강화학습 모델에 대한 적대적 공격과 이미지 필터링 기법을 이용한 대응 방안

Vol. 34, No. 5, pp. 1047-1057, 10월. 2024
10.13089/JKIISC.2024.34.5.1047, Full Text:
Keywords: Reinforcement Learning Model, adversarial attacks, bilateral filter
Abstract

Recently, deep neural network-based reinforcement learning models have been applied in various advanced industrial fields such as autonomous driving, smart factories, and home networks, but it has been shown to be vulnerable to malicious adversarial attack. In this paper, we applied deep reinforcement learning models, DQN and PPO, to the autonomous driving simulation environment HighwayEnv and conducted three adversarial attacks: FGSM(Fast Gradient Sign Method), BIM(Basic Iterative Method), PGD(Projected Gradient Descent) and CW(Carlini and Wagner). In order to respond to adversarial attack, we proposed a method for deep learning models based on reinforcement learning to operate normally by removing noise from adversarial images using a bilateral filter algorithm. Furthermore, we analyzed performance of adversarial attacks using two popular metrics such as average of episode duration and the average of the reward obtained by the agent. In our experiments on a model that removes noise of adversarial images using a bilateral filter, we confirmed that the performance is maintained as good as when no adversarial attack was performed.

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
이승열 and 하재철, "Adversarial Attacks on Reinforce Learning Model and Countermeasures Using Image Filtering Method," Journal of The Korea Institute of Information Security and Cryptology, vol. 34, no. 5, pp. 1047-1057, 2024. DOI: 10.13089/JKIISC.2024.34.5.1047.

[ACM Style]
이승열 and 하재철. 2024. Adversarial Attacks on Reinforce Learning Model and Countermeasures Using Image Filtering Method. Journal of The Korea Institute of Information Security and Cryptology, 34, 5, (2024), 1047-1057. DOI: 10.13089/JKIISC.2024.34.5.1047.