dc.contributor.author | Zolotukhin, Mikhail | |
dc.contributor.author | Miraghaie, Parsa | |
dc.contributor.author | Zhang, Di | |
dc.contributor.author | Hämäläinen, Timo | |
dc.date.accessioned | 2022-12-02T12:02:44Z | |
dc.date.available | 2022-12-02T12:02:44Z | |
dc.date.issued | 2022 | |
dc.identifier.citation | Zolotukhin, M., Miraghaie, P., Zhang, D., & Hämäläinen, T. (2022). On Assessing Vulnerabilities of the 5G Networks to Adversarial Examples. <i>IEEE Access</i>, <i>10</i>, 126285-126303. <a href="https://doi.org/10.1109/access.2022.3225921" target="_blank">https://doi.org/10.1109/access.2022.3225921</a> | |
dc.identifier.other | CONVID_164217034 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/84209 | |
dc.description.abstract | The use of artificial intelligence and machine learning is recognized as the key enabler for 5G mobile networks which would allow service providers to tackle the network complexity and ensure security, reliability and allocation of the necessary resources to their customers in a dynamic, robust and trustworthy way. Dependability of the future generation networks on accurate and timely performance of its artificial intelligence components means that disturbance in the functionality of these components may have negative impact on the entire network. As a result, there is an increasing concern about the vulnerability of intelligent machine learning driven frameworks to adversarial effects. In this study, we evaluate various adversarial example generation attacks against multiple artificial intelligence and machine learning models which can potentially be deployed in future 5G networks. First, we describe multiple use cases for which attacks on machine learning components are conceivable including the models employed and the data used for their training. After that, attack algorithms, their implementations and adjustments to the target models are summarised. Finally, the attacks implemented for the aforementioned use cases are evaluated based on deterioration of the objective functions optimised by the target models. | en |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | |
dc.relation.ispartofseries | IEEE Access | |
dc.rights | CC BY 4.0 | |
dc.subject.other | 5G networks | |
dc.subject.other | adversarial machine learning | |
dc.subject.other | artificial intelligence | |
dc.subject.other | deep learning | |
dc.title | On Assessing Vulnerabilities of the 5G Networks to Adversarial Examples | |
dc.type | research article | |
dc.identifier.urn | URN:NBN:fi:jyu-202212025473 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Secure Communications Engineering and Signal Processing | fi |
dc.contributor.oppiaine | Tekniikka | fi |
dc.contributor.oppiaine | Secure Communications Engineering and Signal Processing | en |
dc.contributor.oppiaine | Engineering | en |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | |
dc.type.coar | http://purl.org/coar/resource_type/c_2df8fbb1 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 126285-126303 | |
dc.relation.issn | 2169-3536 | |
dc.relation.volume | 10 | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © Authors, 2022 | |
dc.rights.accesslevel | openAccess | fi |
dc.type.publication | article | |
dc.subject.yso | syväoppiminen | |
dc.subject.yso | 5G-tekniikka | |
dc.subject.yso | tekoäly | |
dc.subject.yso | koneoppiminen | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p39324 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p29372 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p2616 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p21846 | |
dc.rights.url | https://creativecommons.org/licenses/by/4.0/ | |
dc.relation.doi | 10.1109/access.2022.3225921 | |
dc.type.okm | A1 | |