Sparse Adversarial Attacks against DL-Based Automatic Modulation Classification

Automatic modulation recognition (AMR) serves as a crucial component in domains such as cognitive radio and electromagnetic countermeasures, acting as a significant prerequisite for the efficient signal processing of receivers. Deep neural networks (DNNs), despite their effectiveness, are known to b...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Electronics (Basel) 2023-09, Vol.12 (18), p.3752
Hauptverfasser: Jiang, Zenghui, Zeng, Weijun, Zhou, Xingyu, Feng, Peilun, Chen, Pu, Yin, Shenqian, Han, Changzhi, Li, Lin
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 18
container_start_page 3752
container_title Electronics (Basel)
container_volume 12
creator Jiang, Zenghui
Zeng, Weijun
Zhou, Xingyu
Feng, Peilun
Chen, Pu
Yin, Shenqian
Han, Changzhi
Li, Lin
description Automatic modulation recognition (AMR) serves as a crucial component in domains such as cognitive radio and electromagnetic countermeasures, acting as a significant prerequisite for the efficient signal processing of receivers. Deep neural networks (DNNs), despite their effectiveness, are known to be vulnerable to adversarial attacks. This vulnerability has inspired the introduction of subtle interference to wireless communication signals—interference so minuscule that it is difficult for the human eye to discern. Such interference can mislead eavesdroppers into erroneous modulation pattern recognition when using DNNs, thereby camouflaging communication signal modulation patterns. Nonetheless, the majority of current camouflage methods used for electromagnetic signal modulation recognition rely on a global perturbation of the signal. They fail to consider the local agility of signal disturbance and the concealment requirements for bait signals that are intercepted by the interceptor. This paper presents a generator framework designed to produce perturbations with sparse properties. Furthermore, we introduce a method to reduce spectral loss, which minimizes the spectral difference between adversarial perturbation and the original signal. This method makes perturbation more challenging to monitor, thereby deceiving enemy electromagnetic signal modulation recognition systems. The experimental results validated that the proposed method significantly outperformed existing methods in terms of generation time. Moreover, it can generate adversarial signals characterized by high deceivability and transferability even under extremely sparse conditions.
doi_str_mv 10.3390/electronics12183752
format Article
fullrecord <record><control><sourceid>gale_proqu</sourceid><recordid>TN_cdi_proquest_journals_2869329682</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A771810680</galeid><sourcerecordid>A771810680</sourcerecordid><originalsourceid>FETCH-LOGICAL-c311t-562019b89736ba222a68e4373d1f5270dc49d1bd284c5a4f618f91b76e71289d3</originalsourceid><addsrcrecordid>eNptUMtOwzAQtBBIVNAv4BKJc4ofiR_HUJ5SUQ_AOdr4UbmkcbEdJP6eQDlwYPews6uZWWkQuiB4wZjCV7a3OscweJ0IJZKJmh6hGcVClYoqevwHn6J5Sls8lSJMMjxD6-c9xGSLxnzYmCB66IsmZ9BvqYAN-CHl4mZVXkOypmjGHHaQvS6eghn7CYWhWPaQknde_6zn6MRBn-z8d56h17vbl-VDuVrfPy6bVakZIbmsOcVEdVIJxjuglAKXtmKCGeJqKrDRlTKkM1RWuobKcSKdIp3gVhAqlWFn6PLgu4_hfbQpt9swxmF62VLJFaOKSzqxFgfWBnrb-sGFHEFPbezO6zBY56d7IwSRBHOJJwE7CHQMKUXr2n30O4ifLcHtd9rtP2mzLxU4dH0</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2869329682</pqid></control><display><type>article</type><title>Sparse Adversarial Attacks against DL-Based Automatic Modulation Classification</title><source>MDPI - Multidisciplinary Digital Publishing Institute</source><source>EZB Electronic Journals Library</source><creator>Jiang, Zenghui ; Zeng, Weijun ; Zhou, Xingyu ; Feng, Peilun ; Chen, Pu ; Yin, Shenqian ; Han, Changzhi ; Li, Lin</creator><creatorcontrib>Jiang, Zenghui ; Zeng, Weijun ; Zhou, Xingyu ; Feng, Peilun ; Chen, Pu ; Yin, Shenqian ; Han, Changzhi ; Li, Lin</creatorcontrib><description>Automatic