Deep Learning Security for IoT

Han Wu, University of Exeter, the U.K.


  Research Website

Background

Is Deep Learning secure for IoT?

Deep Learning on IoT Edge Devices

Autonomous Driving: The IoT in Automotive

Adversarial attacks against image classification [1]

Adversarial attacks against object detection  

[1] J. Z. Kolter and A. Madry, Adversarial Robustness - Theory and Practice, NeurIPS 2018 tutorial.

Deep Learning Models are vulnerable to Adversarial Attacks.

1. High-End: Linux

2. High-End: RT-Thread Smart

3. Middle-End: RT-Thread

IoT Devices consist of High-End, Middle-End, and Low-End Devices.

Adversarial Detection  

Attacking Object Detection in Real Time.

Man-in-the-Middle Attack  

A hardware attack against Object Detection.

Step 1: Generating the perturbation

Prior Research                                                             Our Method

    

No learning rate decay                                                 With learning rate decay

Our method generates more bounding boxes, and have less variation.

Step 2: Applying the perturbation

From Linux to RT-Thread Smart

From Monolithic to Microkernel RTOS

From RT-Smart to RT-Thread

From High-End Devices to Middle-End Devices.

Adversarial Classification  

Attacking Image Classification Cloud Services.

Demo: DeepAPI via RT-Thread

Access Image Classification Cloud Service on MCU.

Deep Learning Models are vulnerable to Adversarial Attacks.

High-End: Linux

High-End: RT-Smart

Middle-End: RT-Thread

IoT Devices consist of High-End, Middle-End, and Low-End Devices.

Thanks

RT-Thread Community

https://iot.wuhanstudio.uk

  Research Website