Sparse Adversarial Attacks against DL-Based Automatic Modulation Classification
Automatic modulation recognition (AMR) serves as a crucial component in domains such as cognitive radio and electromagnetic countermeasures, acting as a significant prerequisite for the efficient signal processing of receivers. Deep neural networks (DNNs), despite their effectiveness, are known to b...
Gespeichert in:
Veröffentlicht in: | Electronics (Basel) 2023-09, Vol.12 (18), p.3752 |
---|---|
Hauptverfasser: | , , , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 18 |
container_start_page | 3752 |
container_title | Electronics (Basel) |
container_volume | 12 |
creator | Jiang, Zenghui Zeng, Weijun Zhou, Xingyu Feng, Peilun Chen, Pu Yin, Shenqian Han, Changzhi Li, Lin |
description | Automatic modulation recognition (AMR) serves as a crucial component in domains such as cognitive radio and electromagnetic countermeasures, acting as a significant prerequisite for the efficient signal processing of receivers. Deep neural networks (DNNs), despite their effectiveness, are known to be vulnerable to adversarial attacks. This vulnerability has inspired the introduction of subtle interference to wireless communication signals—interference so minuscule that it is difficult for the human eye to discern. Such interference can mislead eavesdroppers into erroneous modulation pattern recognition when using DNNs, thereby camouflaging communication signal modulation patterns. Nonetheless, the majority of current camouflage methods used for electromagnetic signal modulation recognition rely on a global perturbation of the signal. They fail to consider the local agility of signal disturbance and the concealment requirements for bait signals that are intercepted by the interceptor. This paper presents a generator framework designed to produce perturbations with sparse properties. Furthermore, we introduce a method to reduce spectral loss, which minimizes the spectral difference between adversarial perturbation and the original signal. This method makes perturbation more challenging to monitor, thereby deceiving enemy electromagnetic signal modulation recognition systems. The experimental results validated that the proposed method significantly outperformed existing methods in terms of generation time. Moreover, it can generate adversarial signals characterized by high deceivability and transferability even under extremely sparse conditions. |
doi_str_mv | 10.3390/electronics12183752 |
format | Article |
fullrecord | <record><control><sourceid>gale_proqu</sourceid><recordid>TN_cdi_proquest_journals_2869329682</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A771810680</galeid><sourcerecordid>A771810680</sourcerecordid><originalsourceid>FETCH-LOGICAL-c311t-562019b89736ba222a68e4373d1f5270dc49d1bd284c5a4f618f91b76e71289d3</originalsourceid><addsrcrecordid>eNptUMtOwzAQtBBIVNAv4BKJc4ofiR_HUJ5SUQ_AOdr4UbmkcbEdJP6eQDlwYPews6uZWWkQuiB4wZjCV7a3OscweJ0IJZKJmh6hGcVClYoqevwHn6J5Sls8lSJMMjxD6-c9xGSLxnzYmCB66IsmZ9BvqYAN-CHl4mZVXkOypmjGHHaQvS6eghn7CYWhWPaQknde_6zn6MRBn-z8d56h17vbl-VDuVrfPy6bVakZIbmsOcVEdVIJxjuglAKXtmKCGeJqKrDRlTKkM1RWuobKcSKdIp3gVhAqlWFn6PLgu4_hfbQpt9swxmF62VLJFaOKSzqxFgfWBnrb-sGFHEFPbezO6zBY56d7IwSRBHOJJwE7CHQMKUXr2n30O4ifLcHtd9rtP2mzLxU4dH0</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2869329682</pqid></control><display><type>article</type><title>Sparse Adversarial Attacks against DL-Based Automatic Modulation Classification</title><source>MDPI - Multidisciplinary Digital Publishing Institute</source><source>EZB Electronic Journals Library</source><creator>Jiang, Zenghui ; Zeng, Weijun ; Zhou, Xingyu ; Feng, Peilun ; Chen, Pu ; Yin, Shenqian ; Han, Changzhi ; Li, Lin</creator><creatorcontrib>Jiang, Zenghui ; Zeng, Weijun ; Zhou, Xingyu ; Feng, Peilun ; Chen, Pu ; Yin, Shenqian ; Han, Changzhi ; Li, Lin</creatorcontrib><description>Automatic modulation recognition (AMR) serves as a crucial component