modulation recognition (AMR) serves as a crucial component in domains such as cognitive radio and electromagnetic countermeasures, acting as a significant prerequisite for the efficient signal processing of receivers. Deep neural networks (DNNs), despite their effectiveness, are known to be vulnerable to adversarial attacks. This vulnerability has inspired the introduction of subtle interference to wireless communication signals—interference so minuscule that it is difficult for the human eye to discern. Such interference can mislead eavesdroppers into erroneous modulation pattern recognition when using DNNs, thereby camouflaging communication signal modulation patterns. Nonetheless, the majority of current camouflage methods used for electromagnetic signal modulation recognition rely on a global perturbation of the signal. They fail to consider the local agility of signal disturbance and the concealment requirements for bait signals that are intercepted by the interceptor. This paper presents a generator framework designed to produce perturbations with sparse properties. Furthermore, we introduce a method to reduce spectral loss, which minimizes the spectral difference between adversarial perturbation and the original signal. This method makes perturbation more challenging to monitor, thereby deceiving enemy electromagnetic signal modulation recognition systems. The experimental results validated that the proposed method significantly outperformed existing methods in terms of generation time. Moreover, it can generate adversarial signals characterized by high deceivability and transferability even under extremely sparse conditions.</description><identifier>ISSN: 2079-9292</identifier><identifier>EISSN: 2079-9292</identifier><identifier>DOI: 10.3390/electronics12183752</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Artificial neural networks ; Automatic modulation recognition ; Classification ; Cognitive radio ; Communication ; Computer crimes ; Deep learning ; Electromagnetism ; Interceptors ; Interference ; Machine learning ; Methods ; Modulation (Electronics) ; Neural networks ; Object recognition (Computers) ; Pattern recognition ; Perturbation ; Prevention ; Signal processing ; Wireless communications</subject><ispartof>Electronics (Basel), 2023-09, Vol.12 (18), p.3752</ispartof><rights>COPYRIGHT 2023 MDPI AG</rights><rights>2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c311t-562019b89736ba222a68e4373d1f5270dc49d1bd284c5a4f618f91b76e71289d3</cites><orcidid>0000-0003-3439-4450 ; 0009-0008-2539-6319</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27923,27924</link.rule.ids></links><search><creatorcontrib>Jiang, Zenghui</creatorcontrib><creatorcontrib>Zeng, Weijun</creatorcontrib><creatorcontrib>Zhou, Xingyu</creatorcontrib><creatorcontrib>Feng, Peilun</creatorcontrib><creatorcontrib>Chen, Pu</creatorcontrib><creatorcontrib>Yin, Shenqian</creatorcontrib><creatorcontrib>Han, Changzhi</creatorcontrib><creatorcontrib>Li, Lin</creatorcontrib><title>Sparse Adversarial Attacks against DL-Based Automatic Modulation Classification</title><title>Electronics (Basel)</title><description>Automatic modulation recognition (AMR) serves as a crucial component in domains such as cognitive radio and electromagnetic countermeasures, acting as a significant prerequisite for the efficient signal processing of receivers. Deep neural networks (DNNs), despite their effectiveness, are known to be vulnerable to adversarial attacks. This vulnerability has inspired the introduction of subtle interference to wireless communication signals—interference so minuscule that it is difficult for the human eye to discern. Such interference can mislead eavesdroppers into erroneous modulation pattern recognition when using DNNs, thereby camouflaging communication signal modulation patterns. Nonetheless, the majority of current camouflage methods used for electromagnetic signal