4.8 Article

Adversarial Examples-Security Threats to COVID-19 Deep Learning Systems in Medical IoT Devices

期刊

IEEE INTERNET OF THINGS JOURNAL
卷 8, 期 12, 页码 9603-9610

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2020.3013710

关键词

Machine learning; Medical diagnostic imaging; Perturbation methods; Computed tomography; Biological system modeling; Image recognition; Adversarial examples (AEs); COVID-19; deep learning (DL); medical IoT

资金

  1. King Saud University

向作者/读者索取更多资源

Medical IoT devices are being integrated into pandemic management systems like COVID-19, with researchers using deep learning algorithms to identify COVID-19 phenomena. However, these DL algorithms have security vulnerabilities to adversarial perturbations, making DL models vulnerable to attacks without defensive mechanisms.
Medical IoT devices are rapidly becoming part of management ecosystems for pandemics such as COVID-19. Existing research shows that deep learning (DL) algorithms have been successfully used by researchers to identify COVID-19 phenomena from raw data obtained from medical IoT devices. Some examples of IoT technology are radiological media, such as CT scanning and X-ray images, body temperature measurement using thermal cameras, safe social distancing identification using live face detection, and face mask detection from camera images. However, researchers have identified several security vulnerabilities in DL algorithms to adversarial perturbations. In this article, we have tested a number of COVID-19 diagnostic methods that rely on DL algorithms with relevant adversarial examples (AEs). Our test results show that DL models that do not consider defensive models against adversarial perturbations remain vulnerable to adversarial attacks. Finally, we present in detail the AE generation process, implementation of the attack model, and the perturbations of the existing DL-based COVID-19 diagnostic applications. We hope that this work will raise awareness of adversarial attacks and encourages others to safeguard DL models from attacks on healthcare systems.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据