2020
DOI: 10.1177/1475921720920233
|View full text |Cite
|
Sign up to set email alerts
|

On the vulnerability of data-driven structural health monitoring models to adversarial attack

Abstract: Many approaches at the forefront of structural health monitoring rely on cutting-edge techniques from the field of machine learning. Recently, much interest has been directed towards the study of so-called adversarial examples; deliberate input perturbations that deceive machine learning models while remaining semantically identical. This article demonstrates that data-driven approaches to structural health monitoring are vulnerable to attacks of this kind. In the perfect information or ‘white-box’ scenario, a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 29 publications
(30 reference statements)
0
2
0
Order By: Relevance
“…The variety of different scenarios applied to the structure is the main reason that induced several researchers to investigate its dynamical behavior. [61][62][63][64] Figure 2(a) shows the structure's layout, where aluminum plates and four aluminum columns were assembled using bolted joints to compose each floor. Figure 2(b) shows the damage mechanism located at the center of the structure's top floor.…”
Section: Damage Detection Methodologymentioning
confidence: 99%
“…The variety of different scenarios applied to the structure is the main reason that induced several researchers to investigate its dynamical behavior. [61][62][63][64] Figure 2(a) shows the structure's layout, where aluminum plates and four aluminum columns were assembled using bolted joints to compose each floor. Figure 2(b) shows the damage mechanism located at the center of the structure's top floor.…”
Section: Damage Detection Methodologymentioning
confidence: 99%
“…5G integration with SHM is becoming widespread, although security aspects such as integration need to be further evaluated. 357 Mobile edge computing and fog networks as part of the capabilities brought by 5G and 6G enable on-site device deployment of models and algorithms used for rapid assessment of civil infrastructures. 358 • Versatile SHM systems require a robust data management scheme.…”
Section: Open Research Issuesmentioning
confidence: 99%