modulation recognition rely on a global perturbation of the signal. They fail to consider the local agility of signal disturbance and the concealment requirements for bait signals that are intercepted by the interceptor. This paper presents a generator framework designed to produce perturbations with sparse properties. Furthermore, we introduce a method to reduce spectral loss, which minimizes the spectral difference between adversarial perturbation and the original signal. This method makes perturbation more challenging to monitor, thereby deceiving enemy electromagnetic signal modulation recognition systems. The experimental results validated that the proposed method significantly outperformed existing methods in terms of generation time. Moreover, it can generate adversarial signals characterized by high deceivability and transferability even under extremely sparse conditions.</description><subject>Artificial neural networks</subject><subject>Automatic modulation recognition</subject><subject>Classification</subject><subject>Cognitive radio</subject><subject>Communication</subject><subject>Computer crimes</subject><subject>Deep learning</subject><subject>Electromagnetism</subject><subject>Interceptors</subject><subject>Interference</subject><subject>Machine learning</subject><subject>Methods</subject><subject>Modulation (Electronics)</subject><subject>Neural networks</subject><subject>Object recognition (Computers)</subject><subject>Pattern recognition</subject><subject>Perturbation</subject><subject>Prevention</subject><subject>Signal processing</subject><subject>Wireless communications</subject><issn>2079-9292</issn><issn>2079-9292</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNptUMtOwzAQtBBIVNAv4BKJc4ofiR_HUJ5SUQ_AOdr4UbmkcbEdJP6eQDlwYPews6uZWWkQuiB4wZjCV7a3OscweJ0IJZKJmh6hGcVClYoqevwHn6J5Sls8lSJMMjxD6-c9xGSLxnzYmCB66IsmZ9BvqYAN-CHl4mZVXkOypmjGHHaQvS6eghn7CYWhWPaQknde_6zn6MRBn-z8d56h17vbl-VDuVrfPy6bVakZIbmsOcVEdVIJxjuglAKXtmKCGeJqKrDRlTKkM1RWuobKcSKdIp3gVhAqlWFn6PLgu4_hfbQpt9swxmF62VLJFaOKSzqxFgfWBnrb-sGFHEFPbezO6zBY56d7IwSRBHOJJwE7CHQMKUXr2n30O4ifLcHtd9rtP2mzLxU4dH0</recordid><startdate>20230901</startdate><enddate>20230901</enddate><creator>Jiang, Zenghui</creator><creator>Zeng, Weijun</creator><creator>Zhou, Xingyu</creator><creator>Feng, Peilun</creator><creator>Chen, Pu</creator><creator>Yin, Shenqian</creator><creator>Han, Changzhi</creator><creator>Li, Lin</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L7M</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0003-3439-4450</orcidid><orcidid>https://orcid.org/0009-0008-2539-6319</orcidid></search><sort><creationdate>20230901</creationdate><title>Sparse Adversarial Attacks against DL-Based Automatic Modulation Classification</title><author>Jiang, Zenghui ; Zeng, Weijun ; Zhou, Xingyu ; Feng, Peilun ; Chen, Pu ; Yin, Shenqian ; Han, Changzhi ; Li, Lin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c311t-562019b89736ba222a68e4373d1f5270dc49d1bd284c5a4f618f91b76e71289d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Artificial neural networks</topic><topic>Automatic modulation recognition</topic><topic>Classification</topic><topic>Cognitive radio</topic><topic>Communication</topic><topic>Computer crimes</topic><topic>Deep learning</topic><topic>Electromagnetism</topic><topic>Interceptors</topic><topic>Interference</topic><topic>Machine learning</topic><topic>Methods</topic><topic>Modulation (Electronics)</topic><topic>Neural networks</topic><topic>Object recognition (Computers)</topic><topic>Pattern recognition</topic><topic>Perturbation</topic><topic>Prevention</topic><topic>Signal processing</topic><topic>Wireless communications</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Jiang, Zenghui</creatorcontrib><creatorcontrib>Zeng, Weijun</creatorcontrib><creatorcontrib>Zhou, Xingyu</creatorcontrib><creatorcontrib>Feng, Peilun</creatorcontrib><creatorcontrib>Chen, Pu</creatorcontrib><creatorcontrib>Yin, Shenqian</creatorcontrib><creatorcontrib>Han, Changzhi</creatorcontrib><creatorcontrib>Li, Lin</creatorcontrib><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Electronics (Basel)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Jiang, Zenghui</au><au>Zeng, Weijun</au><au>Zhou, Xingyu</au><au>Feng, Peilun</au><au>Chen, Pu</au><au>Yin, Shenqian</au><au>Han, Changzhi</au><au>Li, Lin</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Sparse Adversarial Attacks against DL-Based Automatic Modulation Classification</atitle><jtitle>Electronics (Basel)</jtitle><date>2023-09-01</date><risdate>2023</risdate><volume>12</volume><issue>18</issue><spage>3752</spage><pages>3752-</pages><issn>2079-9292</issn><eissn>2079-9292</eissn><abstract>Automatic modulation recognition (AMR) serves as a crucial component in domains such as cognitive radio and electromagnetic countermeasures, acting as a significant prerequisite for the efficient signal processing of receivers. Deep neural networks (DNNs), despite their effectiveness, are known to be vulnerable to adversarial attacks. This vulnerability has inspired the introduction of subtle interference to wireless communication signals—interference so minuscule that it is difficult for the human eye to discern. Such interference can mislead eavesdroppers into erroneous modulation pattern recognition when using DNNs, thereby camouflaging communication signal modulation patterns. Nonetheless, the majority of current camouflage methods used for electromagnetic signal modulation recognition rely on a global perturbation of the signal. They fail to consider the local agility of signal disturbance and the concealment requirements for bait signals that are intercepted by the interceptor. This paper presents a generator framework designed to produce perturbations with sparse properties. Furthermore, we introduce a method to reduce spectral loss, which minimizes the spectral difference between adversarial perturbation and the original signal. This method makes perturbation more challenging to monitor, thereby deceiving enemy electromagnetic signal modulation recognition systems. The experimental results validated that the proposed method significantly outperformed existing methods in terms of generation time. Moreover, it can generate adversarial signals characterized by high deceivability and transferability even under extremely sparse conditions.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/electronics12183752</doi><orcidid>https://orcid.org/0000-0003-3439-4450</orcidid><orcidid>https://orcid.org/0009-0008-2539-6319</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2079-9292
ispartof Electronics (Basel), 2023-09, Vol.12 (18), p.3752
issn 2079-9292
2079-9292
language eng
recordid cdi_proquest_journals_2869329682
source MDPI - Multidisciplinary Digital Publishing Institute; EZB Electronic Journals Library
subjects Artificial neural networks
Automatic modulation recognition
Classification
Cognitive radio
Communication
Computer crimes
Deep learning
Electromagnetism
Interceptors
Interference
Machine learning
Methods
Modulation (Electronics)
Neural networks
Object recognition (Computers)
Pattern recognition
Perturbation
Prevention
Signal processing
Wireless communications
title Sparse Adversarial Attacks against DL-Based Automatic Modulation Classification
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-10T19%3A58%3A05IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Sparse%20Adversarial%20Attacks%20against%20DL-Based%20Automatic%20Modulation%20Classification&rft.jtitle=Electronics%20(Basel)&rft.au=Jiang,%20Zenghui&rft.date=2023-09-01&rft.volume=12&rft.issue=18&rft.spage=3752&rft.pages=3752-&rft.issn=2079-9292&rft.eissn=2079-9292&rft_id=info:doi/10.3390/electronics12183752&rft_dat=%3Cgale_proqu%3EA771810680%3C/gale_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2869329682&rft_id=info:pmid/&rft_galeid=A771810680&rfr_iscdi=true