Detection Tolerant Black-Box Adversarial Attack Against Automatic Modulation Classification With Deep Learning

被引:21
作者
Qi, Peihan [1 ]
Jiang, Tao [2 ]
Wang, Lizhan [3 ]
Yuan, Xu [4 ]
Li, Zan [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[3] Xidian Univ, Guangzhou Inst Technol, Guangzhou 510555, Peoples R China
[4] Univ Louisiana Lafayette, Sch Comp & Informat, Lafayette, LA 70504 USA
基金
中国国家自然科学基金;
关键词
Computational modeling; Modulation; Data models; Perturbation methods; Training; Security; Reliability; Adversarial examples; automatic modulation classification (AMC); black-box attack; deep learning (DL);
D O I
10.1109/TR.2022.3161138
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Advances in adversarial attack and defense technologies will enhance the reliability of deep learning (DL) systems spirally. Most existing adversarial attack methods make overly ideal assumptions, which creates the illusion that the DL system can be attacked simply and has restricted the further improvement on DL systems. To perform practical adversarial attacks, a detection tolerant black-box adversarial-attack (DTBA) method against DL-based automatic modulation classification (AMC) is presented in this article. In the DTBA method, the local DL model as a substitution of the remote target DL model is trained first. The training dataset is generated by an attacker, labeled by the target model, and augmented by Jacobian transformation. Then, the conventional gradient attack method is utilized to generate adversarial attack examples toward the local DL model. Moreover, before launching attack to the target model, the local model estimates the misclassification probability of the perturbed examples in advance and deletes those invalid adversarial examples. Compared with related attack methods of different criteria on public datasets, the DTBA method can reduce the attack cost while increasing the rate of successful attack. Adversarial attack transferability of the proposed method on the target model has increased by more than 20%. The DTBA method will be suitable for launching flexible and effective black-box adversarial attacks against DL-based AMC systems.
引用
收藏
页码:674 / 686
页数:13
相关论文
共 50 条
  • [21] Black-Box Audio Adversarial Attack Using Particle Swarm Optimization
    Mun, Hyunjun
    Seo, Sunggwan
    Son, Baehoon
    Yun, Joobeom
    IEEE ACCESS, 2022, 10 : 23532 - 23544
  • [22] A CMA-ES-Based Adversarial Attack Against Black-Box Object Detectors
    Lyu Haoran
    Tan Yu'an
    Xue Yuan
    Wang Yajie
    Xue Jingfeng
    CHINESE JOURNAL OF ELECTRONICS, 2021, 30 (03) : 406 - 412
  • [23] A CMA-ES-Based Adversarial Attack on Black-Box Deep Neural Networks
    Kuang, Xiaohui
    Liu, Hongyi
    Wang, Ye
    Zhang, Qikun
    Zhang, Quanxin
    Zheng, Jun
    IEEE ACCESS, 2019, 7 : 172938 - 172947
  • [24] Perception-Driven Imperceptible Adversarial Attack Against Decision-Based Black-Box Models
    Zhang, Shenyi
    Zheng, Baolin
    Jiang, Peipei
    Zhao, Lingchen
    Shen, Chao
    Wang, Qian
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 3164 - 3177
  • [25] A black-box adversarial attack strategy with adjustable sparsity and generalizability for deep image classifiers
    Ghosh, Arka
    Mullick, Sankha Subhra
    Datta, Shounak
    Das, Swagatam
    Das, Asit Kr
    Mallipeddi, Rammohan
    PATTERN RECOGNITION, 2022, 122
  • [26] Rearranging Pixels is a Powerful Black-Box Attack for RGB and Infrared Deep Learning Models
    Pomponi, Jary
    Dantoni, Daniele
    Alessandro, Nicolosi
    Scardapane, Simone
    IEEE ACCESS, 2023, 11 : 11298 - 11306
  • [27] Cube-Evo: A Query-Efficient Black-Box Attack on Video Classification System
    Zhan, Yu
    Fu, Ying
    Huang, Liang
    Guo, Jianmin
    Shi, Heyuan
    Song, Houbing
    Hu, Chao
    IEEE TRANSACTIONS ON RELIABILITY, 2024, 73 (02) : 1160 - 1171
  • [28] HYBRID ADVERSARIAL SAMPLE CRAFTING FOR BLACK-BOX EVASION ATTACK
    Zheng, Juan
    He, Zhimin
    Lin, Zhe
    2017 INTERNATIONAL CONFERENCE ON WAVELET ANALYSIS AND PATTERN RECOGNITION (ICWAPR), 2017, : 236 - 242
  • [29] SSQLi: A Black-Box Adversarial Attack Method for SQL Injection Based on Reinforcement Learning
    Guan, Yuting
    He, Junjiang
    Li, Tao
    Zhao, Hui
    Ma, Baoqiang
    FUTURE INTERNET, 2023, 15 (04):
  • [30] Black-box Adversarial Attack on License Plate Recognition System
    Chen J.-Y.
    Shen S.-J.
    Su M.-M.
    Zheng H.-B.
    Xiong H.
    Zidonghua Xuebao/Acta Automatica Sinica, 2021, 47 (01): : 121 - 135