{"title":"Golden Ratio Search: A Low-Power Adversarial Attack for Deep Learning based Modulation Classification","authors":"Deepsayan Sadhukhan, Nitin Priyadarshini Shankar, Sheetal Kalyani","doi":"arxiv-2409.11454","DOIUrl":null,"url":null,"abstract":"We propose a minimal power white box adversarial attack for Deep Learning\nbased Automatic Modulation Classification (AMC). The proposed attack uses the\nGolden Ratio Search (GRS) method to find powerful attacks with minimal power.\nWe evaluate the efficacy of the proposed method by comparing it with existing\nadversarial attack approaches. Additionally, we test the robustness of the\nproposed attack against various state-of-the-art architectures, including\ndefense mechanisms such as adversarial training, binarization, and ensemble\nmethods. Experimental results demonstrate that the proposed attack is powerful,\nrequires minimal power, and can be generated in less time, significantly\nchallenging the resilience of current AMC methods.","PeriodicalId":501034,"journal":{"name":"arXiv - EE - Signal Processing","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - EE - Signal Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2409.11454","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
We propose a minimal power white box adversarial attack for Deep Learning
based Automatic Modulation Classification (AMC). The proposed attack uses the
Golden Ratio Search (GRS) method to find powerful attacks with minimal power.
We evaluate the efficacy of the proposed method by comparing it with existing
adversarial attack approaches. Additionally, we test the robustness of the
proposed attack against various state-of-the-art architectures, including
defense mechanisms such as adversarial training, binarization, and ensemble
methods. Experimental results demonstrate that the proposed attack is powerful,
requires minimal power, and can be generated in less time, significantly
challenging the resilience of current AMC methods.