通信学报 ›› 2024, Vol. 45 ›› Issue (1): 180-193.doi: 10.11959/j.issn.1000-436x.2024021
• 学术论文 • 上一篇
张剑, 周侠, 张一然, 王梓聪
修回日期:
2023-10-24
出版日期:
2024-01-01
发布日期:
2024-01-01
作者简介:
张剑(1979- ),男,湖北宜昌人,博士,武汉数字工程研究所博士生导师、研究员,主要研究方向为人工智能、作战指挥基金资助:
Jian ZHANG, Xia ZHOU, Yiran ZHANG, Zicong WANG
Revised:
2023-10-24
Online:
2024-01-01
Published:
2024-01-01
Supported by:
摘要:
为了生成高质量的电磁信号对抗样本,提出了快速雅可比显著图攻击(FJSMA)方法。FJSMA 通过计算攻击目标类别的雅可比矩阵,并根据该矩阵生成特征显著图,之后迭代选取显著性最强的特征点及其邻域内连续特征点添加扰动,同时引入单点扰动限制,最后生成对抗样本。实验结果表明,与雅可比显著图攻击方法相比, FJSMA在保持与之相同的高攻击成功率的同时,生成速度提升了约10倍,相似度提升了超过11%;与其他基于梯度的方法相比,攻击成功率提升了超过20%,相似度提升了20%~30%。
中图分类号:
张剑, 周侠, 张一然, 王梓聪. 基于雅可比显著图的电磁信号快速对抗攻击方法[J]. 通信学报, 2024, 45(1): 180-193.
Jian ZHANG, Xia ZHOU, Yiran ZHANG, Zicong WANG. Electromagnetic signal fast adversarial attack method based on Jacobian saliency map[J]. Journal on Communications, 2024, 45(1): 180-193.
表1
ResNet模型受攻击结果"
攻击方法 | ASR | ACAC | ACTC | ATS/s | SSIM | L0 | L2 | L∞ |
JSMA | 97.76% | 76.33% | 0.003% | 611.22 | 80.79% | 3.61% | 0.11 | 3.08 |
DI-FGSM | 84.75% | 65.71% | 7.331% | 0.58 | 53.66% | 75.00% | 0.68 | 2.26 |
PGD | 72.58% | 53.82% | 4.884% | 0.63 | 67.39% | 93.84% | 0.45 | 2.18 |
FJSMA(ε=0.2) | 96.91% | 66.96% | 0.097% | 78.44 | 93.93% | 26.81% | 0.09 | 0.19 |
FJSMA(ε=0.4) | 97.33% | 69.27% | 0.051% | 63.18 | 92.92% | 18.94% | 0.12 | 0.39 |
FJSMA(ε=0.6) | 97.64% | 74.85% | 0.013% | 50.21 | 90.25% | 15.64% | 0.18 | 0.56 |
FJSMA(AVG) | 97.29% | 70.51% | 0.054% | 63.94 | 92.37% | 20.46% | 0.13 | 0.38 |
MA-NA-FGSM | 95.20% | 72.33% | 1.94% | 1.76 | 76.8% | 87.21% | 0.49 | 1.04 |
Grad-CAM | 80.91% | 65.26% | 4.791% | 11.46 | 85.41% | 24.33% | 0.31 | 1.74 |
表2
CNN模型受攻击结果"
攻击方法 | ASR | ACAC | ACTC | ATS/s | SSIM | L0 | L2 | L∞ |
JSMA | 97.12% | 73.03% | 0.128% | 432.08 | 76.48% | 8.07% | 0.13 | 3.11 |
DI-FGSM | 83.88% | 66.81% | 2.146% | 0.42 | 56.71% | 88.96% | 0.73 | 2.69 |
PGD | 74.12% | 49.85% | 17.251% | 0.36 | 65.46% | 100.00% | 0.65 | 2.13 |
FJSMA(ε=0.2) | 94.55% | 64.91% | 0.107% | 46.38 | 92.38% | 28.26% | 0.11 | 0.18 |
FJSMA(ε=0.4) | 95.48% | 70.33% | 0.081% | 41.25 | 90.31% | 18.93% | 0.16 | 0.37 |
FJSMA(ε=0.6) | 96.35% | 75.82% | 0.034% | 33.89 | 87.90% | 10.58% | 0.21 | 0.58 |
FJSMA(AVG) | 95.46% | 70.35% | 0.074% | 40.51 | 90.20% | 19.26% | 0.16 | 0.38 |
MA-NA-FGSM | 94.36% | 73.21% | 1.88% | 1.55 | 77.31% | 88.90% | 0.53 | 1.13 |
Grad-CAM | 81.42% | 66.34% | 4.63% | 10.98 | 86.37% | 25.61% | 0.29 | 1.58 |
表3
MCLDNN模型受攻击结果"
攻击方法 | ASR | ACAC | ACTC | ATS/s | SSIM | L0 | L2 | L∞ |
JSMA | 97.33% | 74.83% | 0.038% | 488.36 | 78.23% | 6.59% | 0.13 | 2.79 |
DI-FGSM | 83.97% | 62.18% | 6.012% | 0.56 | 54.62% | 87.89% | 0.77 | 2.12 |
