2020
DOI: 10.1109/tifs.2019.2934069
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating Adversarial Evasion Attacks in the Context of Wireless Communications

Abstract: Recent advancements in radio frequency machine learning (RFML) have demonstrated the use of raw in-phase and quadrature (IQ) samples for multiple spectrum sensing tasks. Yet, deep learning techniques have been shown, in other applications, to be vulnerable to adversarial machine learning (ML) techniques, which seek to craft small perturbations that are added to the input to cause a misclassification. The current work differentiates the threats that adversarial ML poses to RFML systems based on where the attack… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
47
0
1

Year Published

2021
2021
2022
2022

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 114 publications
(48 citation statements)
references
References 28 publications
0
47
0
1
Order By: Relevance
“…These attacks can be launched separately or combined, i.e., causative and evasion attacks can be launched by making use of the inference results from an exploratory attack [23]. For wireless applications, the evasion attack was considered in [24], [25], [26], [27] by adding adversarial perturbations to fool receivers to misclassify signal types (such as modulations). Adversarial distortions were considered in [28] to support anti-jamming by deceiving the jammers learning algorithms in a game-theoretic framework.…”
Section: Related Workmentioning
confidence: 99%
“…These attacks can be launched separately or combined, i.e., causative and evasion attacks can be launched by making use of the inference results from an exploratory attack [23]. For wireless applications, the evasion attack was considered in [24], [25], [26], [27] by adding adversarial perturbations to fool receivers to misclassify signal types (such as modulations). Adversarial distortions were considered in [28] to support anti-jamming by deceiving the jammers learning algorithms in a game-theoretic framework.…”
Section: Related Workmentioning
confidence: 99%
“…This diagonal line is clipped where it meets the first two lines because falling closer toward zero with any significance would require intentional or adversarial manipulation of the training routine or data, which is not considered in this work. 95 The trained networks are then represented with different markers representing different dataset sources used during training.…”
Section: Synthetic Performance In the Fieldmentioning
confidence: 99%
“…In the meantime, an adversary transmits as well such that a carefully controlled interference signal is added to the received signal and causes the classifier to misclassify the received signal. This problem was studied in [78], [79] for modulation classification using a CNN-based classifier. Both white-box and black-box attacks on the deep learning classifier are shown to be effective in terms of increasing the classification error with small over-the-air perturbations added to the received signal.…”
Section: Other Attacks Based On Adversarial Deep Learningmentioning
confidence: 99%