Adversarial ML Attack on Self Organizing Cellular Networks

09/26/2019
by   Salah-ud-din Farooq, et al.
1

Deep Neural Networks (DNN) have been widely adopted in self-organizing networks (SON) for automating different networking tasks. Recently, it has been shown that DNN lack robustness against adversarial examples where an adversary can fool the DNN model into incorrect classification by introducing a small imperceptible perturbation to the original example. SON is expected to use DNN for multiple fundamental cellular tasks and many DNN-based solutions for performing SON tasks have been proposed in the literature have not been tested against adversarial examples. In this paper, we have tested and explained the robustness of SON against adversarial example and investigated the performance of an important SON use case in the face of adversarial attacks. We have also generated explanations of incorrect classifications by utilizing an explainable artificial intelligence (AI) technique.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/16/2019

Latent Adversarial Defence with Boundary-guided Generation

Deep Neural Networks (DNNs) have recently achieved great success in many...
research
01/01/2019

A Noise-Sensitivity-Analysis-Based Test Prioritization Technique for Deep Neural Networks

Deep neural networks (DNNs) have been widely used in the fields such as ...
research
04/04/2017

Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks

Although deep neural networks (DNNs) have achieved great success in many...
research
07/05/2021

When and How to Fool Explainable Models (and Humans) with Adversarial Examples

Reliable deployment of machine learning models such as neural networks c...
research
06/30/2021

Understanding Adversarial Examples Through Deep Neural Network's Response Surface and Uncertainty Regions

Deep neural network (DNN) is a popular model implemented in many systems...
research
01/20/2021

Adversarial Attacks for Tabular Data: Application to Fraud Detection and Imbalanced Data

Guaranteeing the security of transactional systems is a crucial priority...
research
09/07/2018

Metamorphic Relation Based Adversarial Attacks on Differentiable Neural Computer

Deep neural networks (DNN), while becoming the driving force of many nov...

Please sign up or login with your details

Forgot password? Click here to reset