Enhancing Adversarial Transferability With Intermediate Layer Feature Attack on Synthetic Aperture Radar Images

被引:0
|
作者
Wan, Xuanshen [1 ]
Liu, Wei [1 ]
Niu, Chaoyang [1 ]
Lu, Wanjie [1 ]
Li, Yuanli [1 ]
机构
[1] Informat Engn Univ, Zhengzhou 450001, Peoples R China
基金
中国国家自然科学基金;
关键词
Perturbation methods; Closed box; Synthetic aperture radar; Generators; Data models; Radar polarimetry; Target recognition; Training data; Artificial neural networks; Training; Adversarial example; automatic target recognition (ATR); deep neural network (DNN); synthetic aperture radar (SAR); transferability; CONVOLUTIONAL NEURAL-NETWORK;
D O I
10.1109/JSTARS.2024.3507374
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Synthetic aperture radar (SAR) automatic target recognition (ATR) systems based on deep neural network models are vulnerable to adversarial examples. Existing SAR adversarial attack algorithms require access to the network structure, parameters, and training data, which are often inaccessible in real-world scenarios. To address this problem, this study proposes an intermediate layer feature attack algorithm that does not rely on training data for the adversary model. Electromagnetic simulation is used to obtain the simulated SAR local data domain during the training stage. A lightweight generator, TinyResNet, is introduced to quickly construct adversarial examples through a one-step mapping process. In addition, the transferability of these examples across different models is improved by eliminating the intermediate layer features of the model. Finally, a domain-agnostic feature attention module is utilized to reduce discrepancies between different data domains from a model perspective, further improving the transferability of adversarial examples across domains. Experimental results on five SAR datasets of ground vehicles, ships, and scene types demonstrate that the proposed algorithm outperforms 13 mainstream adversarial attack algorithms in terms of cross-model and cross-data domain transferability. In particular, the proposed method improves the cross-domain attack success rate by 43.74%-48.88% on the MSTAR dataset.
引用
收藏
页码:1638 / 1655
页数:18
相关论文
共 50 条
  • [21] Compression of Synthetic-Aperture Radar Images
    Bielecka, Marzena
    Bielecki, Andrzej
    Wojdanowski, Wojciech
    COMPUTER VISION AND GRAPHICS, ICCVG 2014, 2014, 8671 : 92 - +
  • [22] Difficulties in superresolving synthetic aperture radar images
    Doerry, AW
    Dickey, FM
    Romero, LA
    DeLaurentis, JM
    ALGORITHMS FOR SYNTHETIC APERTURE RADAR IMAGERY IX, 2002, 4727 : 122 - 133
  • [23] Parallel matching of synthetic aperture radar images
    Goller, A
    PARALLEL COMPUTATION, 1999, 1557 : 408 - 416
  • [24] Compression of synthetic-aperture radar images
    1600, Springer Verlag (8671):
  • [25] Statistical investigations of the synthetic aperture radar images
    Totsky, A.V.
    Gorbunenko, B.F.
    Technological Forecasting and Social Change, 1994, 46 (03) : 1761 - 1774
  • [26] Oceanic eddies in synthetic aperture radar images
    Ivanov A.Y.
    Ginzburg A.I.
    Journal of Earth System Science, 2002, 111 (3) : 281 - 295
  • [27] Automatic segmentation for synthetic aperture radar images
    Li, Ying
    Shi, Qin-Feng
    Zhang, Yan-Ning
    Zhao, Rong-Chun
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2006, 28 (05): : 932 - 935
  • [28] Oceanic eddies in synthetic aperture radar images
    Ivanov, AY
    Ginzburg, AI
    PROCEEDINGS OF THE INDIAN ACADEMY OF SCIENCES-EARTH AND PLANETARY SCIENCES, 2002, 111 (03): : 281 - 295
  • [29] Lossless compression of synthetic aperture radar images
    Ives, RW
    Magotra, N
    Mandyam, GD
    ISCAS 96: 1996 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS - CIRCUITS AND SYSTEMS CONNECTING THE WORLD, VOL 2, 1996, : 441 - 444
  • [30] Enhancing the Transferability of Adversarial Attacks via Multi-Feature Attention
    Zheng, Desheng
    Ke, Wuping
    Li, Xiaoyu
    Duan, Yaoxin
    Yin, Guangqiang
    Min, Fan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 1462 - 1474