• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Fan, M. (Fan, M..) [1] | Liu, Y. (Liu, Y..) [2] | Chen, C. (Chen, C..) [3] | Yu, S. (Yu, S..) [4] | Guo, W. (Guo, W..) [5] (Scholars:郭文忠) | Wang, L. (Wang, L..) [6] | Liu, X. (Liu, X..) [7] (Scholars:刘西蒙)

Indexed by:

Scopus

Abstract:

Nowadays, the impressive performance of deep neural networks (DNNs) greatly advances the development of Internet of Things (IoT) in diverse scenarios. However, the exceptional vulnerability of DNNs to adversarial attack leads IoT devices to be exposed to potential security issues. Up to now, since adversarial training empirically remains robust against gradient-based adversarial attacks, it is believed to be the most effective defense method. In this article, we find that adversarial examples generated by gradient-based adversarial attacks tend to be less imperceptible induced by the gradient-based optimization methods (adopted in the attacks) being difficult on searching the most effective adversarial examples (i.e., the global extreme points), which may lead to an inaccurate estimation for the effectiveness of the adversarial training. To overcome the inherent defect of gradient-based adversarial attacks, we propose a novel adversarial attack named nongradient attack (NGA), of which search strategy is effective but no longer depends on gradients to enhance the threat of adversarial examples. In detail, NGA first initializes the adversarial examples outside, rather than inside, of decision boundary to make them misclassified by the model and then, under without violation of misclassified condition, adjusts the adversarial examples toward the crafted direction to close the original examples. Extensive experiments show that NGA significantly outperforms the state-of-the-art adversarial attacks on attack success rate (ASR) by 2%-7%. Moreover, we propose a new evaluation metric, i.e., composite criterion (CC) based on both ASR and accuracy, to better measure the effectiveness of adversarial training. In the experiments, CC has shown to be a more comprehensive yet appropriate evaluation metric. © 2014 IEEE.

Keyword:

Adversarial attack adversarial examples adversarial robustness evaluation metric Internet of Things (IoT) nongradient attack (NGA)

Community:

  • [ 1 ] [Fan, M.]Fuzhou University, College of Computer and Data Science, Fuzhou, 350108, China
  • [ 2 ] [Fan, M.]Xidian University, State Key Laboratory of Integrated Services Networks, Xi'an, 710071, China
  • [ 3 ] [Liu, Y.]Xidian University, School of Cyber Engineering, Xi'an, 710071, China
  • [ 4 ] [Chen, C.]East China Normal University, School of Data Science and Engineering, Shanghai, 310000, China
  • [ 5 ] [Yu, S.]Peking University, School of Electronics Engineering and Computer Science, Beijing, 110000, China
  • [ 6 ] [Guo, W.]Fuzhou University, College of Computer and Data Science, Fuzhou, 350108, China
  • [ 7 ] [Wang, L.]Smart Engine and Data Mid-Platform Tech Business Unit, Ant Group, Hangzhou, 330100, China
  • [ 8 ] [Liu, X.]Fuzhou University, College of Computer and Data Science, Fuzhou, 350108, China
  • [ 9 ] [Liu, X.]Xidian University, State Key Laboratory of Integrated Services Networks, Xi'an, 710071, China

Reprint 's Address:

  • 郭文忠 刘西蒙

    [Guo, W.]Fuzhou University, China;;[Liu, X.]Fuzhou University, China

Show more details

Related Keywords:

Related Article:

Source :

IEEE Internet of Things Journal

ISSN: 2327-4662

Year: 2022

Issue: 18

Volume: 9

Page: 17002-17013

1 0 . 6

JCR@2022

8 . 2 0 0

JCR@2023

ESI HC Threshold:61

JCR Journal Grade:1

CAS Journal Grade:1

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 1

Online/Total:980/13854266
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1