Signal and Information Processing

Plural Adversarial Sample Generation Method for SAR-ATR System

Expand
  • Key Laboratory of Image Processing and Pattern Recognition of Jiangxi Province, Nanchang Hangkong University, Nanchang 330063, Jiangxi, China

Received date: 2023-12-11

  Online published: 2024-09-29

Abstract

Existing adversarial attack methods are limited to real-valued convolutional neural networks. To address this limitation, this paper proposes a complex adversarial sample generation method based on generative adversarial networks. Firstly, a complex model for generating effective adversarial samples is designed by introducing complex computation modules. Secondly, a pre-trained complex network is used as the discriminator in adversarial training, with a residual neural network serving as the basic framework, to enhance the attack capability of adversarial samples. Finally, transferable adversarial attacks are achieved through substitute models, resulting in higher attack success rates. Experimental results demonstrate that the success rates of the proposed method in targeted and untargeted attack tasks reach 76.338% and 87.841%, respectively, with higher transferability and closer resemblance between adversarial and original clean samples. By extending adversarial attacks to complex neural networks, this method preserves synthetic aperture radar (SAR) target information and accuracy, providing a reference solution for the security and robustness of practical synthetic aperture radar automatic target recognition (SAR-ATR) systems.

Cite this article

ZHANG Mengjun, XIONG Bangshu . Plural Adversarial Sample Generation Method for SAR-ATR System[J]. Journal of Applied Sciences, 2024 , 42(5) : 747 -756 . DOI: 10.3969/j.issn.0255-8297.2024.05.003

References

[1] Xu G, Zhang B, Yu H, et al. Sparse synthetic aperture radar imaging from compressed sensing and machine learning: theories, applications, and trends [J]. IEEE Geoscience and Remote Sensing Magazine, 2022, 10(4): 32-69.
[2] Huang T, Zhang Q X, Liu J B, et al. Adversarial attacks on deep-learning-based SAR image target recognition [J]. Journal of Network and Computer Applications, 2020, 162: 102632.
[3] 张帆, 闫敏超, 倪军, 等. 高阶条件随机场引导的多分支极化SAR图像分类[J]. 中国图象图形学报, 2023, 28(10): 3267-3280. Zhang F, Yan M C, Ni J, et al. High-order conditional random fields-relevant multi-branch polarimetric SAR image classification [J]. Journal of Image and Graphics, 2023, 28(10): 3267- 3280. (in Chinese)
[4] Zeng Z Q, Sun J P, Han Z, et al. SAR automatic target recognition method based on multistream complex-valued networks [J]. IEEE Transactions on Geoscience and Remote Sensing, 2022, 60: 5228618.
[5] Dai T, Feng Y, Chen B, et al. Deep image prior based defense against adversarial examples [J]. Pattern Recognition, 2022, 122: 108249.
[6] Yue Z Y, Gao F, Xiong Q X, et al. A novel semi-supervised convolutional neural network method for synthetic aperture radar image recognition [J]. Cognitive Computation, 2021, 13(4): 795-806.
[7] 张世辉, 张晓微, 宋丹丹, 等. 基于逆扰动融合生成对抗网络的对抗样本防御方法[J]. 电子学报, 2023, 51(4): 879-884. Zhang S H, Zhang X W, Song D D, et al. Adversarial example defense method based on inverse perturbation fusing generative adversarial network [J]. Acta Electronica Sinica, 2023, 51(4): 879-884. (in Chinese)
[8] Zhang L B, Leng X G, Feng S J, et al. Domain knowledge powered two-stream deep network for few-shot SAR vehicle recognition [J]. IEEE Transactions on Geoscience and Remote Sensing, 2021, 60: 5215315.
[9] Joriani M, Seifi H, Varjani A Y, et al. An optimization-based approach to recover the detected attacked grid variables after false data injection attack [J]. IEEE Transactions on Smart Grid, 2021, 12(6): 5322-5334.
[10] Li C, Wang H D, Zhang J, et al. An approximated gradient sign method using differential evolution for black-box adversarial attack [J]. IEEE Transactions on Evolutionary Computation, 2022, 26(5): 976-990.
[11] Liu X, Hsieh C J. Rob-GAN: generator, discriminator, and adversarial attacker [C]// IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2019: 11234-11243.
[12] 高勋章, 张志伟, 刘梅, 等. 雷达像智能识别对抗研究进展[J]. 雷达学报, 2023, 12(4): 696-712. Gao X Z, Zhang Z W, Liu M, et al. Intelligent radar image recognition countermeasures: a review [J]. Journal of Radars, 2023, 12(4): 696-712. (in Chinese)
[13] Wang Z, Yang H S, Feng Y H, et al. Towards transferable targeted adversarial examples [C]//IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023: 20534-20543.
[14] Feng Y, Wu B, et al. CG-ATTACK: modeling the conditional distribution of adversarial perturbations to boost black-box attack [C]//IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022: 15095-15104.
[15] Zhou M Y, Wu J, Liu Y P, et al. DaST: data-free substitute training for adversarial attacks [C]//IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020: 231-240.
Outlines

/