On Protection of the Next-Generation Mobile Networks Against Adversarial Examples
Zolotukhin, M., Zhang, D., & Hämäläinen, T. (2024). On Protection of the Next-Generation Mobile Networks Against Adversarial Examples. In T. Sipola, J. Alatalo, M. Wolfmayr, & T. Kokkonen (Eds.), Artificial Intelligence for Security : Enhancing Protection in a Changing World (pp. 235-258). Springer. https://doi.org/10.1007/978-3-031-57452-8_11
Päivämäärä
2024Pääsyrajoitukset
Embargo päättyy: 2025-04-18Pyydä artikkeli tutkijalta
Tekijänoikeudet
© 2024 the Authors
As artificial intelligence (AI) has become an integral part of modern mobile networks, there is an increasing concern about vulnerabilities of intelligent machine learning (ML)-driven network components to adversarial effects. Due to the shared nature of wireless mediums, these components may be susceptible to sophisticated attacks that can manipulate the training and inference processes of the AI/ML models over the air. In our research, we focus on adversarial example attacks. During such an attack, an adversary aims to supply intelligently crafted input features to the target model so that it outputs a certain wrong result. This type of attack is the most realistic threat to the AI/ML models deployed in a 5G network since it takes place in the inference stage and therefore does not require having access to either the target model or the datasets during the training. In this study, we first provide experimental results for multiple use cases in order to demonstrate that such an attack approach can be carried out against various AI/ML-driven frameworks which might be present in the mobile network. After that, we discuss the defence mechanisms service providers may employ in order to protect the target network from adversarial effects.
...
Julkaisija
SpringerEmojulkaisun ISBN
978-3-031-57451-1Kuuluu julkaisuun
Artificial Intelligence for Security : Enhancing Protection in a Changing WorldAsiasanat
Julkaisu tutkimustietojärjestelmässä
https://converis.jyu.fi/converis/portal/detail/Publication/220922931
Metadata
Näytä kaikki kuvailutiedotKokoelmat
Lisenssi
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
On Attacking Future 5G Networks with Adversarial Examples : Survey
Zolotukhin, Mikhail; Zhang, Di; Hämäläinen, Timo; Miraghaei, Parsa (MDPI AG, 2023)The introduction of 5G technology along with the exponential growth in connected devices is expected to cause a challenge for the efficient and reliable network resource allocation. Network providers are now required to ... -
On Assessing Vulnerabilities of the 5G Networks to Adversarial Examples
Zolotukhin, Mikhail; Miraghaie, Parsa; Zhang, Di; Hämäläinen, Timo (Institute of Electrical and Electronics Engineers (IEEE), 2022)The use of artificial intelligence and machine learning is recognized as the key enabler for 5G mobile networks which would allow service providers to tackle the network complexity and ensure security, reliability and ... -
Taxonomy of generative adversarial networks for digital immunity of Industry 4.0 systems
Terziyan, Vagan; Gryshko, Svitlana; Golovianko, Mariia (Elsevier, 2021)Industry 4.0 systems are extensively using artificial intelligence (AI) to enable smartness, automation and flexibility within variety of processes. Due to the importance of the systems, they are potential targets for ... -
Causality-Aware Convolutional Neural Networks for Advanced Image Classification and Generation
Terziyan, Vagan; Vitko, Oleksandra (Elsevier, 2023)Smart manufacturing uses emerging deep learning models, and particularly Convolutional Neural Networks (CNNs) and Generative Adversarial Networks (GANs), for different industrial diagnostics tasks, e.g., classification, ... -
Cloning and training collective intelligence with generative adversarial networks
Terziyan, Vagan; Gavriushenko, Mariia; Girka, Anastasiia; Gontarenko, Andrii; Kaikova, Olena (John Wiley & Sons, 2021)Industry 4.0 and highly automated critical infrastructure can be seen as cyber‐physical‐social systems controlled by the Collective Intelligence. Such systems are essential for the functioning of the society and economy. ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.