WiCAM: Imperceptible Adversarial Attack on Deep Learning based WiFi Sensing

被引:7
|
作者
Xu, Leiyang [1 ]
Zheng, Xiaolong [1 ]
Li, Xiangyuan [1 ]
Zhang, Yucheng [1 ]
Liu, Liang [1 ]
Ma, Huadong [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Beijing Key Lab Intelligent Telecommun Software &, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1109/SECON55815.2022.9918564
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularization of deep learning models in wireless sensing, researchers have made considerable efforts to construct sophisticated models to improve the accuracy of related applications. But very few studies have addressed the potential vulnerabilities of deep models, and existing works evaluate wireless adversarial performance only in communication or sensing. None of them has a comprehensive definition of attack imperceptibility. In this paper, we come up with a definition of the wireless attack imperceptibility for both communication and sensing. Our goal is to craft an adversarial perturbation, which can degrade the performance of WiFi sensing without compromising WiFi communication. To achieve this goal, we propose WiCAM to reveal the temporal and spatial attention of a DNN, capturing the crucial portions of its input. Then we design a mask to limit adversarial perturbation in the attended parts only, and thus the impact of the attack on WiFi communication is minimized WiCAM is a general adversarial framework that can integrate existing adversarial methods such as FGSM and PGD to generate perturbations. We carry out experiments on three popular WiFi sensing applications, including human activity recognition, gesture recognition, and user identification. Extensive experiments are conducted on both public datasets and self-collected datasets. The results show that when declining the accuracy of a target model below 50%, WiCAM can reduce the impact on communication in terms of BER by up to 77.78% in QAM-64, compared to the common adversarial methods.
引用
收藏
页码:10 / 18
页数:9
相关论文
共 50 条
  • [1] An Imperceptible Eavesdropping Attack on WiFi Sensing Systems
    Lu, Li
    Chen, Meng
    Yu, Jiadi
    Ba, Zhongjie
    Lin, Feng
    Han, Jinsong
    Zhu, Yanmin
    Ren, Kui
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2024,
  • [2] Universal Adversarial Attack on Deep Learning Based Prognostics
    Basak, Arghya
    Rathore, Pradeep
    Nistala, Sri Harsha
    Srinivas, Sagar
    Runkana, Venkataramana
    [J]. 20TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2021), 2021, : 23 - 29
  • [3] RIA: A Reversible Network-based Imperceptible Adversarial Attack
    Li, Fanxiao
    Liu, Renyang
    He, Zhenli
    Gao, Song
    Dong, Yunyun
    Zhou, Wei
    [J]. 2022 IEEE 34TH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE, ICTAI, 2022, : 996 - 1001
  • [4] Similarity attack: An adversarial attack game for image classification based on deep learning
    Tian, Xuejun
    Tian, Xinyuan
    Pan, Bingqin
    [J]. JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2023, 23 (03) : 1467 - 1478
  • [5] Imperceptible Misclassification Attack on Deep Learning Accelerator by Glitch Injection
    Liu, Wenye
    Chang, Chip-Hong
    Zhang, Fan
    Lou, Xiaoxuan
    [J]. PROCEEDINGS OF THE 2020 57TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2020,
  • [6] Adversarial Attack for Deep Reinforcement Learning Based Demand Response
    Wan, Zhiqiang
    Li, Hepeng
    Shuai, Hang
    Sun, Yan
    He, Haibo
    [J]. 2021 IEEE POWER & ENERGY SOCIETY GENERAL MEETING (PESGM), 2021,
  • [7] Adversarial Attack on Deep Learning-Based Splice Localization
    Rozsa, Andras
    Zhong, Zheng
    Boult, Terrance E.
    [J]. 2020 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW 2020), 2020, : 2757 - 2765
  • [8] Saliency Attack: Towards Imperceptible Black-box Adversarial Attack
    Dai, Zeyu
    Liu, Shengcai
    Li, Qing
    Tang, Ke
    [J]. ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2023, 14 (03)
  • [9] Practical Adversarial Attack on WiFi Sensing Through Unnoticeable Communication Packet Perturbation
    Li, Changming
    Xu, Mingjing
    Du, Yicong
    Liu, Limin
    Shi, Cong
    Wang, Yan
    Liu, Hongbo
    Chen, Yingying
    [J]. PROCEEDINGS OF THE THIRTIETH INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, ACM MOBICOM 2024, 2024, : 373 - 387
  • [10] Imperceptible Adversarial Attack on S Channel of HSV Colorspace
    Zhu, Tong
    Yin, Zhaoxia
    Lyu, Wanli
    Zhang, Jiefei
    Luo, Bin
    [J]. 2023 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, IJCNN, 2023,