DeSVig: Decentralized Swift Vigilance Against Adversarial Attacks in Industrial Artificial Intelligence Systems

被引:46
作者
Li, Gaolei [1 ,2 ,3 ]
Ota, Kaoru [3 ]
Dong, Mianxiong [3 ]
Wu, Jun [1 ,2 ]
Li, Jianhua [1 ,2 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Cyber Secur, Shanghai 200240, Peoples R China
[2] Shanghai Jiao Tong Univ, Shanghai Key Lab Integrated Adm Technol Informat, Shanghai 200240, Peoples R China
[3] Muroran Inst Technol, Muroran, Hokkaido 0508585, Japan
基金
中国国家自然科学基金;
关键词
Deep learning; Computational modeling; Edge computing; Data models; Informatics; Robustness; 5G mobile communication; Adversarial examples; deep learning; generative adversarial networks (GAN); industrial artificial intelligence systems (IAISs); mobile edge computing; TACTILE INTERNET; EDGE; NETWORKING; MECHANISM;
D O I
10.1109/TII.2019.2951766
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Individually reinforcing the robustness of a single deep learning model only gives limited security guarantees especially when facing adversarial examples. In this article, we propose DeSVig, a decentralized swift vigilance framework to identify adversarial attacks in an industrial artificial intelligence systems (IAISs), which enables IAISs to correct the mistake in a few seconds. The DeSVig is highly decentralized, which improves the effectiveness of recognizing abnormal inputs. We try to overcome the challenges on ultralow latency caused by dynamics in industries using peculiarly designated mobile edge computing and generative adversarial networks. The most important advantage of our work is that it can significantly reduce the failure risks of being deceived by adversarial examples, which is critical for safety-prioritized and delay-sensitive environments. In our experiments, adversarial examples of industrial electronic components are generated by several classical attacking models. Experimental results demonstrate that the DeSVig is more robust, efficient, and scalable than some state-of-art defenses.
引用
收藏
页码:3267 / 3277
页数:11
相关论文
共 42 条
[1]   Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey [J].
Akhtar, Naveed ;
Mian, Ajmal .
IEEE ACCESS, 2018, 6 :14410-14430
[2]  
[Anonymous], 2019, AAAI C ART INT AAAI
[3]  
[Anonymous], P IEEE ACM INT C COM
[4]  
[Anonymous], ARXIV180701069
[5]  
[Anonymous], 2014, P ICLR, DOI DOI 10.1021/CT2009208
[6]  
[Anonymous], P INT C LEARN REPR
[7]  
[Anonymous], ARXIV181108484
[8]  
[Anonymous], IEEE NETW
[9]  
Athalye A, 2018, PR MACH LEARN RES, V80
[10]   Perceptual hash-based feature description for person re-identification [J].
Fang, Wen ;
Hu, Hai-Miao ;
Hu, Zihao ;
Liao, Shengcai ;
Li, Bo .
NEUROCOMPUTING, 2018, 272 :520-531