Journal
IEEE INTERNET OF THINGS JOURNAL
Volume 8, Issue 12, Pages 9603-9610Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2020.3013710
Keywords
Machine learning; Medical diagnostic imaging; Perturbation methods; Computed tomography; Biological system modeling; Image recognition; Adversarial examples (AEs); COVID-19; deep learning (DL); medical IoT
Categories
Funding
- King Saud University
Ask authors/readers for more resources
Medical IoT devices are being integrated into pandemic management systems like COVID-19, with researchers using deep learning algorithms to identify COVID-19 phenomena. However, these DL algorithms have security vulnerabilities to adversarial perturbations, making DL models vulnerable to attacks without defensive mechanisms.
Medical IoT devices are rapidly becoming part of management ecosystems for pandemics such as COVID-19. Existing research shows that deep learning (DL) algorithms have been successfully used by researchers to identify COVID-19 phenomena from raw data obtained from medical IoT devices. Some examples of IoT technology are radiological media, such as CT scanning and X-ray images, body temperature measurement using thermal cameras, safe social distancing identification using live face detection, and face mask detection from camera images. However, researchers have identified several security vulnerabilities in DL algorithms to adversarial perturbations. In this article, we have tested a number of COVID-19 diagnostic methods that rely on DL algorithms with relevant adversarial examples (AEs). Our test results show that DL models that do not consider defensive models against adversarial perturbations remain vulnerable to adversarial attacks. Finally, we present in detail the AE generation process, implementation of the attack model, and the perturbations of the existing DL-based COVID-19 diagnostic applications. We hope that this work will raise awareness of adversarial attacks and encourages others to safeguard DL models from attacks on healthcare systems.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available