Adversarial Reinforcement Learning based Data Poisoning Attacks Defense for Task-Oriented Multi-User Semantic Communication

J Peng, H Xing, L Xu, S Luo, P Dai… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Multi-user semantic communication (MUSC) has emerged as a promising paradigm for
future 6G networks and applications, where massive clients (eg, mobile devices) …

Toward Mixture-of-Experts Enabled Trustworthy Semantic Communication for 6G Networks

J He, X Luo, J Kang, H Du, Z Xiong, C Chen… - arXiv preprint arXiv …, 2024 - arxiv.org
Semantic Communication (SemCom) plays a pivotal role in 6G networks, offering a viable
solution for future efficient communication. Deep Learning (DL)-based semantic codecs …

Physical Layer Overshadowing Attack on Semantic Communication System

Z Lu, W Xu, X Xie, M Tu, H Wang… - ICC 2024-IEEE …, 2024 - ieeexplore.ieee.org
Semantic communication systems (SCS) have gained extensive attention with the
advancement of Artificial Intelligence (AI), which transmits the data feature instead of the raw …

Sembat: Physical layer black-box adversarial attacks for deep learning-based semantic communication systems

Z Li, J Zhou, G Nan, Z Li, Q Cui… - 2022 IEEE 96th Vehicular …, 2022 - ieeexplore.ieee.org
Deep learning-based semantic communications (DLSC) replace the physical blocks in
traditional communication systems as end-to-end neural networks. DLSC significantly boost …

Data poisoning attacks against multimodal encoders

Z Yang, X He, Z Li, M Backes… - International …, 2023 - proceedings.mlr.press
Recently, the newly emerged multimodal models, which leverage both visual and linguistic
modalities to train powerful encoders, have gained increasing attention. However, learning …

A hypothetical defenses-based training framework for generating transferable adversarial examples

L Hao, K Hao, Y Jin, H Zhao - Knowledge-Based Systems, 2024 - Elsevier
Transfer-based attacks utilize the proxy model to craft adversarial examples against the
target model and make significant advancements in the realm of black-box attacks. Recent …

Defending against adversarial denial-of-service data poisoning attacks

NM Müller, S Roschmann, K Böttinger - Proceedings of the 2020 …, 2020 - dl.acm.org
Data poisoning is one of the most relevant security threats against machine learning and
data-driven technologies. Since many applications rely on untrusted training data, an …

PureEBM: Universal Poison Purification via Mid-Run Dynamics of Energy-Based Models

O Pooladzandi, J Jiang, S Bhat, G Pottie - arXiv preprint arXiv:2405.19376, 2024 - arxiv.org
Data poisoning attacks pose a significant threat to the integrity of machine learning models
by leading to misclassification of target distribution test data by injecting adversarial …

CSFAdv: Critical Semantic Fusion Guided Least-Effort Adversarial Example Attacks

DT Peng, J Dong, M Zhang, J Yang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Extensive studies have revealed that the prevalent deep neural networks (DNNs) are
vulnerable to adversarial examples in image recognition tasks. However, previous …

Mtisa: Multi-Target Image-Scaling Attack

J He, H Li, W Jiang, Y Zhang - ICC 2024-IEEE International …, 2024 - ieeexplore.ieee.org
Image scaling is one of the most common operations in image processing. For instance, it is
often conducted before image transferring to preserve resources, image classifiers also …