Concealed Electronic Countermeasures of Radar Signal with Adversarial
Examples
- URL: http://arxiv.org/abs/2310.08292v1
- Date: Thu, 12 Oct 2023 12:53:44 GMT
- Title: Concealed Electronic Countermeasures of Radar Signal with Adversarial
Examples
- Authors: Ruinan Ma, Canjie Zhu, Mingfeng Lu, Yunjie Li, Yu-an Tan, Ruibin
Zhang, Ran Tao
- Abstract summary: Electronic countermeasures involving radar signals are an important aspect of modern warfare.
Traditional electronic countermeasures techniques typically add large-scale interference signals to ensure interference effects, which can lead to attacks being too obvious.
In recent years, AI-based attack methods have emerged that can effectively solve this problem, but the attack scenarios are currently limited to time domain radar signal classification.
- Score: 7.460768868547269
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Electronic countermeasures involving radar signals are an important aspect of
modern warfare. Traditional electronic countermeasures techniques typically add
large-scale interference signals to ensure interference effects, which can lead
to attacks being too obvious. In recent years, AI-based attack methods have
emerged that can effectively solve this problem, but the attack scenarios are
currently limited to time domain radar signal classification. In this paper, we
focus on the time-frequency images classification scenario of radar signals. We
first propose an attack pipeline under the time-frequency images scenario and
DITIMI-FGSM attack algorithm with high transferability. Then, we propose
STFT-based time domain signal attack(STDS) algorithm to solve the problem of
non-invertibility in time-frequency analysis, thus obtaining the time-domain
representation of the interference signal. A large number of experiments show
that our attack pipeline is feasible and the proposed attack method has a high
success rate.
Related papers
- R-STELLAR: A Resilient Synthesizable Signature Attenuation SCA Protection on AES-256 with built-in Attack-on-Countermeasure Detection [0.4593752628215474]
Side channel attacks (SCAs) remain a significant threat to the security of cryptographic systems in modern embedded devices.
Physical countermeasures have significantly increased the minimum traces to disclosure (MTD) to 1 billion.
We introduce a Voltage drop Linear region Biasing (VLB) attack technique that reduces the MTD to over 2000 times less than the previous threshold.
arXiv Detail & Related papers (2024-08-21T22:29:33Z) - Multi-stage Learning for Radar Pulse Activity Segmentation [51.781832424705094]
Radio signal recognition is a crucial function in electronic warfare.
Precise identification and localisation of radar pulse activities are required by electronic warfare systems.
Deep learning-based radar pulse activity recognition methods have remained largely underexplored.
arXiv Detail & Related papers (2023-12-15T01:56:27Z) - Attacking at non-harmonic frequencies in screaming-channel attacks [1.2528259460055124]
Screaming-channel attacks enable Electromagnetic (EM) Side-Channel Attacks (SCAs) at larger distances due to higher EM leakage energies.
This work demonstrates that compromising signals appear not only at the harmonics and that leakage at non-harmonics can be exploited for successful attacks.
arXiv Detail & Related papers (2023-11-27T13:56:21Z) - The Adversarial Implications of Variable-Time Inference [47.44631666803983]
We present an approach that exploits a novel side channel in which the adversary simply measures the execution time of the algorithm used to post-process the predictions of the ML model under attack.
We investigate leakage from the non-maximum suppression (NMS) algorithm, which plays a crucial role in the operation of object detectors.
We demonstrate attacks against the YOLOv3 detector, leveraging the timing leakage to successfully evade object detection using adversarial examples, and perform dataset inference.
arXiv Detail & Related papers (2023-09-05T11:53:17Z) - Multi-task Learning for Radar Signal Characterisation [48.265859815346985]
This paper presents an approach for tackling radar signal classification and characterisation as a multi-task learning (MTL) problem.
We propose the IQ Signal Transformer (IQST) among several reference architectures that allow for simultaneous optimisation of multiple regression and classification tasks.
We demonstrate the performance of our proposed MTL model on a synthetic radar dataset, while also providing a first-of-its-kind benchmark for radar signal characterisation.
arXiv Detail & Related papers (2023-06-19T12:01:28Z) - A Convolutional Attention Based Deep Network Solution for UAV Network
Attack Recognition over Fading Channels and Interference [3.1230069539161405]
This research offers a deep learning (DL) approach for detecting attacks in UAVs equipped with multiplexing (OFDM) receivers on Clustered Delay Line (CDL) channels.
The prospective algorithm is generalizable regarding attack identification, which does not occur during training.
A deeper investigation into the timing requirements for recognizing attacks show that after training, the minimum time necessary after the attack begins is 100 ms.
arXiv Detail & Related papers (2022-07-16T22:08:12Z) - Digital Beamforming Robust to Time-Varying Carrier Frequency Offset [21.18926642388997]
We present novel beamforming algorithms that are robust to signal corruptions arising from a time-variant carrier frequency offset.
We propose two atomic-norm-minimization (ANM)-based methods to design a weight vector that can be used to cancel interference when there exist unknown time-varying frequency drift in the pilot and interferer signals.
arXiv Detail & Related papers (2021-03-08T18:08:56Z) - WaveTransform: Crafting Adversarial Examples via Input Decomposition [69.01794414018603]
We introduce WaveTransform', that creates adversarial noise corresponding to low-frequency and high-frequency subbands, separately (or in combination)
Experiments show that the proposed attack is effective against the defense algorithm and is also transferable across CNNs.
arXiv Detail & Related papers (2020-10-29T17:16:59Z) - Robust Tracking against Adversarial Attacks [69.59717023941126]
We first attempt to generate adversarial examples on top of video sequences to improve the tracking robustness against adversarial attacks.
We apply the proposed adversarial attack and defense approaches to state-of-the-art deep tracking algorithms.
arXiv Detail & Related papers (2020-07-20T08:05:55Z) - Investigating a Spectral Deception Loss Metric for Training Machine
Learning-based Evasion Attacks [1.3750624267664155]
Adversarial evasion attacks have been very successful in causing poor performance in a wide variety of machine learning applications.
This work introduces a new spectral deception loss metric that can be implemented during the training process to force the spectral shape to be more in-line with the original signal.
arXiv Detail & Related papers (2020-05-27T02:02:03Z) - Temporal Sparse Adversarial Attack on Sequence-based Gait Recognition [56.844587127848854]
We demonstrate that the state-of-the-art gait recognition model is vulnerable to such attacks.
We employ a generative adversarial network based architecture to semantically generate adversarial high-quality gait silhouettes or video frames.
The experimental results show that if only one-fortieth of the frames are attacked, the accuracy of the target model drops dramatically.
arXiv Detail & Related papers (2020-02-22T10:08:42Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.