Classification and Identification of Frequency-Hopping Signals Based on Jacobi Salient Map for Adversarial Sample Attack Approach
Abstract
:1. Introduction
- This experiment demonstrates the limitations of both the conventional gradient attack method and the JSMA method in attacking classification and recognition models for frequency-hopping signals. In response to the non-stationary characteristics of frequency-hopping signals, a new method—BPNT-JSMA—has been proposed to generate adversarial samples specifically tailored for the classification and recognition of such signals.
- The BPNT-JSMA method generates a feature saliency map of the frequency-hopping signal by computing the Jacobian matrix. It then selects, in batches, the feature points with the highest saliency to introduce perturbations, thereby producing adversarial samples. This approach significantly accelerates the generation of adversarial samples compared to the conventional _targetless JSMA method.
- The BPNT-JSMA method introduces a clipping function, which is not available in the NT-JSMA method, and adds restriction to ensure that the perturbation values added to the samples do not exceed a certain range, thus enhancing the stealthiness of the generated adversarial samples.
2. Related Literature Review
2.1. Basic Concepts of Adversarial Samples
2.2. Adversarial Sample Generation Methods
2.2.1. FGSM
2.2.2. I-FGSM
2.2.3. MI-FGFSM
2.2.4. PGD
2.2.5. JSMA
3. BPNT-JSMA Method for Batch Feature Point Non-_target Attack Based on Jacobi Saliency Map
3.1. Basic Idea
3.2. Description of the Attack Method
3.2.1. Jacobian Matrix Calculation
3.2.2. Saliency Map Generation
3.2.3. Adversarial Sample Generation
Algorithm 1 BPNT-JSMA adversarial sample attacks |
Input: Normal signal sample , DNN model , Other types of , Single step disturbance size , Single data point disturbance limit , Total disturbance limit , Iteration number . |
Output: Adversarial samples . |
1: Input the sample into the model , and return the score of each category |
2: Calculate the Jacobian matrix of each category according to and Formula (9) |
3: Calculate the characteristic saliency diagram of other categories of according to Formula (12) and |
4: While saliency graph is not empty |
5: For |
6: Select the significant feature point from according to Formula (13) to add the disturbance |
7: Generate adversarial samples according to Equation (15) |
8: If |
9: Return adversarial sample |
10: Else |
11: If single point disturbance and total disturbance |
12: Continue |
13: Else |
14: Failure to generate adversarial samples |
15: Break for |
16: End for |
17: End while |
4. Experimental Results and Analysis
4.1. Experimental Setup
4.1.1. Data Set
4.1.2. DNN Model
4.1.3. Evaluation Index
- Attack effectiveness
- 2.
- Attack efficiency
- 3.
- Adversarial sample concealment
4.2. Experimental Results and Analysis
4.2.1. _target Model Training Settings
4.2.2. Analysis of Experimental Results
Attack Success Rate (ASR)
Average Confidence of True Class (ACTC) and Average Confidence of Adversarial Class (ACAC)
Average Time Consumption (ATC)
Structural Similarity (SSIM)
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Zhang, J.; Yu, L.; Hou, C.B.; Zhang, J.; Lin, J.X. Frequency hopping signal modulation recognition based on time-frequency characteristics. J. Terahertz Sci. Electron. Inf. 2022, 20, 40–46. [Google Scholar]
- Ji, L.S. Analysis of anti-jamming technology for ultra short wave radio communication. Electron. Commun. Comput. Sci. 2023, 5, 74–76. [Google Scholar]
