Signal identification attack defense method based on generative adversarial network

A network attack, generative technology, applied in biological neural network models, wireless communication, electrical components, etc., can solve problems such as adversarial attacks, signal transmission security risks, security risks, etc.

Active Publication Date: 2020-05-15
ZHEJIANG UNIV OF TECH
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Even with a well-trained deep learning model, in the face of some special subtle disturbances, if there is a misjudgment of classification, it is easy to seriously interfere with the identification of signal modulation types, resulting in errors in the extraction of important information in the signal and delays. Real-time communication, causing hidden dangers of signal transmission security issues
For example: In Meysam Sadeghi, Erik G.Larsson's "Adversarial Attacks on Deep-Learning Based Radio Signal Clas

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Signal identification attack defense method based on generative adversarial network
  • Signal identification attack defense method based on generative adversarial network
  • Signal identification attack defense method based on generative adversarial network

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0055] The present invention will be further described below in conjunction with the drawings.

[0056] Reference Figure 1 ~ Figure 4 , A defense method based on generative countermeasures against network attacks, including the following steps:

[0057] 1) Use long and short-term memory network (LSTM) to build a suitable generative adversarial network structure GAN.

[0058] Among them, the generative confrontation network structure built by LSTM, referred to as GAN. It includes a generative model G for outputting adversarial samples based on benign input samples and a discriminant model D for judging the authenticity of input adversarial samples. The network complexity of the generated model and the discriminant model should be as similar as possible to ensure that the maximum game training effect can be achieved during the mutual training of the dual models.

[0059] Because the generative confrontation network adopts the idea of ​​zero-sum game in game theory, the generative net...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A defense method based on generative adversarial network attacks comprises the following steps: 1) establishing an appropriate generative adversarial network structure GAN by using a long short term memory (LSTM) network; 2) pre-training a discrimination model in the structure; 3) according to the loss function of the generator G, training the generator G by taking the number of iterations as a limit and the convergence loss function as a purpose; 4) according to the loss function of the generator D, training the generator D by taking the number of iterations as a limit and the convergence loss function as a purpose; (5) repeating the steps (3) to (4), optimizing a generator and a discriminator in the generative adversarial network in turn, obtaining a better network structure by taking the number of iterations as an upper limit, and completing the generation of an optimal adversarial sample; 6) observing indexes of the adversarial samples and generating a large number of adversarial samples of different types of signals, and 7) adding some screened adversarial samples into a model training stage to achieve a defense effect on signal boundary exploration attacks.

Description

technical field [0001] The invention relates to a defense method against network attacks based on generation. Background technique [0002] Deep learning can obtain more accurate classification results than general algorithms by learning and calculating the potential connections of large amounts of data, and has powerful feature learning capabilities and feature expression capabilities. Therefore, deep learning technology is widely used in the field of artificial intelligence, including automatic driving technology, augmented reality technology, computer vision, biomedical diagnosis, natural language processing technology, etc. Deep learning uses neural networks with huge parameters, such as typical convolutional neural networks (CNN) and recurrent neural networks (RNN), for feature extraction, which can effectively complete the processing of image data and time series data. [0003] At present, deep learning technology has been more and more widely used in the field of rad...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/12G06N3/04H04W12/122
CPCH04W12/122G06N3/044G06N3/045
Inventor 陈晋音朱伟鹏郑海斌成凯回
Owner ZHEJIANG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products