sci & Technol, Shanghai 200092, Peoples R China
关键词
Adversarial attack; adversarial training; convolutional neural network robustness; federated defense; industrial Internet of things (IIoT); ROBUSTNESS;
D O I
10.1109/TII.2020.3005969
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Along with the proliferation of artificial intelligence and Internet of things (IoT) techniques, various kinds of adversarial attacks are increasingly emerging to fool deep neural networks (DNNs) used by industrial IoT (IIoT) applications. Due to biased training data or vulnerable underlying models, imperceptible modifications on inputs made by adversarial attacks may result in devastating consequences. Although existing methods are promising in defending such malicious attacks, most of them can only deal with limited existing attack types, which makes the deployment of large-scale IIoT devices a great challenge. To address this problem, in this article, we present an effective federated defense approach named FDA3 that can aggregate defense knowledge against adversarial examples from different sources. Inspired by federated learning, our proposed cloud-based architecture enables the sharing of defense capabilities against different attacks among IIoT devices. Comprehensive experimental results show that the generated DNNs by our approach can not only resist more malicious attacks than existing attack-specific adversarial training methods, but also prevent IIoT applications from new attacks.
引用
收藏
页码:7830 / 7838
页数:9
相关论文
共 32 条
[11]  
Guo C., 2019, INT C MACHINE LEARNI, P2484
[12]   PuVAE: A Variational Autoencoder to Purify Adversarial Examples [J].
Hwang, Uiwon ;
Park, Jaewoo ;
Jang, Hyemi ;
Yoon, Sungroh ;
Cho, Nam Ik .
IEEE ACCESS, 2019, 7 :126582-126593
[13]  
King DB, 2015, ACS SYM SER, V1214, P1, DOI 10.1021/bk-2015-1214.ch001
[14]  
Konecny J., 2016, ARXIV161005492V2
[15]  
Krizhevsky A., 2016, ARXIV161005492
[16]  
Kurakin Alexey, 2017, 5 INT C LEARNING REP, DOI DOI 10.1201/9781351251389-8
[17]   Gradient-based learning applied to document recognition [J].
Lecun, Y ;
Bottou, L ;
Bengio, Y ;
Haffner, P .
PROCEEDINGS OF THE IEEE, 1998, 86 (11) :2278-2324
[18]  
LeCun Yann, The MNIST database of handwritten digits
[19]   Deep Convolutional Computation Model for Feature Learning on Big Data in Internet of Things [J].
Li, Peng ;
Chen, Zhikui ;
Yang, Laurence Tianruo ;
Zhang, Qingchen ;
Deen, M. Jamal .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (02) :790-798
[20]   DeepGauge: Multi-Granularity Testing Criteria for Deep Learning Systems [J].
Ma, Lei ;
Juefei-Xu, Felix ;
Zhang, Fuyuan ;
Sun, Jiyuan ;
Xue, Minhui ;
Li, Bo ;
Chen, Chunyang ;
Su, Ting ;
Li, Li ;
Liu, Yang ;
Zhao, Jianjun ;
Wang, Yadong .
PROCEEDINGS OF THE 2018 33RD IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMTED SOFTWARE ENGINEERING (ASE' 18), 2018, :120-131