Transfer adversarial attacks across industrial intelligent systems

被引:4
|
作者
Yin, Zhenqin [1 ]
Zhuo, Yue [1 ]
Ge, Zhiqiang [1 ]
机构
[1] Zhejiang Univ, Coll Control Sci & Engn, Key Lab Ind Control Technol, Hangzhou 310027, Peoples R China
基金
中国国家自然科学基金;
关键词
Intelligent systems security; Industrial intelligent systems; Adversarial attack; Transfer-based attack; Adversarial defense; SECURITY;
D O I
10.1016/j.ress.2023.109299
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
As indispensable parts of industrial production control, data-driven industrial intelligent systems (IIS) achieve efficient executions of significant tasks such as fault classification (FC), fault detection (FD), and soft sensing (SS). Recently, machine learning models have been proven vulnerable to adversarial attacks, where the transfer-based attacks provide highly feasible attacks on systems in real-world black-box scenarios. In this paper, to study the practical security risks of IIS, we investigate transferable adversarial attacks from: (1) showing the existence of transferable adversarial examples across different industrial tasks; (2) exploring factors (e.g., data feature, model structure, and attack method) affecting transferability under multi-scenarios; (3) proposing a new method to enhance the transferability; (4) providing guidelines on practical system deployments to defend against transferable adversarial threats. The attacks demonstrate generality on two types of datasets, Tennessee Eastman industrial process (TEP) and WM-811K wafer map dataset, and the experiment results show that: (1) transfer is asymmetric and complex models are relatively stable with low sample transferability; (2) iterative and single-step methods have opposite performance characteristics under the intra-and cross-task transfer; (3) overfitting of optimization methods leads to weak transferability; (4) smoothing gradients and widening intermediate layer perturbations are effective directions for improving transferability.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] ADVERSARIAL ATTACKS AGAINST AUDIO SURVEILLANCE SYSTEMS
    Ntalampiras, Stavros
    2022 30TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO 2022), 2022, : 284 - 288
  • [22] Adversarial Attacks on License Plate Recognition Systems
    Gu, Zhaoquan
    Su, Yu
    Liu, Chenwei
    Lyu, Yinyu
    Jian, Yunxiang
    Li, Hao
    Cao, Zhen
    Wang, Le
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 65 (02): : 1437 - 1452
  • [23] Defending Distributed Systems Against Adversarial Attacks
    Su L.
    Performance Evaluation Review, 2020, 47 (03): : 24 - 27
  • [24] Generative Adversarial Attacks on Fingerprint Recognition Systems
    Kwon, Hee Won
    Nam, Jea-Won
    Kim, Joongheon
    Lee, Youn Kyu
    35TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2021), 2021, : 483 - 485
  • [25] Universal Adversarial Attacks for Visual Odometry Systems
    Xie, Xijin
    Liao, Longlong
    Yu, Yuanlong
    Guo, Di
    Liu, Huaping
    2023 IEEE International Conference on Development and Learning, ICDL 2023, 2023, : 288 - 293
  • [26] Adversarial Attacks on Adaptive Cruise Control Systems
    Guo, Yanan
    Sato, Takami
    Cao, Yulong
    Chen, Qi Alfred
    Cheng, Yueqiang
    2023 CYBER-PHYSICAL SYSTEMS AND INTERNET-OF-THINGS WEEK, CPS-IOT WEEK WORKSHOPS, 2023, : 49 - 54
  • [27] Adversarial Attacks Against Binary Similarity Systems
    Capozzi, Gianluca
    D'elia, Daniele Cono
    Di Luna, Giuseppe Antonio
    Querzoni, Leonardo
    IEEE ACCESS, 2024, 12 : 161247 - 161269
  • [28] Adversarial Attacks Against IoT Identification Systems
    Kotak, Jaidip
    Elovici, Yuval
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (09) : 7868 - 7883
  • [29] Observability of linear systems under adversarial attacks
    Chong, Michelle S.
    Wakaiki, Masashi
    Hespanha, Joao P.
    2015 AMERICAN CONTROL CONFERENCE (ACC), 2015, : 2439 - 2444
  • [30] Negatively correlated ensemble against transfer adversarial attacks
    Zhao, Yunce
    Huang, Wei
    Liu, Wei
    Yao, Xin
    PATTERN RECOGNITION, 2025, 161