Adversarial Robustness Enhancement for Deep Learning-Based Soft Sensors: An Adversarial Training Strategy Using Historical Gradients and Domain Adaptation (2024)

  • Journal List
  • Sensors (Basel)
  • PMC11207657

As a library, NLM provides access to scientific literature. Inclusion in an NLM database does not imply endorsem*nt of, or agreement with, the contents by NLM or the National Institutes of Health.
Learn more: PMC Disclaimer | PMC Copyright Notice

Adversarial Robustness Enhancement for Deep Learning-Based Soft Sensors: An Adversarial Training Strategy Using Historical Gradients and Domain Adaptation (1)

Link to Publisher's site

Sensors (Basel). 2024 Jun; 24(12): 3909.

Published online 2024 Jun 17. doi:10.3390/s24123909

PMCID: PMC11207657

PMID: 38931693

Runyuan Guo, Conceptualization, Methodology, Software, Validation, Formal analysis, Investigation, Resources, Data curation, Writing – original draft, Writing – review & editing, Visualization, Project administration, Funding acquisition, Qingyuan Chen, Conceptualization, Software, Validation, Formal analysis, Investigation, Writing – review & editing, Visualization, Han Liu, Validation, Formal analysis, Resources, Data curation, Supervision, Project administration, Funding acquisition,* and Wenqing Wang, Validation, Formal analysis, Funding acquisition

Kenneth Loh, Academic Editor

Author information Article notes Copyright and License information PMC Disclaimer

Associated Data

Data Availability Statement

Abstract

Despite their high prediction accuracy, deep learning-based soft sensor (DLSS) models face challenges related to adversarial robustness against malicious adversarial attacks, which hinder their widespread deployment and safe application. Although adversarial training is the primary method for enhancing adversarial robustness, existing adversarial-training-based defense methods often struggle with accurately estimating transfer gradients and avoiding adversarial robust overfitting. To address these issues, we propose a novel adversarial training approach, namely domain-adaptive adversarial training (DAAT). DAAT comprises two stages: historical gradient-based adversarial attack (HGAA) and domain-adaptive training. In the first stage, HGAA incorporates historical gradient information into the iterative process of generating adversarial samples. It considers gradient similarity between iterative steps to stabilize the updating direction, resulting in improved transfer gradient estimation and stronger adversarial samples. In the second stage, a soft sensor domain-adaptive training model is developed to learn common features from adversarial and original samples through domain-adaptive training, thereby avoiding excessive leaning toward either side and enhancing the adversarial robustness of DLSS without robust overfitting. To demonstrate the effectiveness of DAAT, a DLSS model for crystal quality variables in silicon single-crystal growth manufacturing processes is used as a case study. Through DAAT, the DLSS achieves a balance between defense against adversarial samples and prediction accuracy on normal samples to some extent, offering an effective approach for enhancing the adversarial robustness of DLSS.

Keywords: adversarial attack and defense, deep learning, soft sensors

1. Introduction

Complex industrial manufacturing processes face significant challenges in sensing key primary variables in complicated environments, which are usually measured by corresponding hardware sensors [1]. These environments are characterized by high temperatures, corrosion, and strong magnetic fields, among other challenging conditions, thereby making it difficult for hardware sensors to operate stably over extended periods of time [2,3]. Therefore, soft-sensor methods have been extensively studied and deployed in recent years. Soft-sensor methods establish models by utilizing mathematical mapping relationships between easily measurable process variables (referred to as “auxiliary variables”) and key target variables that are difficult to measure (referred to as “primary variables”) [4,5]. Such soft-sensor models effectively emulate the functionality of hardware sensors used to predict primary variables, unaffected by the complex environments of industrial processes, and inherently possess advantages in terms of universality, flexibility, and cost-effectiveness [6,7].

Soft-sensor methods are commonly categorized into data-driven and knowledge-driven methods [8]. Due to challenges in accurately establishing knowledge-driven models for complex industrial manufacturing processes, data-driven soft-sensor methods are currently mainstream [9,10]. Compared to traditional machine learning-based soft-sensor methods, deep learning-based soft-sensor methods have proven to achieve higher accuracy in most cases [11,12,13]. However, these high-accuracy soft-sensor models are not widely applied because their security and reliability face serious threats from adversarial attacks [14,15].

Deep neural networks are highly susceptible to imperceptible adversarial attacks, resulting in error outputs with high confidence [16,17]. DLSS models also face serious threats from adversarial attacks. Firstly, from an external environment perspective, an increasing number of complex industrial sites have control systems that are highly interconnected to corporate and public networks, making it easy for attackers to exploit various software and hardware vulnerabilities to infiltrate industrial control systems and carry out adversarial attacks on deployed DLSS models [18]. Secondly, from the structural characteristics of the models, DLSS itself is based on deep neural networks, which are naturally vulnerable to adversarial attacks. In recent years, some studies have proposed specific adversarial attack methods targeting DLSS. For instance, a time-series generator is proposed to implement adversarial attacks on DLSS [19]. In addition, an adversarial attack method, namely iterative directly attack output (IDAO), is proposed, and experimental attacks on the industrial ammonia synthesis process have been conducted [20]. The experimental results indicate that fake prediction results obtained by adversarial attacks could lead to misjudgments about the current process state and cause erroneous actions by actuators or mistakes by engineers, such as unnecessarily reducing material input and incorrectly lowering reaction temperatures, endangering normal industrial production and potentially causing severe safety accidents.

