DeSVig: Decentralized Swift Vigilance Against Adversarial Attacks in Industrial Artificial Intelligence Systems

Individually reinforcing the robustness of a single deep learning model only gives limited security guarantees especially when facing adversarial examples. In this article, we propose DeSVig, a decentralized swift vigilance framework to identify adversarial attacks in an industrial artificial intelligence systems (IAISs), which enables IAISs to correct the mistake in a few seconds. The DeSVig is highly decentralized, which improves the effectiveness of recognizing abnormal inputs. We try to overcome the challenges on ultralow latency caused by dynamics in industries using peculiarly designated mobile edge computing and generative adversarial networks. The most important advantage of our work is that it can significantly reduce the failure risks of being deceived by adversarial examples, which is critical for safety-prioritized and delay-sensitive environments. In our experiments, adversarial examples of industrial electronic components are generated by several classical attacking models. Experimental results demonstrate that the DeSVig is more robust, efficient, and scalable than some state-of-art defenses.

[1]  Mianxiong Dong,et al.  QUOIN: Incentive Mechanisms for Crowd Sensing Networks , 2018, IEEE Network.

[2]  Shengcai Liao,et al.  Perceptual hash-based feature description for person re-identification , 2018, Neurocomputing.

[3]  Gang Wang,et al.  Connecting the Digital and Physical World: Improving the Robustness of Adversarial Attacks , 2019, AAAI.

[4]  Rama Chellappa,et al.  Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models , 2018, ICLR.

[5]  Kin K. Leung,et al.  When Edge Meets Learning: Adaptive Control for Resource-Constrained Distributed Machine Learning , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.

[6]  David A. Wagner,et al.  Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples , 2018, ICML.

[7]  Ali Hassan Sodhro,et al.  Artificial Intelligence-Driven Mechanism for Edge Computing-Based Industrial Applications , 2019, IEEE Transactions on Industrial Informatics.

[8]  Joan Bruna,et al.  Intriguing properties of neural networks , 2013, ICLR.

[9]  Ajmal Mian,et al.  Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey , 2018, IEEE Access.

[10]  Alptekin Temizel,et al.  The Effects of JPEG and JPEG2000 Compression on Attacks using Adversarial Examples , 2018, ArXiv.

[11]  Jianhua Li,et al.  Service Popularity-Based Smart Resources Partitioning for Fog Computing-Enabled Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.

[12]  Tara Javidi,et al.  Safe Machine Learning and Defeating Adversarial Attacks , 2018, IEEE Security & Privacy.

[13]  Martin Wistuba,et al.  Adversarial Robustness Toolbox v1.0.0 , 2018, 1807.01069.

[14]  Biing-Hwang Juang,et al.  Deep Learning in Physical Layer Communications , 2018, IEEE Wireless Communications.

[15]  Joachim Sachs,et al.  Adaptive 5G Low-Latency Communication for Tactile InternEt Services , 2019, Proceedings of the IEEE.

[16]  Gerhard Fettweis,et al.  5G-Enabled Tactile Internet , 2016, IEEE Journal on Selected Areas in Communications.

[17]  Andreas Kamilaris,et al.  Deep learning in agriculture: A survey , 2018, Comput. Electron. Agric..

[18]  Jonathon Shlens,et al.  Explaining and Harnessing Adversarial Examples , 2014, ICLR.

[19]  Fang Liu,et al.  Generalized Gaussian Mechanism for Differential Privacy , 2016, IEEE Transactions on Knowledge and Data Engineering.

[20]  Andrés Felipe Murillo-Piedrahita,et al.  Leveraging Software-Defined Networking for Incident Response in Industrial Control Systems , 2017, IEEE Software.

[21]  Seyed-Mohsen Moosavi-Dezfooli,et al.  DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[22]  Mianxiong Dong,et al.  FCSS: Fog-Computing-based Content-Aware Filtering for Security Services in Information-Centric Social Networks , 2019, IEEE Transactions on Emerging Topics in Computing.

[23]  James A. Storer,et al.  Deflecting Adversarial Attacks with Pixel Deflection , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[24]  Biing-Hwang Juang,et al.  Channel Agnostic End-to-End Learning Based Communication Systems with Conditional GAN , 2018, 2018 IEEE Globecom Workshops (GC Wkshps).

[25]  Mianxiong Dong,et al.  Virtual Network Recognition and Optimization in SDN-Enabled Cloud Environment , 2018, IEEE Transactions on Cloud Computing.

[26]  Mianxiong Dong,et al.  ECCN: Orchestration of Edge-Centric Computing and Content-Centric Networking in the 5G Radio Access Network , 2018, IEEE Wireless Communications.

[27]  Suman Jana,et al.  Certified Robustness to Adversarial Examples with Differential Privacy , 2018, 2019 IEEE Symposium on Security and Privacy (SP).

[28]  Frank H. P. Fitzek,et al.  Reducing Latency in Virtual Machines: Enabling Tactile Internet for Human-Machine Co-Working , 2019, IEEE Journal on Selected Areas in Communications.

[29]  Hamed Haddadi,et al.  Deep Learning in Mobile and Wireless Networking: A Survey , 2018, IEEE Communications Surveys & Tutorials.

[30]  Nick McKeown,et al.  OpenFlow: enabling innovation in campus networks , 2008, CCRV.

[31]  C.-C. Jay Kuo,et al.  Defense Against Adversarial Attacks with Saak Transform , 2018, ArXiv.

[32]  Mianxiong Dong,et al.  Energy Efficient Hybrid Edge Caching Scheme for Tactile Internet in 5G , 2019, IEEE Transactions on Green Communications and Networking.

[33]  Vinod Vokkarane,et al.  A New Deep Learning-Based Food Recognition System for Dietary Assessment on An Edge Computing Service Infrastructure , 2018, IEEE Transactions on Services Computing.

[34]  Mohammad Abdullah Al Faruque,et al.  Security trends and advances in manufacturing systems in the era of industry 4.0 , 2017, 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[35]  Valentina Zantedeschi,et al.  Efficient Defenses Against Adversarial Attacks , 2017, AISec@CCS.

[36]  Samy Bengio,et al.  Adversarial examples in the physical world , 2016, ICLR.

[37]  Victor C. M. Leung,et al.  MASM: A Multiple-Algorithm Service Model for Energy-Delay Optimization in Edge Artificial Intelligence , 2019, IEEE Transactions on Industrial Informatics.

[38]  Dazhong Wu,et al.  Deep learning for smart manufacturing: Methods and applications , 2018, Journal of Manufacturing Systems.

[39]  Aditi Raghunathan,et al.  Certified Defenses against Adversarial Examples , 2018, ICLR.

[40]  Pan He,et al.  Adversarial Examples: Attacks and Defenses for Deep Learning , 2017, IEEE Transactions on Neural Networks and Learning Systems.