PGD | 71.44% | 52.91% | 7.297% | 0.73 | 64.93% | 92.47% | 0.61 | 2.36 |
FJSMA(ε=0.2) | 96.35% | 67.48% | 0.307% | 53.93 | 91.87% | 27.33% | 0.13 | 0.19 |
FJSMA(ε=0.4) | 96.12% | 70.35% | 0.196% | 47.29 | 88.69% | 19.26% | 0.19 | 0.38 |
FJSMA(ε=0.6) | 97.24% | 73.67% | 0.103% | 40.66 | 86.31% | 13.95% | 0.25 | 0.53 |
FJSMA(AVG) | 96.57% | 69.55% | 0.202% | 47.29 | 88.96% | 20.18% | 0.19 | 0.37 |
MA-NA-FGSM | 94.97% | 72.95% | 1.76% | 1.58 | 74.29% | 87.13% | 0.47 | 0.98 |
Grad-CAM | 80.57% | 64.47% | 5.81% | 11.23 | 85.92% | 25.82% | 0.34 | 2.01 |
[1] | O’SHEA T J , CORGAN J , CLANCY T C . Convolutional radio modulation recognition networks[C]// Proceedings of International Conference on Engineering Applications of Neural Networks. Berlin:Springer, 2016: 213-226. |
[2] | O’SHEA T J , ROY T , CLANCY T C . Over-the-air deep learning based radio signal classification[J]. IEEE Journal of Selected Topics in Signal Processing, 2018,12(1): 168-179. |
[3] | LIU K , XIANG X , LIANG Y ,et al. Automatic modulation recognition through wireless sensor networks in aeronautical wireless channel[J]. IEEE Sensors Journal, 2021,21(20): 23125-23132. |
[4] | 林心桐, 张琳, 吴志强 ,等. 基于卷积神经网络与循环谱图的调制识别方法[J]. 太赫兹科学与电子信息学报, 2021,19(4): 617-622. |
LIN X T , ZHANG L , WU Z Q ,et al. Modulation recognition method based on convolutional neural network and cyclic spectrum images[J]. Journal of Terahertz Science and Electronic Information Technology, 2021,19(4): 617-622. | |
[5] | JDID B , HASSAN K , DAYOUB I ,et al. Machine learning based automatic modulation recognition for wireless communications:a comprehensive survey[J]. IEEE Access, 2021,9: 57851-57873. |
[6] | LUAN S Y , GAO Y R , ZHOU J C ,et al. Automatic modulation classification based on cauchy-score constellation and lightweight network under impulsive noise[J]. IEEE Wireless Communications Letters, 2021,10(11): 2509-2513. |
[7] | SZEGEDY C , ZAREMBA W , SUTSKEVER I ,et al. Intriguing properties of neural networks[C]// Proceedings of 2nd International Conference on Learning Representations. Piscataway:IEEE Press, 2014: 1-10. |
[8] | TRAMèR F , KURAKIN A , PAPERNOT N ,et al. Ensemble adversarial training:attacks and defenses[J]. arXiv Preprint,arXiv:1705.07204, 2017. |
[9] | 钱亚冠, 张锡敏, 王滨 ,等. 基于二阶对抗样本的对抗训练防御[J]. 电子与信息学报, 2021,43(11): 3367-3373. |
QIAN Y G , ZHANG X M , WANG B ,et al. Adversarial training defense based on second-order adversarial examples[J]. Journal of Electronics & Information Technology, 2021,43(11): 3367-3373. | |
[10] | GOODFELLOW I J , SHLENS J , SZEGEDY C . Explaining and harnessing adversarial examples[C]// Proceedings of 3rd International Conference on Learning Representations. Piscataway:IEEE Press, 2015: 1-11. |
