Transfer adversarial attacks across industrial intelligent systems

被引:4
|
作者
Yin, Zhenqin [1 ]
Zhuo, Yue [1 ]
Ge, Zhiqiang [1 ]
机构
[1] Zhejiang Univ, Coll Control Sci & Engn, Key Lab Ind Control Technol, Hangzhou 310027, Peoples R China
基金
中国国家自然科学基金;
关键词
Intelligent systems security; Industrial intelligent systems; Adversarial attack; Transfer-based attack; Adversarial defense; SECURITY;
D O I
10.1016/j.ress.2023.109299
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
As indispensable parts of industrial production control, data-driven industrial intelligent systems (IIS) achieve efficient executions of significant tasks such as fault classification (FC), fault detection (FD), and soft sensing (SS). Recently, machine learning models have been proven vulnerable to adversarial attacks, where the transfer-based attacks provide highly feasible attacks on systems in real-world black-box scenarios. In this paper, to study the practical security risks of IIS, we investigate transferable adversarial attacks from: (1) showing the existence of transferable adversarial examples across different industrial tasks; (2) exploring factors (e.g., data feature, model structure, and attack method) affecting transferability under multi-scenarios; (3) proposing a new method to enhance the transferability; (4) providing guidelines on practical system deployments to defend against transferable adversarial threats. The attacks demonstrate generality on two types of datasets, Tennessee Eastman industrial process (TEP) and WM-811K wafer map dataset, and the experiment results show that: (1) transfer is asymmetric and complex models are relatively stable with low sample transferability; (2) iterative and single-step methods have opposite performance characteristics under the intra-and cross-task transfer; (3) overfitting of optimization methods leads to weak transferability; (4) smoothing gradients and widening intermediate layer perturbations are effective directions for improving transferability.
引用
收藏
页数:13
相关论文
共 50 条
  • [31] Unscrambling the Rectification of Adversarial Attacks Transferability across Computer Networks
    Nowroozi, Ehsan
    Ghelichkhani, Samaneh
    Haider, Imran
    Dehghantanha, Ali
    arXiv, 2023,
  • [32] HEADLESS HORSEMAN: ADVERSARIAL ATTACKS ON TRANSFER LEARNING MODELS
    Abdelkader, Ahmed
    Curry, Michael J.
    Fowl, Liam
    Goldstein, Tom
    Schwarzschild, Avi
    Shu, Manli
    Studer, Christoph
    Zhu, Chen
    2020 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2020, : 3087 - 3091
  • [33] Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks
    Demontis, Ambra
    Melis, Marco
    Pintor, Maura
    Jagielski, Matthew
    Biggio, Battista
    Oprea, Alina
    Nita-Rotaru, Cristina
    Roli, Fabio
    PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, 2019, : 321 - 338
  • [34] Adaptive Normalized Attacks for Learning Adversarial Attacks and Defenses in Power Systems
    Tian, Jiwei
    Li, Tengyao
    Shang, Fute
    Cao, Kunrui
    Li, Jing
    Ozay, Mete
    2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CONTROL, AND COMPUTING TECHNOLOGIES FOR SMART GRIDS (SMARTGRIDCOMM), 2019,
  • [35] Constrained optimization based adversarial example generation for transfer attacks in network intrusion detection systems
    Chale, Marc
    Cox, Bruce
    Weir, Jeffery
    Bastian, Nathaniel D.
    OPTIMIZATION LETTERS, 2024, 18 (09) : 2169 - 2188
  • [36] SoK: Realistic adversarial attacks and defenses for intelligent network intrusion detection
    Vitorino, Joao
    Praca, Isabel
    Maia, Eva
    COMPUTERS & SECURITY, 2023, 134
  • [37] ADVERSARIAL ATTACKS ON ADVERSARIAL BANDITS
    Microsoft Azure AI
    不详
    arXiv, 1600,
  • [38] Intelligent deception techniques against adversarial attack on the industrial system
    Kumari, Suchi
    Yadav, Riteshkumar Jayprakash
    Namasudra, Suyel
    Hsu, Ching-Hsien
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2021, 36 (05) : 2412 - 2437
  • [39] Adversarial Attacks on Regression Systems via Gradient Optimization
    Kong, Xiangyin
    Ge, Zhiqiang
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2023, 53 (12): : 7827 - 7839
  • [40] Defending Against Adversarial Attacks in Speaker Verification Systems
    Chang, Li-Chi
    Chen, Zesheng
    Chen, Chao
    Wang, Guoping
    Bi, Zhuming
    2021 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE (IPCCC), 2021,