Trojan Attacks on Wireless Signal Classification with Adversarial Machine Learning

10/23/2019
by   Kemal Davaslioglu, et al.
0

We present a Trojan (backdoor or trapdoor) attack that targets deep learning applications in wireless communications. A deep learning classifier is considered to classify wireless signals using raw (I/Q) samples as features and modulation types as labels. An adversary slightly manipulates training data by inserting Trojans (i.e., triggers) to only few training data samples by modifying their phases and changing the labels of these samples to a target label. This poisoned training data is used to train the deep learning classifier. In test (inference) time, an adversary transmits signals with the same phase shift that was added as a trigger during training. While the receiver can accurately classify clean (unpoisoned) signals without triggers, it cannot reliably classify signals poisoned with triggers. This stealth attack remains hidden until activated by poisoned inputs (Trojans) to bypass a signal classifier (e.g., for authentication). We show that this attack is successful over different channel conditions and cannot be mitigated by simply preprocessing the training and test data with random phase variations. To detect this attack, activation based outlier detection is considered with statistical as well as clustering techniques. We show that the latter one can detect Trojan attacks even if few samples are poisoned.

READ FULL TEXT

page 1

page 3

research
07/22/2021

Membership Inference Attack and Defense for Wireless Signal Classifiers with Deep Learning

An over-the-air membership inference attack (MIA) is presented to leak p...
research
06/25/2020

Over-the-Air Membership Inference Attacks as Privacy Threats for Deep Learning-based Wireless Signal Classifiers

This paper presents how to leak private information from a wireless sign...
research
01/25/2019

Generative Adversarial Networks for Black-Box API Attacks with Limited Training Data

As online systems based on machine learning are offered to public or pai...
research
11/05/2018

Active Deep Learning Attacks under Strict Rate Limitations for Online API Calls

Machine learning has been applied to a broad range of applications and s...
research
12/21/2022

Vulnerabilities of Deep Learning-Driven Semantic Communications to Backdoor (Trojan) Attacks

This paper highlights vulnerabilities of deep learning-driven semantic c...
research
11/25/2019

UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband

Mobile autonomous systems, robots, and cyber-physical systems rely on ac...
research
06/29/2022

Decision Forest Based EMG Signal Classification with Low Volume Dataset Augmented with Random Variance Gaussian Noise

Electromyography signals can be used as training data by machine learnin...

Please sign up or login with your details

Forgot password? Click here to reset