[11] | KURAKIN A , GOODFELLOW I , BENGIO S . Adversarial examples in the physical world[C]// Proceedings of 4th International Conference on Learning Representations(ICLR) . Piscataway:IEEE Press, 2016: 1-14. |
[12] | DONG Y P , LIAO F Z , PANG T Y ,et al. Boosting adversarial attacks with momentum[C]// Proceedings of the 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition. Piscataway:IEEE Press, 2018: 9185-9193. |
[13] | XIE C H , ZHANG Z S , ZHOU Y Y ,et al. Improving transferability of adversarial examples with input diversity[C]// Proceedings of the 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). Piscataway:IEEE Press, 2019: 2725-2734. |
[14] | DING Y , ZHU G Q , CHEN D J ,et al. Adversarial sample attack and defense method for encrypted traffic data[J]. IEEE Transactions on Intelligent Transportation Systems, 2022,23(10): 18024-18039. |
[15] | PAPERNOT N , MCDANIEL P , JHA S ,et al. The limitations of deep learning in adversarial settings[C]// Proceedings of the 2016 IEEE European Symposium on Security and Privacy (EuroS&P). Piscataway:IEEE Press, 2016: 372-387. |
[16] | COMBEY T , LOISON A , FAUCHER M ,et al. Probabilistic jacobian-based saliency maps attacks[J]. Machine Learning and Knowledge Extraction, 2020,2(4): 558-578. |
[17] | 黄知涛, 柯达, 王翔 . 电磁信号对抗样本攻击与防御发展研究[J]. 信息对抗技术, 2023,2(S1): 37-52. |
HUANG Z T , KE D , WANG X . Research on the development of electromagnetic signal against sample attack and defense[J]. Information Countermeasure Technology, 2023,2(S1): 37-52. | |
[18] | KIM B , SAGDUYU Y , ERPEK T ,et al. Adversarial attacks on deep learning based mmWave beam prediction in 5G and beyond[C]// Proceedings of the 2021 IEEE Statistical Signal Processing Workshop (SSP). Piscataway:IEEE Press, 2021: 590-594. |
[19] | KIM B , SAGDUYU Y E , ERPEK T ,et al. Channel effects on surrogate models of adversarial attacks against wireless signal classifiers[C]// Proceedings of the IEEE International Conference on Communications. Piscataway:IEEE Press, 2021: 1-6. |
[20] | 王满喜, 史明佳, 陆科宇 ,等. 电磁信号调制识别中的对抗性攻击技术研究[J]. 无线电通信技术, 2022,48(6): 1098-1104. |
WANG M X , SHI M J , LU K Y ,et al. Research on adversarial attacks technology in modulation recognition[J]. Radio Communications Technology, 2022,48(6): 1098-1104. | |
[21] | SADEGHI M , LARSSON E G . Adversarial attacks on deep-learning based radio signal classification[J]. IEEE Wireless Communications Letters, 2019,8(1): 213-216. |
[22] | FLOWERS B , BUEHRER R M , HEADLEY W C . Evaluating adversarial evasion attacks in the context of wireless communications[J]. IEEE Transactions on Information Forensics and Security, 2019,15: 1102-1113. |