- Gu, C.M.; Wang, L.W. Individual identification of frequency hopping radio stations based on instantaneous features in the frequency domain. Comput. Eng. Appl. 2013, 49, 223–226. [Google Scholar]
- Yue, F.W. Research and Simulation Implementation of Sorting Method for Frequency Hopping Communication Network Stations. Ph.D. Thesis, University of Electronic Science and Technology of China, Chengdu, China, 2010. [Google Scholar]
- Zhang, X.Q. A Study on the Application of Machine Learning in the Fingerprinting of Radiation Source Signals. Master’s Thesis, University of Electronic Science and Technology of China, Chengdu, China, 2018. [Google Scholar]
- Krizhevsky, A.; Sutskever, I.; Hinton, G.E. ImageNet classification with deep convolutional neural networks. Commun. ACM 2017, 60, 84–90. [Google Scholar] [CrossRef]
- GUI, T.; Xi, Z.H.; Zheng, R. Review of research on robustness of natural language processing based on deep learning. Acta Comput. Sci. 2024, 47, 90–112. [Google Scholar]
- Lin, X.T.; Zhang, L.; Wu, Z.Q. Modulation recognition method based on convolutional neural network with cyclic spectrograms. J. Terahertz Sci. Electron. Inf. Technol. 2021, 19, 617–622. [Google Scholar]
- Yao, Y.C.; Peng, H. Deep Learning Based Automatic Modulation Recognition of Communication Signals. Appl. Electron. Tech. 2019, 45, 12–15. [Google Scholar]
- Lv, G.P.; Xie, Y.L. Deep learning based frequency hopping signal recognition. Telecommun. Eng. 2020, 60, 1142–1147. [Google Scholar]
- Szegedy, C.; Zaremba, W.; Sutskever, I. Intriguing properties of neural networks. In Proceedings of the 2nd International Conference on Learning Representations, Banff, AB, Canada, 14–16 April 2013; pp. 1–10. [Google Scholar]
- Wiyatno, R.; Xu, A. Maximal jacobian-based saliency map attack. arXiv 2018, arXiv:1808.07945. [Google Scholar]
- Goodfellow, I.J.; Shlens, J.; Szegedy, C. Explaining and harnessing adversarial examples. In Proceedings of the 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, 7–9 May 2015. [Google Scholar]
- Kurakin, A.; Goodfellow, I.J.; Bengio, S. Adversarial examples in the physical world. In Artificial Intelligence Safety and Security; Chapman and Hall/CRC: London, UK, 2018; pp. 99–112. [Google Scholar]
- Dong, Y.; Liao, F.; Pang, T.; Su, H.; Zhu, J.; Hu, X.; Li, J. Boosting adversarial attacks with momentum. In Proceedings of the IEEE conference on computer vision and pattern recognition, Salt Lake City, UT, USA, 18–23 June 2018; pp. 9185–9193. [Google Scholar]
- Zhao, H.; Lin, Y.; Gao, S.; Yu, S. Evaluating and improving adversarial attacks on DNN-based modulation recognition. In Proceedings of the GLOBECOM 2020—2020 IEEE Global Communications Conference, Taipei, Taiwan, 7–11 December 2020; pp. 1–5. [Google Scholar]
- Wang, C.; Wei, X.L.; Tian, Q. Feature Gradient Based Deep Network Against Attacks for Modulation Recognition. Comput. Sci. 2021, 48, 25–32. [Google Scholar]
- Madry, A.; Makelov, A.; Schmidt, L. Towards Deep Learning Models Resistant to Adversarial Attacks. In Proceedings of the International Conference on Learning Representations, Vancouver, BC, Canada, 30 April–3 May 2018; Available online: https://openreview.net/forum?id=rJzIBfZAb (accessed on 7 December 2023).
- Papernot, N.; McDaniel, P.; Jha, S.; Fredrikson, M.; Celik, Z.B.; Swami, A. The limitations of deep learning in adversarial settings. In Proceedings of the 2016 IEEE European symposium on security and privacy (EuroS&P), Saarbrücken, Germany, 21–24 March 2016; pp. 372–387. [Google Scholar]
- Li, Z.M.; Wang, J.D.; Hou, J.Z. A significant region optimisation based approach to adversarial samples attacks. Comput. Eng. 2023, 49, 246–255. [Google Scholar]