in domains such as cognitive radio and electromagnetic countermeasures, acting as a significant prerequisite for the efficient signal processing of receivers. Deep neural networks (DNNs), despite their effectiveness, are known to be vulnerable to adversarial attacks. This vulnerability has inspired the introduction of subtle interference to wireless communication signals—interference so minuscule that it is difficult for the human eye to discern. Such interference can mislead eavesdroppers into erroneous modulation pattern recognition when using DNNs, thereby camouflaging communication signal modulation patterns. Nonetheless, the majority of current camouflage methods used for electromagnetic signal modulation recognition rely on a global perturbation of the signal. They fail to consider the local agility of signal disturbance and the concealment requirements for bait signals that are intercepted by the interceptor. This paper presents a generator framework designed to produce perturbations with sparse properties. Furthermore, we introduce a method to reduce spectral loss, which minimizes the spectral difference between adversarial perturbation and the original signal. This method makes perturbation more challenging to monitor, thereby deceiving enemy electromagnetic signal modulation recognition systems. The experimental results validated that the proposed method significantly outperformed existing methods in terms of generation time. Moreover, it can generate adversarial signals characterized by high deceivability and transferability even under extremely sparse conditions.</description><identifier>ISSN: 2079-9292</identifier><identifier>EISSN: 2079-9292</identifier><identifier>DOI: 10.3390/electronics12183752</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Artificial neural networks ; Automatic modulation recognition ; Classification ; Cognitive radio ; Communication ; Computer crimes ; Deep learning ; Electromagnetism ; Interceptors ; Interference ; Machine learning ; Methods ; Modulation (Electronics) ; Neural networks ; Object recognition (Computers) ; Pattern recognition ; Perturbation ; Prevention ; Signal processing ; Wireless communications</subject><ispartof>Electronics (Basel), 2023-09, Vol.12 (18), p.3752</ispartof><rights>COPYRIGHT 2023 MDPI AG</rights><rights>2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c311t-562019b89736ba222a68e4373d1f5270dc49d1bd284c5a4f618f91b76e71289d3</cites><orcidid>0000-0003-3439-4450 ; 0009-0008-2539-6319</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27923,27924</link.rule.ids></links><search><creatorcontrib>Jiang, Zenghui</creatorcontrib><creatorcontrib>Zeng, Weijun</creatorcontrib><creatorcontrib>Zhou, Xingyu</creatorcontrib><creatorcontrib>Feng, Peilun</creatorcontrib><creatorcontrib>Chen, Pu</creatorcontrib><creatorcontrib>Yin, Shenqian</creatorcontrib><creatorcontrib>Han, Changzhi</creatorcontrib><creatorcontrib>Li, Lin</creatorcontrib><title>Sparse Adversarial Attacks against DL-Based Automatic Modulation Classification</title><title>Electronics (Basel)</title><description>Automatic modulation recognition (AMR) serves as a crucial component in domains such as cognitive radio and electromagnetic countermeasures, acting as a significant prerequisite for the efficient signal processing of receivers. Deep neural networks (DNNs), despite their effectiveness, are known to be vulnerable to adversarial attacks. This vulnerability has inspired the introduction of subtle interference to wireless communication signals—interference so minuscule that it is difficult for the human eye to discern. Such interference can mislead eavesdroppers into erroneous modulation pattern recognition when using DNNs, thereby camouflaging communication signal modulation patterns. Nonetheless, the majority of current camouflage methods used for electromagnetic signal modulation recognition rely on a global perturbation of the signal. They fail to