Important-data-based attack design and resilient remote estimation for recurrent neural networks

被引:0
|
作者
Zhao, Xia [1 ]
Wang, Xun [3 ]
Wu, Jiancun [2 ]
Chen, Hongtian [4 ]
Tian, Engang [2 ]
机构
[1] Lib Univ Shanghai Sci & Technol, Shanghai 200093, Peoples R China
[2] Univ Shanghai Sci & Technol, Dept Opt Elect & Comp Engn, Shanghai 200093, Peoples R China
[3] Tongji Univ, Shanghai Res Inst Intelligent Autonomous Syst, Shanghai 200092, Peoples R China
[4] Univ Alberta, Dept Chem & Mat Engn, Edmonton, AB T6G 1H9, Canada
基金
中国国家自然科学基金; 上海市自然科学基金;
关键词
Important-data-based (IDB) attack strategy; Resilient H(infinity)state estimator; Recurrent neural networks (RNNs); CONTROL-SYSTEMS; DOS ATTACK;
D O I
10.1016/j.ins.2024.120723
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, an attack-defense framework is proposed for the remote 7l infinity infinity state estimation of delayed recurrent neural networks (RNNs). Firstly, an important-data-based (IDB) attack strategy is constructed, which can identify the important packets that play essential roles in the estimation and selectively attack them based on their importance degree from the perspective of the attackers. By targeting the important packets, larger attack damages can be achieved. Then, a resilient state estimator that can resist IDB attacks is developed from the defenders' point of view. Notably, some unrealistic assumptions (e.g., the attacker knowing the system structure and full parameters, the defender knowing the attack rate/parameters) are removed, which makes the proposed method easy to implement. At last, simulation results are presented to show the larger destructive effect of the constructed IDB attack and the efficiency of the proposed resilient H infinity infinity state estimator.
引用
下载
收藏
页数:12
相关论文
共 50 条
  • [1] Novel attack-defense framework for nonlinear complex networks: An important-data-based method
    Wang, Xun
    Tian, Engang
    Wei, Bin
    Liu, Jinliang
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2023, 33 (04) : 2861 - 2878
  • [2] Important-Data-Based DoS Attack Mechanism and Resilient H8 Filter Design for Networked T-S Fuzzy Systems
    Wang, Xun
    Tian, Engang
    Zheng, Wei Xing
    Xie, Xiangpeng
    IEEE TRANSACTIONS ON CYBERNETICS, 2024, 54 (05) : 3352 - 3362
  • [3] Resilient filter design of fuzzy cyber-physical system subject to important-data-based DoS attacks
    You, Wenwen
    Xie, Xiangpeng
    Xia, Jianwei
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2024, 34 (11) : 7245 - 7264
  • [4] Stochastic important-data-based attack model and defense strategies for cyber-physical system: A data-driven method
    Zhang, Chunting
    Zhao, Xia
    Tian, Engang
    Zou, Yi
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2024, 34 (08) : 5384 - 5398
  • [5] Estimation of groundwater level based on the robust training of recurrent neural networks using corrupted data
    Jeong, Jina
    Park, Eungyu
    Chen, Huali
    Kim, Kue-Young
    Han, Weon Shik
    Suk, Heejun
    JOURNAL OF HYDROLOGY, 2020, 582
  • [6] INTERPRETABILITY OF RECURRENT NEURAL NETWORKS IN REMOTE SENSING
    Perez-Suay, Adrian
    Adsuara, Jose E.
    Piles, Maria
    Martinez-Ferrer, Laura
    Diaz, Emiliano
    Moreno-Martinez, Alvaro
    Camps-Valls, Gustau
    IGARSS 2020 - 2020 IEEE INTERNATIONAL GEOSCIENCE AND REMOTE SENSING SYMPOSIUM, 2020, : 3991 - 3994
  • [7] QIENet: Quantitative irradiance estimation network using recurrent neural network based on satellite remote sensing data
    Nie, Longfeng
    Chen, Yuntian
    Zhang, Dongxiao
    Liu, Xinyue
    Yuan, Wentian
    INTERNATIONAL JOURNAL OF APPLIED EARTH OBSERVATION AND GEOINFORMATION, 2024, 127
  • [8] Exponential state estimation for delayed recurrent neural networks with sampled-data
    Nan Li
    Jiawen Hu
    Jiming Hu
    Lin Li
    Nonlinear Dynamics, 2012, 69 : 555 - 564
  • [9] Exponential state estimation for delayed recurrent neural networks with sampled-data
    Li, Nan
    Hu, Jiawen
    Hu, Jiming
    Li, Lin
    NONLINEAR DYNAMICS, 2012, 69 (1-2) : 555 - 564
  • [10] Inconspicuous Data Augmentation Based Backdoor Attack on Deep Neural Networks
    Xu, Chaohui
    Liu, Wenye
    Zheng, Yue
    Wang, Si
    Chang, Chip-Hong
    2022 IEEE 35TH INTERNATIONAL SYSTEM-ON-CHIP CONFERENCE (IEEE SOCC 2022), 2022, : 237 - 242