120
IRUS TotalDownloads
Altmetric
The best defense is a good offense: adversarial attacks to avoid modulation detection
File | Description | Size | Format | |
---|---|---|---|---|
HGG_TIFS20.pdf | Accepted version | 8.08 MB | Adobe PDF | View/Open |
Title: | The best defense is a good offense: adversarial attacks to avoid modulation detection |
Authors: | Hameed, MZ Gyorgy, A Gunduz, D |
Item Type: | Journal Article |
Abstract: | We consider a communication scenario, in which an intruder tries to determine the modulation scheme of the intercepted signal. Our aim is to minimize the accuracy of the intruder, while guaranteeing that the intended receiver can still recover the underlying message with the highest reliability. This is achieved by perturbing channel input symbols at the encoder,similarly to adversarial attacks against classifiers in machine learning. In image classification, the perturbation is limited to be imperceptible to a human observer, while in our case the perturbation is constrained so that the message can still be reliably decoded by the legitimate receiver, which is oblivious to the perturbation. Simulation results demonstrate the viability of our approach to make wireless communication secure against state-of-the-art intruders (using deep learning or decision trees)with minimal sacrifice in the communication performance. On he other hand, we also demonstrate that using diverse training data and curriculum learning can significantly boost the accuracy of the intruder. |
Issue Date: | 21-Sep-2020 |
Date of Acceptance: | 26-Aug-2020 |
URI: | http://hdl.handle.net/10044/1/82724 |
DOI: | 10.1109/TIFS.2020.3025441 |
ISSN: | 1556-6013 |
Publisher: | Institute of Electrical and Electronics Engineers |
Start Page: | 1074 |
End Page: | 1087 |
Journal / Book Title: | IEEE Transactions on Information Forensics and Security |
Volume: | 16 |
Copyright Statement: | © 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |
Sponsor/Funder: | Commission of the European Communities |
Funder's Grant Number: | 677854 |
Keywords: | 08 Information and Computing Sciences 09 Engineering Strategic, Defence & Security Studies |
Publication Status: | Published |
Online Publication Date: | 2020-09-21 |
Appears in Collections: | Electrical and Electronic Engineering Faculty of Engineering |