Therefore, it is crucial to research adversarial defense methods for DLSS to enhance the model’s ability to defend against adversarial attacks and establish robust soft-sensor models that are resilient to such attacks. Adversarial training is the primary method for enhancing the adversarial robustness of deep learning models, recognized as one of the most effective adversarial defense methods [21]. The samples generated from normal samples subjected to adversarial attacks are called adversarial samples. Adversarial training aims to enhance the adversarial robustness of DLSS models by utilizing these adversarial samples for training, a process formally considered as performing min-max optimization. The internal maximization problem involves finding adversarial samples that cause maximum loss to the deep learning model—solving this problem corresponds to the process of adversarial attacks, where the obtained optimal adversarial samples are considered to possess the most powerful attack capability. The external minimization problem involves finding deep neural network parameters that minimize the loss due to such adversarial attacks [22]. Clearly, to improve the adversarial robustness of the DLSS model through adversarial training, both the external minimization problem and the internal maximization problem of adversarial training need to be better solved.

To solve the internal maximization problem, it is essential to propose more powerful adversarial attack methods to obtain stronger adversarial samples. Currently, most attack methods targeting DLSS employ black-box transfer attacks. Since attackers typically lack knowledge of the structure and parameters of the original soft sensor (OSS), they generate adversarial samples by attacking a constructed proxy soft sensor (PSS) model. These adversarial samples with transferability are then used to attack the OSS model to achieve the black-box transfer attacks. The challenge with this attack strategy lies in estimating the transfer gradient on the PSS (the gradient used to execute black-box transfer attacks, referred to as the transfer gradient). The accuracy of this transfer gradient estimation ultimately determines the efficacy of the attack. Results from black-box transfer attacks demonstrated that the obtained adversarial samples achieved excellent attack effects on the PSS [18,20]. However, when transferred to attack the OSS, the rationality of the fake prediction results decreased and their fluctuation significantly increased, making the attack more easily detectable and hampering its effectiveness. Most current black-box transfer attack methods greedily utilize gradient directions to update adversarial samples, which impacts the accurate estimation of the transfer gradient. Consequently, adversarial samples often fall into bad local minima, resulting in the inability to generate stronger adversarial samples. The momentum method, an optimization technique that memorizes historical gradient information, can be introduced into the process of adversarial attacks on DLSS to achieve a more accurate estimation of the transfer gradient and warrants further research.

For solving external minimization problems, it is necessary to address the challenge of adversarial robustness overfitting. This issue arises when the model becomes highly susceptible to overfitting adversarial samples after adversarial training, leading to a decrease in sensing accuracy on the original normal samples [23]. Studies on adversarial training for DLSS have shown that the model inevitably suffers from adversarial robustness overfitting. After adversarial training, DLSS often struggles to balance both adversarial robustness and sensing accuracy [24]. Authors have explored similar studies on adversarial training methods for DLSS, combining the knowledge-guided adversarial attack (KGAA) method with normal adversarial training for defense and obtaining similar experimental results [18]. Therefore, further research is needed to develop new adversarial training methods that mitigate the loss of DLSS accuracy by effectively addressing the overfitting problem of adversarial robustness. Domain adaptation has been proven effective in eliminating domain distribution differences as representative approaches in transfer learning, thereby better capturing common features between source and target domains [25,26]. Therefore, it treats the target domain as that of adversarial samples and the source domain as that of the original sample, then carries out soft-sensor adversarial training under the framework of domain adaptive training to learn the common information of the adversarial samples and the original samples, thus preventing the occurrence of adversarial robust overfitting.

In summary, the security of DLSS faces significant challenges from adversarial attacks, necessitating the enhancement of the model’s adversarial robustness through adversarial training. However, the problems of transfer gradient estimation and robust overfitting in soft-sensor adversarial training have not been adequately addressed. Therefore, the soft sensor for quality variables during the growth of semiconductor silicon single crystals serves as a case study to investigate adversarial training defense methods for DLSS. The main contributions of this article are as follows:

  • (1)

    To address the challenge of accurately estimating transfer gradients, historical gradient information is integrated into the iterative process of generating an adversarial sample. This integration leverages the similarity of gradients between adjacent iteration steps, stabilizing the update direction and enhancing the accuracy of transfer gradient estimation. Consequently, this assists the iterative process in converging to adversarial samples with stronger transferability.

  • (2)

    To mitigate the overfitting issue in adversarial training, a soft-sensor DAAT model was developed within the domain adversarial training framework. This model aims to learn common features shared between adversarial and original samples, thereby achieving a balance between sensing accuracy and adversarial robustness, while avoiding excessive learning bias toward either side.