[23] | ZHAO H J , LIN Y , GAO S ,et al. Evaluating and improving adversarial attacks on DNN-based modulation recognition[C]// Proceedings of the IEEE Global Communications Conference. Piscataway:IEEE Press, 2020: 1-5. |
[24] | 王超, 魏祥麟, 田青 ,等. 基于特征梯度的调制识别深度网络对抗攻击方法[J]. 计算机科学, 2021,48(7): 25-32. |
WANG C , WEI X L , TIAN Q ,et al. Feature gradient-based adversarial attack on modulation recognition-oriented deep neural networks[J]. Computer Science, 2021,48(7): 25-32. | |
[25] | MADRY A , MAKELOV A , SCHMIDT L ,et al. Towards deep learning models resistant to adversarial attacks[C]// Proceedings of 6th International Conference on Learning Representations. Piscataway:IEEE Press, 2018: 1-28. |
[26] | 周侠, 张一然, 张剑 . 基于Grad-CAM的电磁信号对抗攻击方法[J]. 舰船电子工程, 2023,43(6): 204-208. |
ZHOU X , ZHANG Y R , ZHANG J . Adversarial attack algorithm for electromagnetic signal based on Grad-CAM[J]. Ship Electronic Engineering, 2023,43(6): 204-208. | |
[27] | 李哲铭, 王晋东, 侯建中 ,等. 基于显著区域优化的对抗样本攻击方法[J]. 计算机工程, 2023,49(9): 246-255,264. |
LI Z M , WANG J D , HOU J Z ,et al. Adversarial example attack method based on salient region optimization[J]. Computer Engineering, 2023,49(9): 246-255,264. | |
[28] | XU J L , LUO C B , PARR G ,et al. A spatiotemporal multi-channel learning framework for automatic modulation recognition[J]. IEEE Wireless Communications Letters, 2020,9(10): 1629-1632. |
[1] | 陈晓霖, 昝道广, 吴炳潮, 关贝, 王永吉. 面向纵向联邦学习的对抗样本生成算法[J]. 通信学报, 2023, 44(8): 1-13. |
[2] | 张佳乐, 朱诚诚, 孙小兵, 陈兵. 基于GAN的联邦学习成员推理攻击与防御方法[J]. 通信学报, 2023, 44(5): 193-205. |
[3] | 林云, 徐怀韬, 王森, 张思成, 庄龙. 基于特征融合的通信语音干扰效果客观评估[J]. 通信学报, 2023, 44(3): 105-116. |
[4] | 袁程胜, 郭强, 付章杰. 基于差分隐私的深度伪造指纹检测模型版权保护算法[J]. 通信学报, 2022, 43(9): 181-193. |
[5] | 彭长根, 高婷, 刘惠篮, 丁红发. 面向机器学习模型的基于PCA的成员推理攻击[J]. 通信学报, 2022, 43(1): 149-160. |
[6] | 熊金波, 周永洁, 毕仁万, 万良, 田有亮. 边缘协同的轻量级隐私保护分类框架[J]. 通信学报, 2022, 43(1): 127-137. |
[7] | 王哲, 李陶深, 葛丽娜, 张桂芬, 吴敏. 基于深度学习的传感云sink节点最优能效SWIPT波束成形设计[J]. 通信学报, 2021, 42(7): 176-188. |
[8] | 傅友华, 陈栋. 混合智能反射表面结构辅助的毫米波通信信道估计[J]. 通信学报, 2021, 42(10): 189-196. |
[9] | 胡永进,郭渊博,马骏,张晗,毛秀青. 基于对抗样本的网络欺骗流量生成方法[J]. 通信学报, 2020, 41(9): 59-70. |
[10] | 吴伟华,柴冠华,杨清海,刘润滋. 面向不确定CSI随机接入网络的深度稳健资源分配[J]. 通信学报, 2020, 41(7): 29-37. |
[11] | 张思成,林云,涂涯,ShiwenMao. 基于轻量级深度神经网络的电磁信号调制识别技术[J]. 通信学报, 2020, 41(11): 12-21. |
[12] | 谭晶磊,张恒巍,张红旗,金辉,雷程. 基于Markov时间博弈的移动目标防御最优策略选取方法[J]. 通信学报, 2020, 41(1): 42-52. |
[13] | 桂冠,王禹,黄浩. 基于深度学习的物理层无线通信技术:机遇与挑战[J]. 通信学报, 2019, 40(2): 19-23. |
[14] | 胡铮,袁浩,朱新宁,倪万里. 面向5G需求的人群流量预测模型研究[J]. 通信学报, 2019, 40(2): 1-10. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|