{"title":"MACS-BNet:一种针对压缩学习的隐形多约束对抗后门网络","authors":"Haotian Zhu;Wei Wu;Haipeng Peng;Dawei Zhao","doi":"10.1109/JIOT.2025.3563088","DOIUrl":null,"url":null,"abstract":"Deep-learning-based compressed sensing (CS) techniques have exhibited exceptional prowess in signal reconstruction and data-sharing applications, particularly within the realm of Internet of Things sensor data processing. However, existing methods overlook a critical security vulnerability: the susceptibility of CS techniques to backdoor attacks during the reconstruction phase, which could pose severe security risks to downstream applications. This study pioneers an investigation into the feasibility of backdoor injection during the reconstruction phase, presenting the stealthy multiconstraint adversarial backdoor network against compressed learning (MACS-BNet) and substantiating its efficacy in subverting downstream classification tasks. MACS-BNet synergistically incorporates detailed sensing enhancement, fortified by local information relative positional encoding (LiRPE), to elevate image reconstruction fidelity. Concurrently, it employs a multiconstrained adversarial optimization that integrates sparsity, amplitude regulation, and spatial smoothness constraints, achieving an optimal tradeoff between perturbation imperceptibility and attack efficacy. Consequently, victim models are subtly manipulated to yield outputs consistent with the attacker’s objectives. Extensive empirical evaluations reveal that MACS-BNet consistently surpasses seven cutting-edge attack methodologies across attack success rate (ASR), clean sample classification accuracy, and stealthiness under both all-to-one and all-to-all attack paradigms. Specifically, MACS-BNet attains an unparalleled clean classification accuracy of 99.52% and an ASR of 99.43% in the all-to-one mode, while simultaneously ensuring high-quality image reconstruction. Furthermore, MACS-BNet exhibits formidable resistance against detection by seven state-of-the-art defense mechanisms, underscoring its superior stealth and robustness.","PeriodicalId":54347,"journal":{"name":"IEEE Internet of Things Journal","volume":"12 14","pages":"27557-27572"},"PeriodicalIF":8.9000,"publicationDate":"2025-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"MACS-BNet: A Stealthy Multiconstraint Adversarial Backdoor Network Against Compressed Learning\",\"authors\":\"Haotian Zhu;Wei Wu;Haipeng Peng;Dawei Zhao\",\"doi\":\"10.1109/JIOT.2025.3563088\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Deep-learning-based compressed sensing (CS) techniques have exhibited exceptional prowess in signal reconstruction and data-sharing applications, particularly within the realm of Internet of Things sensor data processing. However, existing methods overlook a critical security vulnerability: the susceptibility of CS techniques to backdoor attacks during the reconstruction phase, which could pose severe security risks to downstream applications. This study pioneers an investigation into the feasibility of backdoor injection during the reconstruction phase, presenting the stealthy multiconstraint adversarial backdoor network against compressed learning (MACS-BNet) and substantiating its efficacy in subverting downstream classification tasks. MACS-BNet synergistically incorporates detailed sensing enhancement, fortified by local information relative positional encoding (LiRPE), to elevate image reconstruction fidelity. Concurrently, it employs a multiconstrained adversarial optimization that integrates sparsity, amplitude regulation, and spatial smoothness constraints, achieving an optimal tradeoff between perturbation imperceptibility and attack efficacy. Consequently, victim models are subtly manipulated to yield outputs consistent with the attacker’s objectives. Extensive empirical evaluations reveal that MACS-BNet consistently surpasses seven cutting-edge attack methodologies across attack success rate (ASR), clean sample classification accuracy, and stealthiness under both all-to-one and all-to-all attack paradigms. Specifically, MACS-BNet attains an unparalleled clean classification accuracy of 99.52% and an ASR of 99.43% in the all-to-one mode, while simultaneously ensuring high-quality image reconstruction. Furthermore, MACS-BNet exhibits formidable resistance against detection by seven state-of-the-art defense mechanisms, underscoring its superior stealth and robustness.\",\"PeriodicalId\":54347,\"journal\":{\"name\":\"IEEE Internet of Things Journal\",\"volume\":\"12 14\",\"pages\":\"27557-27572\"},\"PeriodicalIF\":8.9000,\"publicationDate\":\"2025-04-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Internet of Things Journal\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10971977/\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Internet of Things Journal","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10971977/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
MACS-BNet: A Stealthy Multiconstraint Adversarial Backdoor Network Against Compressed Learning
Deep-learning-based compressed sensing (CS) techniques have exhibited exceptional prowess in signal reconstruction and data-sharing applications, particularly within the realm of Internet of Things sensor data processing. However, existing methods overlook a critical security vulnerability: the susceptibility of CS techniques to backdoor attacks during the reconstruction phase, which could pose severe security risks to downstream applications. This study pioneers an investigation into the feasibility of backdoor injection during the reconstruction phase, presenting the stealthy multiconstraint adversarial backdoor network against compressed learning (MACS-BNet) and substantiating its efficacy in subverting downstream classification tasks. MACS-BNet synergistically incorporates detailed sensing enhancement, fortified by local information relative positional encoding (LiRPE), to elevate image reconstruction fidelity. Concurrently, it employs a multiconstrained adversarial optimization that integrates sparsity, amplitude regulation, and spatial smoothness constraints, achieving an optimal tradeoff between perturbation imperceptibility and attack efficacy. Consequently, victim models are subtly manipulated to yield outputs consistent with the attacker’s objectives. Extensive empirical evaluations reveal that MACS-BNet consistently surpasses seven cutting-edge attack methodologies across attack success rate (ASR), clean sample classification accuracy, and stealthiness under both all-to-one and all-to-all attack paradigms. Specifically, MACS-BNet attains an unparalleled clean classification accuracy of 99.52% and an ASR of 99.43% in the all-to-one mode, while simultaneously ensuring high-quality image reconstruction. Furthermore, MACS-BNet exhibits formidable resistance against detection by seven state-of-the-art defense mechanisms, underscoring its superior stealth and robustness.
期刊介绍:
The EEE Internet of Things (IoT) Journal publishes articles and review articles covering various aspects of IoT, including IoT system architecture, IoT enabling technologies, IoT communication and networking protocols such as network coding, and IoT services and applications. Topics encompass IoT's impacts on sensor technologies, big data management, and future internet design for applications like smart cities and smart homes. Fields of interest include IoT architecture such as things-centric, data-centric, service-oriented IoT architecture; IoT enabling technologies and systematic integration such as sensor technologies, big sensor data management, and future Internet design for IoT; IoT services, applications, and test-beds such as IoT service middleware, IoT application programming interface (API), IoT application design, and IoT trials/experiments; IoT standardization activities and technology development in different standard development organizations (SDO) such as IEEE, IETF, ITU, 3GPP, ETSI, etc.