WiCAM: Imperceptible Adversarial Attack on Deep Learning based WiFi Sensing

被引:7
|
作者
Xu, Leiyang [1 ]
Zheng, Xiaolong [1 ]
Li, Xiangyuan [1 ]
Zhang, Yucheng [1 ]
Liu, Liang [1 ]
Ma, Huadong [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Beijing Key Lab Intelligent Telecommun Software &, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1109/SECON55815.2022.9918564
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularization of deep learning models in wireless sensing, researchers have made considerable efforts to construct sophisticated models to improve the accuracy of related applications. But very few studies have addressed the potential vulnerabilities of deep models, and existing works evaluate wireless adversarial performance only in communication or sensing. None of them has a comprehensive definition of attack imperceptibility. In this paper, we come up with a definition of the wireless attack imperceptibility for both communication and sensing. Our goal is to craft an adversarial perturbation, which can degrade the performance of WiFi sensing without compromising WiFi communication. To achieve this goal, we propose WiCAM to reveal the temporal and spatial attention of a DNN, capturing the crucial portions of its input. Then we design a mask to limit adversarial perturbation in the attended parts only, and thus the impact of the attack on WiFi communication is minimized WiCAM is a general adversarial framework that can integrate existing adversarial methods such as FGSM and PGD to generate perturbations. We carry out experiments on three popular WiFi sensing applications, including human activity recognition, gesture recognition, and user identification. Extensive experiments are conducted on both public datasets and self-collected datasets. The results show that when declining the accuracy of a target model below 50%, WiCAM can reduce the impact on communication in terms of BER by up to 77.78% in QAM-64, compared to the common adversarial methods.
引用
收藏
页码:10 / 18
页数:9
相关论文
共 50 条
  • [41] Effective and Imperceptible Adversarial Textual Attack Via Multi-objectivization
    Liu, Shengcai
    Lu, Ning
    Hong, Wenjing
    Qian, Chao
    Tang, Ke
    [J]. ACM Transactions on Evolutionary Learning and Optimization, 2024, 4 (03):
  • [42] Imperceptible adversarial attack via spectral sensitivity of human visual system
    Chiang, Chen-Kuo
    Lin, Ying-Dar
    Hwang, Ren-Hung
    Lin, Po-Ching
    Chang, Shih-Ya
    Li, Hao-Ting
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (20) : 59291 - 59315
  • [43] Adversarial Attack and Defense in Breast Cancer Deep Learning Systems
    Li, Yang
    Liu, Shaoying
    [J]. BIOENGINEERING-BASEL, 2023, 10 (08):
  • [44] Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach
    Aminanto, Muhamad Erza
    Kim, Kwangjo
    [J]. INFORMATION SECURITY APPLICATIONS, WISA 2016, 2017, 10144 : 136 - 147
  • [45] WiFi-Based Human Sensing With Deep Learning: Recent Advances, Challenges, and Opportunities
    Ahmad, Iftikhar
    Ullah, Arif
    Choi, Wooyeol
    [J]. IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2024, 5 : 3595 - 3623
  • [46] Imperceptible UAPs for Automatic Modulation Classification Based on Deep Learning
    Xu, Dongwei
    Li, Jiangpeng
    Chen, Zhuangzhi
    Xuan, Qi
    Shen, Weiguo
    Yang, Xiaoniu
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2024, 71 (02) : 987 - 991
  • [47] Highly transferable adversarial attack against deep-reinforcement-learning-based frequency control
    Li, Zhongwei
    Liu, Yang
    Qiu, Peng
    Yin, Hongyan
    Wan, Xu
    Sun, Mingyang
    [J]. Energy Conversion and Economics, 2023, 4 (03): : 202 - 212
  • [48] A Comprehensive Review and Analysis of Deep Learning-Based Medical Image Adversarial Attack and Defense
    Muoka, Gladys W.
    Yi, Ding
    Ukwuoma, Chiagoziem C.
    Mutale, Albert
    Ejiyi, Chukwuebuka J.
    Mzee, Asha Khamis
    Gyarteng, Emmanuel S. A.
    Alqahtani, Ali
    Al-antari, Mugahed A.
    [J]. MATHEMATICS, 2023, 11 (20)
  • [49] Adversarial Attack and Defence Strategies for Deep-Learning-Based IoT Device Classification Techniques
    Singh, Abhijit
    Sikdar, Biplab
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (04): : 2602 - 2613
  • [50] Crafting Text Adversarial Examples to Attack the Deep-Learning-based Malicious URL Detection
    Peng, Zuquan
    He, Yuanyuan
    Sun, Zhe
    Ni, Jianbing
    Niu, Ben
    Deng, Xianjun
    [J]. IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 3118 - 3123