DeSVig: Decentralized Swift Vigilance Against Adversarial Attacks in Industrial Artificial Intelligence Systems

被引:46
作者
Li, Gaolei [1 ,2 ,3 ]
Ota, Kaoru [3 ]
Dong, Mianxiong [3 ]
Wu, Jun [1 ,2 ]
Li, Jianhua [1 ,2 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Cyber Secur, Shanghai 200240, Peoples R China
[2] Shanghai Jiao Tong Univ, Shanghai Key Lab Integrated Adm Technol Informat, Shanghai 200240, Peoples R China
[3] Muroran Inst Technol, Muroran, Hokkaido 0508585, Japan
基金
中国国家自然科学基金;
关键词
Deep learning; Computational modeling; Edge computing; Data models; Informatics; Robustness; 5G mobile communication; Adversarial examples; deep learning; generative adversarial networks (GAN); industrial artificial intelligence systems (IAISs); mobile edge computing; TACTILE INTERNET; EDGE; NETWORKING; MECHANISM;
D O I
10.1109/TII.2019.2951766
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Individually reinforcing the robustness of a single deep learning model only gives limited security guarantees especially when facing adversarial examples. In this article, we propose DeSVig, a decentralized swift vigilance framework to identify adversarial attacks in an industrial artificial intelligence systems (IAISs), which enables IAISs to correct the mistake in a few seconds. The DeSVig is highly decentralized, which improves the effectiveness of recognizing abnormal inputs. We try to overcome the challenges on ultralow latency caused by dynamics in industries using peculiarly designated mobile edge computing and generative adversarial networks. The most important advantage of our work is that it can significantly reduce the failure risks of being deceived by adversarial examples, which is critical for safety-prioritized and delay-sensitive environments. In our experiments, adversarial examples of industrial electronic components are generated by several classical attacking models. Experimental results demonstrate that the DeSVig is more robust, efficient, and scalable than some state-of-art defenses.
引用
收藏
页码:3267 / 3277
页数:11
相关论文
共 42 条
[31]  
Song S., 2018, ARXIV180801785
[32]  
Temizel A., 2018, ARXIV180310418
[33]   Deep learning for smart manufacturing: Methods and applications [J].
Wang, Jinjiang ;
Ma, Yulin ;
Zhang, Laibin ;
Gao, Robert X. ;
Wu, Dazhong .
JOURNAL OF MANUFACTURING SYSTEMS, 2018, 48 :144-156
[34]   FCSS: Fog-Computing-based Content-Aware Filtering for Security Services in Information-Centric Social Networks [J].
Wu, Jun ;
Dong, Mianxiong ;
Ota, Kaoru ;
Li, Jianhua ;
Guan, Zhitao .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2019, 7 (04) :553-564
[35]   Reducing Latency in Virtual Machines: Enabling Tactile Internet for Human-Machine Co-Working [J].
Xiang, Zuo ;
Gabriel, Frank ;
Urbano, Elena ;
Nguyen, Giang T. ;
Reisslein, Martin ;
Fitzek, Frank H. P. .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2019, 37 (05) :1098-1116
[36]   Energy Efficient Hybrid Edge Caching Scheme for Tactile Internet in 5G [J].
Xu, Jianwen ;
Ota, Kaoru ;
Dong, Mianxiong .
IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2019, 3 (02) :483-493
[37]   Federated Machine Learning: Concept and Applications [J].
Yang, Qiang ;
Liu, Yang ;
Chen, Tianjian ;
Tong, Yongxin .
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2019, 10 (02)
[38]  
Ye HL, 2018, ADV SOC SCI EDUC HUM, V151, P1
[39]   Adversarial Examples: Attacks and Defenses for Deep Learning [J].
Yu, Xiaoyong ;
He, Pan ;
Zhu, Qile ;
Li, Xiaolin .
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2019, 30 (09) :2805-2824
[40]  
Zantedeschi V, 2017, PROCEEDINGS OF THE 10TH ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, AISEC 2017, P39, DOI 10.1145/3128572.3140449