Adversarial Attack and Reliable Defense Based on Frequency Domain Feature Enhancement for Automatic Modulation Classification | IEEE Journals & Magazine | IEEE Xplore

Adversarial Attack and Reliable Defense Based on Frequency Domain Feature Enhancement for Automatic Modulation Classification


Abstract:

Deep neural networks (DNNs) greatly enable the task of automatic modulation classification (AMC) by virtue of their powerful feature extraction capability. However, exten...Show More

Abstract:

Deep neural networks (DNNs) greatly enable the task of automatic modulation classification (AMC) by virtue of their powerful feature extraction capability. However, extensive research has shown that DNNs are highly vulnerable to adversarial attacks, which can lead them to confidently output incorrect results with high confidence scores. Existing adversarial attack methods often focus solely on temporal characteristics of signals while neglecting frequency domain information, resulting in adversarial examples with poor transferability and inadequate performance in the closed-box scenario. An adversarial attack method based on frequency domain feature enhanced and integral gradient (FEIG) for AMC task is proposed in this paper. The approach utilizes techniques such as translation interpolation and Inverse Fast Fourier Transform to enhance the frequency domain information of original examples, thereby constructing enhanced baseline examples. Subsequently, these generated enhanced baseline examples are used as new inputs for gradient integration to obtain adversarial examples. Compared to traditional methods, the generated adversarial examples exhibit stronger transferability. Furthermore, in order to improve the defense performance of the model, an enhanced hybrid adversarial training (EH-AT) framework is proposed in this paper. The original clean example and the adversarial example generated by the proposed attack method are trained with joint loss constraints, which greatly enhances the robustness of the model. Experimental results demonstrate the effectiveness of the FEIG attack method and the EH-AT framework.
Page(s): 3731 - 3744
Date of Publication: 24 March 2025

ISSN Information:

Funding Agency:


Contact IEEE to Subscribe

References

References is not available for this document.