Abstract
This paper highlights vulnerabilities of deep learning-driven semantic communications to backdoor (Trojan) attacks. Semantic communications aims to convey a desired meaning while transferring information from a transmitter to its receiver. The encoder-decoder pair of an autoencoder that is represented by deep neural networks (DNNs) is trained to reconstruct signals such as images at the receiver by transmitting latent features of small size over a limited number of channel uses. In the meantime, the DNN of a semantic task classifier at the receiver is jointly trained with the autoencoder to check the meaning conveyed to the receiver. The complex decision space of the DNNs makes semantic communications susceptible to adversarial manipulations. In a backdoor (Trojan) attack, the adversary adds triggers to a small portion of training samples and changes the label to a target label. When the transfer of images is considered, the triggers can be added to the images or equivalently to the corresponding transmitted or received signals. In test time, the adversary activates these triggers by providing poisoned samples as input to the encoder (or decoder) of semantic communications. The backdoor attack can effectively change the semantic information transferred for the poisoned input samples to a target meaning. As the performance of semantic communications improves with the signal-to-noise ratio and the number of channel uses, the success of the backdoor attack increases as well. Also, increasing the Trojan ratio in training data makes the attack more successful. On the other hand, the attack is selective and its effect on the unpoisoned input samples remains small. Overall, this paper shows that the backdoor attack poses a serious threat to semantic communications and presents novel design guidelines to preserve the meaning of transferred information in the presence of backdoor attacks.
Full Text
Topics from this Paper
Backdoor Attack
Semantic Communications
Deep Neural Networks
Transfer Of Images
Number Of Channel
+ Show 5 more
Create a personalized feed of these topics
Get StartedTalk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Similar Papers
Computers & Security
Sep 1, 2022
May 23, 2022
Applied Intelligence
Apr 12, 2023
IEEE Transactions on Neural Networks and Learning Systems
Mar 1, 2022
Chinese Journal of Electronics
Mar 1, 2022
IEEE Transactions on Communications
Oct 1, 2022
Oct 1, 2021
Computers & Security
Jul 1, 2022
IEEE Open Journal of Signal Processing
Jan 1, 2022
IEEE Transactions on Dependable and Secure Computing
May 1, 2022
Remote Sensing
May 15, 2023
Computers, Materials & Continua
Jan 1, 2022