9
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      FDA3 : Federated Defense Against Adversarial Attacks for Cloud-Based IIoT Applications

      Preprint

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Along with the proliferation of Artificial Intelligence (AI) and Internet of Things (IoT) techniques, various kinds of adversarial attacks are increasingly emerging to fool Deep Neural Networks (DNNs) used by Industrial IoT (IIoT) applications. Due to biased training data or vulnerable underlying models, imperceptible modifications on inputs made by adversarial attacks may result in devastating consequences. Although existing methods are promising in defending such malicious attacks, most of them can only deal with limited existing attack types, which makes the deployment of large-scale IIoT devices a great challenge. To address this problem, we present an effective federated defense approach named FDA3 that can aggregate defense knowledge against adversarial examples from different sources. Inspired by federated learning, our proposed cloud-based architecture enables the sharing of defense capabilities against different attacks among IIoT devices. Comprehensive experimental results show that the generated DNNs by our approach can not only resist more malicious attacks than existing attack-specific adversarial training methods, but also can prevent IIoT applications from new attacks.

          Related collections

          Author and article information

          Journal
          28 June 2020
          Article
          10.1109/TII.2020.3005969
          2006.15632
          7cc1d63b-4521-4d69-b963-47f82b87619a

          http://arxiv.org/licenses/nonexclusive-distrib/1.0/

          History
          Custom metadata
          IEEE Transactions on Industrial Informatics, 2020
          cs.LG cs.CR stat.ML

          Security & Cryptology,Machine learning,Artificial intelligence
          Security & Cryptology, Machine learning, Artificial intelligence

          Comments

          Comment on this article