2023
DOI: 10.1109/tmc.2022.3148690
|View full text |Cite
|
Sign up to set email alerts
|

Membership Inference Attack and Defense for Wireless Signal Classifiers With Deep Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0
3

Year Published

2023
2023
2023
2023

Publication Types

Select...
6
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 16 publications
(12 citation statements)
references
References 60 publications
0
9
0
3
Order By: Relevance
“…To maximize the impact of jamming the RBs, we pursue an adversarial machine learning approach. Different types of attacks built upon adversarial machine learning have been studied in wireless communications [21], [22] such as exploratory (inference) attacks [23], [24], evasion (adversarial) attacks [25], [26], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36], [37], [38], [39] and their extensions to secure and covert communications against eavesdroppers [40], [41], [42], causative (poisoning) attacks [43], [44], [45], membership inference attacks [46], [47], Trojan attacks [48], and spoofing attacks [49], [50], [51] that have been launched against various spectrum sensors and wireless signal (such as modulation) classifiers. Adversarial machine learning has also been considered for NextG by studying evasion and spoofing attacks on deep neural networks (without reinforcement learning) used for NextG spectrum sharing and NextG signal authentication [52].…”
Section: B Adversarial Machine Learning Based Attack On Nextg Radio A...mentioning
confidence: 99%
“…To maximize the impact of jamming the RBs, we pursue an adversarial machine learning approach. Different types of attacks built upon adversarial machine learning have been studied in wireless communications [21], [22] such as exploratory (inference) attacks [23], [24], evasion (adversarial) attacks [25], [26], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36], [37], [38], [39] and their extensions to secure and covert communications against eavesdroppers [40], [41], [42], causative (poisoning) attacks [43], [44], [45], membership inference attacks [46], [47], Trojan attacks [48], and spoofing attacks [49], [50], [51] that have been launched against various spectrum sensors and wireless signal (such as modulation) classifiers. Adversarial machine learning has also been considered for NextG by studying evasion and spoofing attacks on deep neural networks (without reinforcement learning) used for NextG spectrum sharing and NextG signal authentication [52].…”
Section: B Adversarial Machine Learning Based Attack On Nextg Radio A...mentioning
confidence: 99%
“…Adversaries can poison the wireless access of the metaverse, by manipulating the inputs to the learning algorithms employed for authorizing users [22], leading to unauthorized access to the metaverse network due to the mislead access model. Malicious users can also infer sensitive information about edge devices, users, and applications which have access to the network, through membership attribute inference attacks [23] and model inversion attacks [24]. As a privacy threat to the MaaS access, data characteristics such as device-level information may leak to adversaries.…”
Section: B Securing the 6g-enabled Access To The Metaversementioning
confidence: 99%
“…As a privacy threat to the MaaS access, data characteristics such as device-level information may leak to adversaries. Malicious users can exploit this leaked information using membership inference attacks [23] by building an inference model to determine whether a sample of interest (associated with a particular device) has been used in the training data of the MaaS provider. To mitigate such attacks, generative adversarial networks (GANs) are shown to be capable of detecting anomalies and mitigating wireless attacks for the next generation of communication and networking services [25].…”
Section: B Securing the 6g-enabled Access To The Metaversementioning
confidence: 99%
See 1 more Smart Citation
“…Overall, AML is an emerging field that studies machine learning (ML) in the presence of adversaries that may aim to manipulate the test and/or training pipelines of ML algorithms [ 7 , 8 , 9 ]. While the applications of AML have originated in the computer vision domain, there has been a growing interest in applying AML to wireless communications [ 10 , 11 , 12 ], including exploratory (inference) attacks [ 13 , 14 ], evasion (adversarial) attacks [ 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 ] and their extensions to secure and covert communications against eavesdroppers [ 34 , 35 , 36 , 37 ], causative (poisoning) attacks [ 38 , 39 , 40 ], membership inference attacks [ 41 , 42 ], Trojan attacks [ 43 ], and spoofing attacks [ 44 , 45 , 46 , 47 ].…”
Section: Introductionmentioning
confidence: 99%