Enhancing SAR-ATR Systems’ Resistance to S2M Attacks via FUA: Optimizing Surrogate Models for Adversarial Example Transferability

The vulnerability of synthetic aperture radar (SAR)—automatic target recognition (ATR) models based on deep neural networks has garnered increasing attention in recent research. A novel and extreme prior-knowledge-limited attack scenario, synthetic-to-measured (S2M), has been proposed, wh...

Full description

Saved in:
Bibliographic Details
Main Authors: Xiaying Jin, Shuangju Zhou, Chenyu Wang, Mingxin Fu, Quan Pan, Yang Li
Format: Article
Language:English
Published: IEEE 2025-01-01
Series:IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing
Subjects:
Online Access:https://ieeexplore.ieee.org/document/11039638/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The vulnerability of synthetic aperture radar (SAR)—automatic target recognition (ATR) models based on deep neural networks has garnered increasing attention in recent research. A novel and extreme prior-knowledge-limited attack scenario, synthetic-to-measured (S2M), has been proposed, where the architecture, parameters, training data, and outputs of the target model remain entirely unknown, and adversarial perturbations are generated exclusively using synthetic data. To address the challenges posed by the S2M attack scenario, we propose FUA, a comprehensive framework to improve the transferability of adversarial examples generated by SAR-ATR surrogate models. By introducing an S2M transferability estimation between the surrogate and target models, FUA progressively optimizes the surrogate model from three aspects: model parameters, data distribution, and model architecture. First, fine-tuning phase provides the suitable initial model parameters. Then, uniform data distribution fine-tuning phase generates a uniform substitute dataset with a decision boundary smoothing loss to further fine-tune the surrogate model. Finally, Architecture modification phase modifies the activation functions and skip connections of the model architecture with the parameters fixed. Experimental results demonstrate that FUA can outperform SOTA methods and significantly improve the S2M transferability across various adversarial attack algorithms. The optimization strategies at each phase can contribute to overall performance improvements.
ISSN:1939-1404
2151-1535