- Christian, S.; Wojciech, Z.; Ilya, S. Intriguing Properties of Neural Networks. arXiv 2021, arXiv:1312.6199. [Google Scholar]
- Sadeghi, M.; Larsson, E.G. Adversarial attacks on deep-learning based radio signal classification. IEEE Wirel. Commun. Lett. 2019, 8, 213–216. [Google Scholar] [CrossRef]
- Sainath, T.N.; Vinyals, O.; Senior, A.; Sak, H. Convolutional, long short-term memory, fully connected deep neural networks. In Proceedings of the 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brisbane, Australia, 19–24 April 2015; pp. 4580–4584. [Google Scholar]
- O’Shea, T.J.; Roy, T.; Clancy, T.C. Over-the-air deep learning based radio signal classification. IEEE J. Sel. Top. Signal Process. 2018, 12, 168–179. [Google Scholar] [CrossRef]
- Zhou, X.; Zhang, J.; Li, N.A. A salient graph based method for electromagnetic signal adversarial samples generation. Acta Electron. Sin. 2023, 51, 1917–1928. [Google Scholar]
Signal Type | Hopping Speed | Carrier Frequency | Label |
---|---|---|---|
Signal 1 | 500 | 0–1.6 | 0 |
Signal 2 | 500 | 1.6–3.2 | 1 |
Signal 3 | 1000 | 0–1.6 | 2 |
Signal 4 | 1000 | 1.6–3.2 | 3 |
Layers | Output Shape |
---|---|
Conv2D | (512,512) |
Maxpooling2D | (256,512) |
Dropout | (256,512) |
Conv2D | (256,512) |
Maxpooling2D | (128,512) |
Dropout | (128,512) |
Conv2D | (128,128) |
Maxpooling2D | (64,128) |
Dropout | (64,128) |
Conv2D | (64,128) |
Maxpooling2D | (32,128) |
Dropout | (32,128) |
Flatten | 4096 |
Dense | 256 |
Dense | 4 |
ASR/% | ACTC/% | ACAC/% | ATC/s | SSIM/% | |
---|---|---|---|---|---|
FGSM | 60.09 | 4.13 | 48.30 | 0.0017 | 57.87 |
I-FGSM | 69.31 | 2.56 | 58.26 | 0.0116 | 64.49 |
MI-FGSM | 68.44 | 2.70 | 57.27 | 0.0125 | 70.10 |
PGD | 74.56 | 1.83 | 63.98 | 0.0127 | 75.03 |
NT-JSMA | 83.33 | 0.85 | 79.37 | 0.1061 | 81.34 |
BPNT-JSMA | 84.76 | 0.72 | 80.14 | 0.0706 | 88.12 |
ASR/% | ACTC/% | ACAC/% | ATC/s | SSIM/% | |
---|---|---|---|---|---|
FGSM | 59.53 | 4.18 | 48.31 | 0.0034 | 58.63 |
I-FGSM | 72.69 | 2.01 | 63.18 | 0.0227 | 63.62 |
MI-FGSM | 70.15 | 2.35 | 60.59 | 0.0244 | 70.28 |
PGD | 78.44 | 1.30 | 69.84 | 0.0252 | 76.96 |
NT-JSMA | 84.59 | 0.69 | 81.40 | 0.1451 | 83.85 |
BPNT-JSMA | 85.49 | 0.61 | 82.53 | 0.0893 | 92.46 |
ASR/% | ACTC/% | ACAC/% | ATC/s | SSIM/% | |
---|---|---|---|---|---|
FGSM | 62.07 | 4.17 | 45.01 | 0.0015 | 51.30 |
I-FGSM | 71.97 | 2.43 | 56.68 | 0.0103 | 60.12 |
MI-FGSM | 71.49 | 2.49 | 56.32 | 0.0103 | 67.06 |
PGD | 77.90 | 1.59 | 63.79 | 0.0110 | 75.72 |
NT-JSMA | 85.69 | 0.74 | 80.77 | 0.2644 | 83.66 |
BPNT-JSMA | 86.03 | 0.79 | 80.09 | 0.1995 | 90.72 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zhu, Y.; Li, Y.; Wei, T. Classification and Identification of Frequency-Hopping Signals Based on Jacobi Salient Map for Adversarial Sample Attack Approach. Sensors 2024, 24, 7070. https://doi.org/10.3390/s24217070
Zhu Y, Li Y, Wei T. Classification and Identification of Frequency-Hopping Signals Based on Jacobi Salient Map for Adversarial Sample Attack Approach. Sensors. 2024; 24(21):7070. https://doi.org/10.3390/s24217070
Chicago/Turabian StyleZhu, Yanhan, Yong Li, and Tianyi Wei. 2024. "Classification and Identification of Frequency-Hopping Signals Based on Jacobi Salient Map for Adversarial Sample Attack Approach" Sensors 24, no. 21: 7070. https://doi.org/10.3390/s24217070
APA StyleZhu, Y., Li, Y., & Wei, T. (2024). Classification and Identification of Frequency-Hopping Signals Based on Jacobi Salient Map for Adversarial Sample Attack Approach. Sensors, 24(21), 7070. https://doi.org/10.3390/s24217070