The technology of adversarial attacks in signal recognition

Abstract The wide application of contour stellar images has helped researchers transform signal classification problems into image classification problems to solve signal recognition based on deep learning. However, deep neural networks (DNN) are quite vulnerable to adversarial examples, thus simply evaluating the adversarial attack performance on the signal sequence recognition model cannot meet the current security requirements. From the perspective of an attacker, this study converts individual signals into stellar contour images, and then generates adversarial examples to evaluate the adversarial attack impacts. The results show that whether the current input sample is a signal sequence or a converted image, the DNN is vulnerable to the threat of adversarial examples. In the selected methods, whether it is under different perturbations or signal-to-noise ratio (SNRs), the momentum iteration method has the best performance among them, and under the perturbation of 0.01, the attack performance is more than 10% higher than the fast gradient sign method. Also, to measure the invisibility of adversarial examples, the contour stellar images before and after the attack were compared to maintain a balance between the attack success rate and the attack concealment.

[1]  R. Michael Buehrer,et al.  Evaluating Adversarial Evasion Attacks in the Context of Wireless Communications , 2019, IEEE Transactions on Information Forensics and Security.

[2]  Guoru Ding,et al.  Dynamic Spectrum Interaction of UAV Flight Formation Communication With Priority: A Deep Reinforcement Learning Approach , 2020, IEEE Transactions on Cognitive Communications and Networking.

[3]  Yu Wang,et al.  Deep Learning-Based Cooperative Automatic Modulation Classification Method for MIMO Systems , 2020, IEEE Transactions on Vehicular Technology.

[4]  Zheng Dou,et al.  The individual identification method of wireless device based on dimensionality reduction and machine learning , 2019, The Journal of Supercomputing.

[5]  Shiwen Mao,et al.  CSI-Based Fingerprinting for Indoor Localization: A Deep Learning Approach , 2016, IEEE Transactions on Vehicular Technology.

[6]  Aiqun Hu,et al.  A Robust RF Fingerprinting Approach Using Multisampling Convolutional Neural Network , 2019, IEEE Internet of Things Journal.

[7]  Srdjan Capkun,et al.  Physical-Layer Identification of Wireless Devices , 2011 .

[8]  Feng Shu,et al.  Nonconvex Penalized Regularization for Robust Sparse Recovery in the Presence of $S\alpha S$ Noise , 2018, IEEE Access.

[9]  Zhaoyue Zhang,et al.  Trust Management Method of D2D Communication Based on RF Fingerprint Identification , 2018, IEEE Access.

[10]  Zhou Yu,et al.  Deep learning based RF fingerprinting for device identification and wireless security , 2018, Electronics Letters.

[11]  Yong Liu,et al.  AnomalyNet: An Anomaly Detection Network for Video Surveillance , 2019, IEEE Transactions on Information Forensics and Security.

[12]  Chen Sun,et al.  High-Agreement Uncorrelated Secret Key Generation Based on Principal Component Analysis Preprocessing , 2018, IEEE Transactions on Communications.

[13]  Patrick D. McDaniel,et al.  Machine Learning in Adversarial Settings , 2016, IEEE Security & Privacy.

[14]  Jin Wang,et al.  Semi-supervised Learning with Generative Adversarial Networks on Digital Signal Mod-ulation Classification , 2018 .

[15]  Erik G. Larsson,et al.  Physical Adversarial Attacks Against End-to-End Autoencoder Communication Systems , 2019, IEEE Communications Letters.

[16]  Zheng Dou,et al.  An Improved Neural Network Pruning Technology for Automatic Modulation Classification in Edge Devices , 2020, IEEE Transactions on Vehicular Technology.

[17]  Erik G. Larsson,et al.  Adversarial Attacks on Deep-Learning Based Radio Signal Classification , 2018, IEEE Wireless Communications Letters.

[18]  Zhen Zhang,et al.  Specific Emitter Identification based on Power Amplifier , 2019 .

[19]  Yoav Goldberg,et al.  LaVAN: Localized and Visible Adversarial Noise , 2018, ICML.

[20]  Jie Yang,et al.  Data-Driven Deep Learning for Automatic Modulation Recognition in Cognitive Radios , 2019, IEEE Transactions on Vehicular Technology.

[21]  Yu-Dong Yao,et al.  Modulation Classification Based on Signal Constellation Diagrams and Deep Learning , 2019, IEEE Transactions on Neural Networks and Learning Systems.

[22]  Aleksander Madry,et al.  Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.

[23]  Xiang Chen,et al.  The Individual Identification Method of Wireless Device Based on A Robust Dimensionality Reduction Model of Hybrid Feature Information , 2018, Mob. Networks Appl..

[24]  Fumiyuki Adachi,et al.  Automatic Modulation Classification for MIMO Systems via Deep Learning and Zero-Forcing Equalization , 2020, IEEE Transactions on Vehicular Technology.

[25]  Shauna Revay,et al.  Deep Learning for RF Device Fingerprinting in Cognitive Communication Networks , 2018, IEEE Journal of Selected Topics in Signal Processing.

[26]  Yu Wang,et al.  LightAMC: Lightweight Automatic Modulation Classification via Deep Learning and Compressive Sensing , 2020, IEEE Transactions on Vehicular Technology.