论文标题

渠道对对抗无线信号分类器的对抗性攻击的替代模型的影响

Channel Effects on Surrogate Models of Adversarial Attacks against Wireless Signal Classifiers

论文作者

Kim, Brian, Sagduyu, Yalin E., Erpek, Tugba, Davaslioglu, Kemal, Ulukus, Sennur

论文摘要

我们考虑一个由背景发射器,发射器和对手组成的无线通信系统。发射机配备了深神网络(DNN)分类器,用于检测来自背景发射器的持续传输,并在频谱闲置时传输信号。同时,对手通过观察频谱来检测背景发射器的持续传输并产生对抗性攻击,以欺骗发射器将频道误以为闲置,从而将其自身的DNN分类器作为代理模型训练自己的DNN分类器。该替代模型可能与发射机的分类器有显着不同,因为对手和发射器经历了与背景发射极不同的渠道,因此他们的分类器经过不同的输入分布进行培训。该系统模型可以代表背景发射极是主要用户的设置,发射器是二级用户,并且对手试图欺骗次级用户即使通道被主要用户占据。我们考虑了不同的拓扑结构,以研究对手训练的不同替代模型如何影响对抗性攻击的性能。仿真结果表明,经过通道引起的输入的不同分布训练的替代模型严重限制了攻击性能,并表明,由于无线应用程序的替代模型可能与目标模型效应显着差异,因此既不容易获得,也不容易获得对抗性攻击的可传递性。

We consider a wireless communication system that consists of a background emitter, a transmitter, and an adversary. The transmitter is equipped with a deep neural network (DNN) classifier for detecting the ongoing transmissions from the background emitter and transmits a signal if the spectrum is idle. Concurrently, the adversary trains its own DNN classifier as the surrogate model by observing the spectrum to detect the ongoing transmissions of the background emitter and generate adversarial attacks to fool the transmitter into misclassifying the channel as idle. This surrogate model may differ from the transmitter's classifier significantly because the adversary and the transmitter experience different channels from the background emitter and therefore their classifiers are trained with different distributions of inputs. This system model may represent a setting where the background emitter is a primary user, the transmitter is a secondary user, and the adversary is trying to fool the secondary user to transmit even though the channel is occupied by the primary user. We consider different topologies to investigate how different surrogate models that are trained by the adversary (depending on the differences in channel effects experienced by the adversary) affect the performance of the adversarial attack. The simulation results show that the surrogate models that are trained with different distributions of channel-induced inputs severely limit the attack performance and indicate that the transferability of adversarial attacks is neither readily available nor straightforward to achieve since surrogate models for wireless applications may significantly differ from the target model depending on channel effects.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源