Defense method based on signal boundary exploration attack

A signal and boundary technology, applied in the field of defense based on signal boundary exploration attacks, can solve problems affecting normal life order, wrong signal modulation type, etc.

Active Publication Date: 2020-02-07
ZHEJIANG UNIV OF TECH
View PDF7 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, compared with some other types of black-box attack methods, one requires less model information and can also be powerful against black-box attacks. Decision-based black-box attacks, such as boundary groping attacks, are easier to attack Machine learning algorithms in the real world interfere, causing errors in signal modulation types and affecting normal life order

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Defense method based on signal boundary exploration attack
  • Defense method based on signal boundary exploration attack
  • Defense method based on signal boundary exploration attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, and do not limit the protection scope of the present invention.

[0025] In practical applications, it is often necessary to classify the modulation types of wireless signals such as amplitude modulation (AM ASK), frequency modulation (FM FSK) and phase modulation (phase modulation PSK), but in the process of classification, it is often attacked , leading to classification errors. In order to defend against attacks and damages to wireless signals, this embodiment provides a defense method based on signal boundary groping attacks. The defense method includes two phases, which are the counter signal generation phase and the application ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a defense method based on signal boundary exploration attack, which comprises the following steps: S101, screening a to-be-attacked signal A, and carrying out initialization disturbance addition to obtain an adversarial signal A '; S102, according to confidence coefficient changes of the to-be-attacked signal A and the countermeasure signal A ', judging a decision boundarydistribution condition around the to-be-attacked signal A; S103, performing disturbance modification on the countermeasure signal A' according to the decision boundary distribution condition around the to-be-attacked signal A; S104, randomly generating deviation disturbance, so that the adversarial signal A' explores the boundary; S105, optimizing disturbance to enable the countermeasure signal A'not to deviate from an expected track; S106, realizing disturbance optimization until an iteration upper limit is reached or a good confrontation signal A' is obtained; S107, screening adversarial signals, adding the adversarial signals into the training set, and training the signal classification model; and S108, classifying the to-be-classified signals by utilizing the trained signal classification model so as to defend attacks.

Description

technical field [0001] The invention belongs to the research field of deep learning algorithms and data security in the field of artificial intelligence, and specifically relates to a defense method based on signal boundary groping attacks. Background technique [0002] Deep learning can obtain more accurate classification results than general algorithms by learning and calculating the potential connections of large amounts of data, and has powerful feature learning capabilities and feature expression capabilities. The core of deep learning is to use a neural network with huge parameters for feature extraction. Typical neural networks include convolutional neural network (CNN) and recurrent neural network (RNN). [0003] In the past few years, in addition to achieving great success in the fields of computer vision and natural language processing, deep learning technology has also been widely used in other fields, including the use of convolutional neural networks to realize ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06K9/00
CPCH04L63/1441G06F2218/12
Inventor 陈晋音朱伟鹏成凯回郑海斌
Owner ZHEJIANG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products