Transfer adversarial attacks across industrial intelligent systems

被引:4
|
作者
Yin, Zhenqin [1 ]
Zhuo, Yue [1 ]
Ge, Zhiqiang [1 ]
机构
[1] Zhejiang Univ, Coll Control Sci & Engn, Key Lab Ind Control Technol, Hangzhou 310027, Peoples R China
基金
中国国家自然科学基金;
关键词
Intelligent systems security; Industrial intelligent systems; Adversarial attack; Transfer-based attack; Adversarial defense; SECURITY;
D O I
10.1016/j.ress.2023.109299
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
As indispensable parts of industrial production control, data-driven industrial intelligent systems (IIS) achieve efficient executions of significant tasks such as fault classification (FC), fault detection (FD), and soft sensing (SS). Recently, machine learning models have been proven vulnerable to adversarial attacks, where the transfer-based attacks provide highly feasible attacks on systems in real-world black-box scenarios. In this paper, to study the practical security risks of IIS, we investigate transferable adversarial attacks from: (1) showing the existence of transferable adversarial examples across different industrial tasks; (2) exploring factors (e.g., data feature, model structure, and attack method) affecting transferability under multi-scenarios; (3) proposing a new method to enhance the transferability; (4) providing guidelines on practical system deployments to defend against transferable adversarial threats. The attacks demonstrate generality on two types of datasets, Tennessee Eastman industrial process (TEP) and WM-811K wafer map dataset, and the experiment results show that: (1) transfer is asymmetric and complex models are relatively stable with low sample transferability; (2) iterative and single-step methods have opposite performance characteristics under the intra-and cross-task transfer; (3) overfitting of optimization methods leads to weak transferability; (4) smoothing gradients and widening intermediate layer perturbations are effective directions for improving transferability.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] Practical Adversarial Attacks Against Speaker Recognition Systems
    Li, Zhuohang
    Shi, Cong
    Xie, Yi
    Liu, Jian
    Yuan, Bo
    Chen, Yingying
    PROCEEDINGS OF THE 21ST INTERNATIONAL WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS (HOTMOBILE'20), 2020, : 9 - 14
  • [42] MITIGATING ADVERSARIAL ATTACKS ON MEDICAL IMAGE UNDERSTANDING SYSTEMS
    Paul, Rahul
    Schabath, Matthew
    Gillies, Robert
    Hall, Lawrence
    Goldgof, Dmitry
    2020 IEEE 17TH INTERNATIONAL SYMPOSIUM ON BIOMEDICAL IMAGING (ISBI 2020), 2020, : 1517 - 1521
  • [43] Ensemble Adversarial Defenses and Attacks in Speaker Verification Systems
    Chen, Zesheng
    Li, Jack
    Chen, Chao
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (20): : 32645 - 32655
  • [44] Securing Malware Cognitive Systems against Adversarial Attacks
    Ti, Yuede
    Bowman, Benjamin
    Huang, H. Howie
    2019 IEEE INTERNATIONAL CONFERENCE ON COGNITIVE COMPUTING (IEEE ICCC 2019), 2019, : 1 - 9
  • [45] On Adversarial Examples and Stealth Attacks in Artificial Intelligence Systems
    Tyukin, Ivan Y.
    Higham, Desmond J.
    Gorban, Alexander N.
    2020 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2020,
  • [46] ADVERSARIAL PERTURBATION ATTACKS ON NESTED DICHOTOMIES CLASSIFICATION SYSTEMS
    Alkhouri, Ismail R.
    Velasquez, Alvaro
    Atia, George K.
    2021 IEEE 31ST INTERNATIONAL WORKSHOP ON MACHINE LEARNING FOR SIGNAL PROCESSING (MLSP), 2021,
  • [47] Universal Adversarial Attacks On Spoken Language Assessment Systems
    Raina, Vyas
    Gales, Mark J. F.
    Knill, Kate M.
    INTERSPEECH 2020, 2020, : 3855 - 3859
  • [48] Toward Practical Adversarial Attacks on Face Verification Systems
    Kakizaki, Kazuya
    Miyagawa, Taiki
    Singh, Inderjeet
    Sakuma, Jun
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE OF THE BIOMETRICS SPECIAL INTEREST GROUP (BIOSIG 2021), 2021, 315
  • [49] QFA2SR: Query-Free Adversarial Transfer Attacks to Speaker Recognition Systems
    Chen, Guangke
    Zhang, Yedi
    Zhao, Zhe
    Song, Fu
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 2437 - 2454
  • [50] On the Detection of Adaptive Adversarial Attacks in Speaker Verification Systems
    Chen, Zesheng
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (18) : 16271 - 16283