skip to main content
10.1145/3503047.3503136acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaissConference Proceedingsconference-collections
research-article

SAR-GPA: SAR Generation Perturbation Algorithm

Published: 19 January 2022 Publication History

Abstract

The deep learning is widely used in optical image and synthetic aperture radar (SAR) image. Current academic research shows that adversarial perturbation can effectively attack the deep learning network in optical image. However, in SAR image target recognition network, the existence of universal perturbations and generation approach needs to be further explored. Here, this article firstly proposes a systematic SAR generation perturbation algorithm (SAR-GPA) for target recognition network. The modulation phase sequences of the jamming points can vary casually by using the state-of-the-art electromagnetic metasurface technology. Therefore, when it acts on the SAR deceptive jamming system, it can produce artificial controllable perturbations. First, we take the imperceptible perturbations from universal adversarial perturbations (UAP) as reference to construct a unconstrained minimum optimization problem to find the specific sequences. Then, we solve this issue by adaptive moment estimation (Adam) optimizer.Thus, the SAR adversarial examples can be quickly and flexibly generated through our system. Finally, We design a series of simulation and experiment to verify the effectiveness of the adversarial examples and also the modulation sequences. According to the results, different from the traditional SAR blanket jamming methods, our approach can quickly generate imperceptible jamming, which can effectively attack three classical recognition models.

References

[1]
B. Chambers and A. Tennant. 2007. Reflection of radar signals from multiple phase-modulated surfaces. Radar Sonar & Navigation Iet 1, 2 (2007), 142–148.
[2]
T. K. Chang, R. J. Langley, and E. A. Parker. 1996. Active frequency-selective surfaces. Iee Proc.microwaves Antennas & Propagation Feb 143, 1 (1996), 62.
[3]
S. W. Chen, D. H. Dai, Y. Z. Li, and X. S. Wang. 2009. The Theory of 2-D Cosinusoidal Phase-Modulated Repeater Scatter-Wave Jamming to SAR. Acta Electronica Sinica(2009).
[4]
Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and Harnessing Adversarial Examples. Computer Science (2014).
[5]
K. He, X. Zhang, S. Ren, and J. Sun. 2016. Deep Residual Learning for Image Recognition. IEEE (2016).
[6]
E. R. Keydel, S. W. Lee, and J. T. Moore. 1996. MSTAR extended operating conditions: a tutorial. Proc Spie (1996).
[7]
Alexey Kurakin, Ian J. Goodfellow, and Samy Bengio. 2018. Adversarial Examples in the Physical World.
[8]
Y. Lecun, Y. Bengio, and G. Hinton. 2015. Deep learning. Nature 521, 7553 (2015), 436.
[9]
Y. Lecun, L. Bottou, Y. Bengio, and P. Haffner. 1998. Gradient-based learning applied to document recognition. Proc. IEEE 86, 11 (1998), 2278–2324. https://doi.org/10.1109/5.726791
[10]
Y. Li, H. Li, Y. Wang, Y. Wang, and Q. Cao. 2020. A Novel Switchable Absorber/Linear Converter Based on Active Metasurface and its Application. IEEE Transactions on Antennas and Propagation 68, 11(2020), 7688–7693. https://doi.org/10.1109/TAP.2020.2980301
[11]
C. Mias and J. H. Yap. 2007. A Varactor-Tunable High Impedance Surface With a Resistive-Lumped-Element Biasing Grid. IEEE Transactions on Antennas & Propagation 55, 7(2007), 1955–1962.
[12]
S. Moosavi-Dezfooli, A. Fawzi, O. Fawzi, and P. Frossard. 2017. Universal Adversarial Perturbations. In 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 86–94. https://doi.org/10.1109/CVPR.2017.17
[13]
Seyed Mohsen Moosavi-Dezfooli, Alhussein Fawzi, and Pascal Frossard. 2016. DeepFool: a simple and accurate method to fool deep neural networks. (2016).
[14]
A. A. Omar, H. Huang, and Z. Shen. 2020. Absorptive Frequency-Selective Reflection/Transmission Structures: A Review and Future Perspectives. IEEE Antennas and Propagation Magazine 62, 4 (2020), 62–74. https://doi.org/10.1109/MAP.2019.2943302
[15]
K. Simonyan and A. Zisserman. 2014. Very Deep Convolutional Networks for Large-Scale Image Recognition. Computer Science (2014).
[16]
Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2013. Intriguing properties of neural networks. Computer Science (2013).
[17]
A. Tennant and B. Chambers. 2004. A Single-Layer Tuneable Microwave Absorber Using an Active FSS. IEEE Microwave and Wireless Components Letters 14, 1 (2004), 46–47.
[18]
J. Wang, D. Feng, Q. Wu, L. Xu, and W. Hu. 2018. Synthetic Aperture Radar Target Feature Transformation Method Based on Random Code Phase-Switched Screen. IEEE Access 6(2018), 41173–41178. https://doi.org/10.1109/ACCESS.2018.2859247
[19]
J. Wang, D. Feng, L. Xu, and W. Hu. 2018. Synthetic Aperture Radar Image Modulation Using Phase-Switched Screen. IEEE Antennas and Wireless Propagation Letters 17, 5 (2018), 911–915. https://doi.org/10.1109/LAWP.2018.2823079
[20]
J. Wang, D. Feng, L. Xu, R. Zhang, and W. Hu. 2019. Synthetic Aperture Radar Target Feature Modulation Using Active Frequency Selective Surface. IEEE Sensors Journal 19, 6 (2019), 2113–2125. https://doi.org/10.1109/JSEN.2018.2886013
[21]
Xianmin Wang, Jing Li, Xiaohui Kuang, Yu an Tan, and Jin Li. 2019. The security of machine learning in an adversarial setting: A survey. J. Parallel and Distrib. Comput. 130 (2019), 12–23. https://doi.org/10.1016/j.jpdc.2019.03.003
[22]
W. U. Xiao-Fang, D. H. Dai, X. S. Wang, and L. U. Huan-Zhang. 2010. Doppler Modulation Jamming in Azimuth to SAR. Modern Radar (2010).
[23]
Letao Xu, Dejun Feng, Yongcai Liu, Xiaoyi Pan, and Xuesong Wang. 2015. A Three-Stage Active Cancellation Method Against Synthetic Aperture Radar. IEEE Sensors Journal 15, 11 (2015), 6173–6178.
[24]
Letao Xu, Dejun Feng, Ran Zhang, and Xuesong Wang. 2016. High-resolution range profile deception method based on phase-switched screen. IEEE Antennas & Wireless Propagation Letters (2016), 1–1.

Cited By

View all

Index Terms

  1. SAR-GPA: SAR Generation Perturbation Algorithm
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        AISS '21: Proceedings of the 3rd International Conference on Advanced Information Science and System
        November 2021
        526 pages
        ISBN:9781450385862
        DOI:10.1145/3503047
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 19 January 2022

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. Adversarial examples
        2. synthetic aperture radar (SAR)
        3. universal adversarial perturbations.

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Conference

        AISS 2021

        Acceptance Rates

        Overall Acceptance Rate 41 of 95 submissions, 43%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 70
          Total Downloads
        • Downloads (Last 12 months)9
        • Downloads (Last 6 weeks)1
        Reflects downloads up to 17 Jan 2025

        Other Metrics

        Citations

        Cited By

        View all

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format.

        HTML Format

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media