consider the local agility of signal disturbance and the concealment requirements for bait signals that are intercepted by the interceptor. This paper presents a generator framework designed to produce perturbations with sparse properties. Furthermore, we introduce a method to reduce spectral loss, which minimizes the spectral difference between adversarial perturbation and the original signal. This method makes perturbation more challenging to monitor, thereby deceiving enemy electromagnetic signal modulation recognition systems. The experimental results validated that the proposed method significantly outperformed existing methods in terms of generation time. Moreover, it can generate adversarial signals characterized by high deceivability and transferability even under extremely sparse conditions.</description><subject>Artificial neural networks</subject><subject>Automatic modulation recognition</subject><subject>Classification</subject><subject>Cognitive radio</subject><subject>Communication</subject><subject>Computer crimes</subject><subject>Deep learning</subject><subject>Electromagnetism</subject><subject>Interceptors</subject><subject>Interference</subject><subject>Machine learning</subject><subject>Methods</subject><subject>Modulation (Electronics)</subject><subject>Neural networks</subject><subject>Object recognition (Computers)</subject><subject>Pattern recognition</subject><subject>Perturbation</subject><subject>Prevention</subject><subject>Signal processing</subject><subject>Wireless communications</subject><issn>2079-9292</issn><issn>2079-9292</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNptUMtOwzAQtBBIVNAv4BKJc4ofiR_HUJ5SUQ_AOdr4UbmkcbEdJP6eQDlwYPews6uZWWkQuiB4wZjCV7a3OscweJ0IJZKJmh6hGcVClYoqevwHn6J5Sls8lSJMMjxD6-c9xGSLxnzYmCB66IsmZ9BvqYAN-CHl4mZVXkOypmjGHHaQvS6eghn7CYWhWPaQknde_6zn6MRBn-z8d56h17vbl-VDuVrfPy6bVakZIbmsOcVEdVIJxjuglAKXtmKCGeJqKrDRlTKkM1RWuobKcSKdIp3gVhAqlWFn6PLgu4_hfbQpt9swxmF62VLJFaOKSzqxFgfWBnrb-sGFHEFPbezO6zBY56d7IwSRBHOJJwE7CHQMKUXr2n30O4ifLcHtd9rtP2mzLxU4dH0</recordid><startdate>20230901</startdate><enddate>20230901</enddate><creator>Jiang, Zenghui</creator><creator>Zeng, Weijun</creator><creator>Zhou, Xingyu</creator><creator>Feng, Peilun</creator><creator>Chen, Pu</creator><creator>Yin, Shenqian</creator><creator>Han, Changzhi</creator><creator>Li, Lin</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L7M</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0003-3439-4450</orcidid><orcidid>https://orcid.org/0009-0008-2539-6319</orcidid></search><sort><creationdate>20230901</creationdate><title>Sparse Adversarial Attacks against DL-Based Automatic Modulation Classification</title><author>Jiang, Zenghui ; Zeng, Weijun ; Zhou, Xingyu ; Feng, Peilun ; Chen, Pu ; Yin, Shenqian ; Han, Changzhi ; Li, Lin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c311t-562019b89736ba222a68e4373d1f5270dc49d1bd284c5a4f618f91b76e71289d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Artificial neural networks</topic><topic>Automatic modulation recognition</topic><topic>Classification</topic><topic>Cognitive radio</topic><topic>Communication</topic><topic>Computer crimes</topic><topic>Deep learning</topic><topic>Electromagnetism</topic><topic>Interceptors</topic><topic>Interference</topic><topic>Machine learning</topic><topic>Methods</topic><topic>Modulation (Electronics)</topic><topic>Neural networks</topic><topic>Object recognition (Computers)</topic><topic>Pattern recognition</topic><topic>Perturbation</topic><topic>Prevention</topic><topic>Signal processing</topic><topic>Wireless communications</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Jiang, Zenghui</creatorcontrib><creatorcontrib>Zeng, Weijun</creatorcontrib><creatorcontrib>Zhou, Xingyu</creatorcontrib><creatorcontrib>Feng, Peilun</creatorcontrib><creatorcontrib>Chen, Pu</creatorcontrib><creatorcontrib>Yin, Shenqian</creatorcontrib><creatorcontrib>Han, Changzhi</creatorcontrib><creatorcontrib>Li, Lin</creatorcontrib><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>ProQuest Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Electronics (Basel)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Jiang, Zenghui</au><au>Zeng, Weijun</au><au>Zhou, Xingyu</au><au>Feng, Peilun</au><au>Chen, Pu</au><au>Yin, Shenqian</au><au>Han, Changzhi</au><au>Li, Lin</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Sparse Adversarial Attacks against DL-Based Automatic Modulation Classification</atitle><jtitle>Electronics (Basel)</jtitle><date>2023-09-01</date><risdate>2023</risdate><volume>12</volume><issue>18</issue><spage>3752</spage><pages>3752-</pages><issn>2079-9292</issn><eissn>2079-9292</eissn><abstract>Automatic modulation recognition (AMR) serves as a crucial component in domains such as cognitive radio and electromagnetic countermeasures, acting as a significant prerequisite for the efficient signal processing of receivers. Deep neural networks (DNNs), despite their effectiveness, are known to be vulnerable to adversarial attacks. This vulnerability has inspired the introduction of subtle interference to wireless communication signals—interference so minuscule that it is difficult for the human eye to discern. Such interference can mislead eavesdroppers into erroneous modulation pattern recognition when using DNNs, thereby camouflaging communication signal modulation patterns. Nonetheless, the majority of current camouflage methods used for electromagnetic signal modulation recognition rely on a global perturbation of the signal. They fail to consider the local agility of signal disturbance and the concealment requirements for bait signals that are intercepted by the interceptor. This paper presents a generator framework designed to produce perturbations with sparse properties. Furthermore, we introduce a method to reduce spectral loss, which minimizes the spectral difference between adversarial perturbation and the original signal. This method makes perturbation more challenging to monitor, thereby deceiving enemy electromagnetic signal modulation recognition systems. The experimental results validated that the proposed method significantly outperformed existing methods in terms of generation time. Moreover, it can generate adversarial signals characterized by high deceivability and transferability even under extremely sparse conditions.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/electronics12183752</doi><orcidid>https://orcid.org/0000-0003-3439-4450</orcidid><orcidid>https://orcid.org/0009-0008-2539-6319</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2079-9292 |
ispartof | Electronics (Basel), 2023-09, Vol.12 (18), p.3752 |
issn | 2079-9292 2079-9292 |
language | eng |
recordid | cdi_proquest_journals_2869329682 |
source | MDPI - Multidisciplinary Digital Publishing Institute; EZB Electronic Journals Library |
subjects | Artificial neural networks Automatic modulation recognition Classification Cognitive radio Communication Computer crimes Deep learning Electromagnetism Interceptors Interference Machine learning Methods Modulation (Electronics) Neural networks Object recognition (Computers) Pattern recognition Perturbation Prevention Signal processing Wireless communications |
title | Sparse Adversarial Attacks against DL-Based Automatic Modulation Classification |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-10T19%3A58%3A05IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Sparse%20Adversarial%20Attacks%20against%20DL-Based%20Automatic%20Modulation%20Classification&rft.jtitle=Electronics%20(Basel)&rft.au=Jiang,%20Zenghui&rft.date=2023-09-01&rft.volume=12&rft.issue=18&rft.spage=3752&rft.pages=3752-&rft.issn=2079-9292&rft.eissn=2079-9292&rft_id=info:doi/10.3390/electronics12183752&rft_dat=%3Cgale_proqu%3EA771810680%3C/gale_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2869329682&rft_id=info:pmid/&rft_galeid=A771810680&rfr_iscdi=true |