  • (3)

    The effectiveness of the proposed DLSS adversarial training method is validated in a typical complex interconnected industrial process of silicon single-crystal growth manufacturing. This study aims to draw attention to and promote further investigation into adversarial defense methods for DLSS, facilitating the safe and reliable deployment of DLSS in complex industrial processes.

The remainder of this article is structured as follows: Section 2 introduces the proposed adversarial training method, Section 3 presents a comparison and analysis of experimental results, and Section 4 concludes the study.

2. Materials and Methods

2.1. Proposed Adversarial Training for DLSS

To enhance the adversarial robustness of DLSS models, a new adversarial training, named domain-adaptation adversarial training (DAAT), is proposed. As shown in Figure 1, DAAT primarily consists of two stages: the first stage involves generating adversarial samples, and the second involves domain-adaptation training based on these adversarial samples. It is important to note that this article focuses on adversarial defense, with both stages discussed from the defender’s perspective. In the first stage, tasks typically performed by attackers are considered. This involves data hijacking on the transmission link to build a PSS based on the acquired data, followed by launching a black-box transfer attack. From the defender’s perspective, this operation translates into training a PSS with accuracy close to that of the OSS using existing samples and then applying the attack algorithm to generate adversarial samples. The first stage of DAAT can utilize different adversarial attack methods. In this study, a historical gradient-based adversarial attack (HGAA) is proposed for generating adversarial attacks. Therefore, the default attack method discussed in this paper is HGAA. The HGAA proposed in the first stage and the DLSS domain-adaptive training method proposed in the second stage will be detailed in Section 2.2 and Section 2.3.

Open in a separate window

Figure 1

Domain-adaptation adversarial training method.

2.2. HGAA for DLSS

Since the KGAA effectively addresses scenarios where sample labels cannot be obtained during attacks, the attack model of HGAA is constructed based on the KGAA method as follows:

maxδG((xorig+δ),r;θ),

(1)

s.t.xorigS,

δε,

(2)

where G((xorig+δ),r;θ)=L(yKDSS,f(xorig+δ;θ))rB(xorig+δ); herein, G((xorig+δ),r;θ) represents the loss function, f represents the data-driven PSS model, θ represents the parameter of the PSS model, δ represents the imperceptible perturbations generated by adversarial attacks (the l-norm of δ models the imperceptibility), xorig represents the original input data (i.e., samples not yet attacked), xorig+δ represents the adversarial samples, f(xorig+δ;θ) represents the output of the PSS model after the attack, B(xorig+δ)=1/f(xorig+δ)yKDSS, yKDSS represents the predicted value of the knowledge-driven soft sensor model corresponding to the process, L represents the mean-square error loss function,r is a very small positive number, and S represents the feasible domain.

Unlike the KGAA method, which greedily uses gradient directions to update adversarial samples [18], HGAA introduces the concept of the momentum method into the adversarial attack process for DLSS. It adaptively corrects the update direction by establishing the correlation between the gradient at the current moment and the transfer gradient at the historical moment. Specifically, in the n-th iteration of HGAA, the transfer gradient of the loss function with respect to the input samples is calculated as follows:

gn+1=xnG((xorig+δ),r;θ).

(3)

The correlation α between the adjacent transfer gradients gn and gn+1 is determined by the cosine similarity β and the distance similarity ξ, calculated as:

β=cos(gn,gn+1)=1,n=0gn·gn+1gn2·gn+12,n0,

(4)

ξ=gngn+12,

(5)

α=0.5×β+0.5×ξ.

(6)

A stronger correlation between the gradients of two adjacent iterations results in a larger α, indicating minor changes in the gradient direction. Conversely, less correlation between gradients of two consecutive iterations results in a smaller α, suggesting more reliance on the gradient of the previous iteration to reduce errors in the update direction. The weighted gradient is calculated using the following equation, and the resulting gradient is used as the final estimate of the transfer gradient in the n-th iteration:

gn+1=αgn+1+(1α)gn,

(7)

The momentum item is then updated based on the transfer gradient obtained at this time:

mn+1=μmn+gn+1gn+11,

(8)

where μ represents the momentum decay coefficient. Due to changes in the gradient values during iterations, the weighted gradient gn+1 is normalized by dividing its norm, and the adversarial sample at the n-th iteration is calculated based on the obtained momentum item:

xn+1adv=xn+ηsign(mn+1),

(9)

where sign represents the signum function and η represents the perturbation size added for each iteration. When the number of iterations n reaches the preset number N1, the iteration stops, and the adversarial samples xadv are generated from the original input samples xorig.

2.3. Domain Adaptation Training for DLSS

The DAAT method utilizes adversarial samples xadv generated by HGAA for training an adversarial robust DLSS model through domain adaptation. The structure of the proposed domain-adaptive training model is shown in Figure 2, where E represents a feature extractor, P is a primary variable predictor, and C is a domain classifier, all implemented using deep neural networks with parameters denoted as θe, θp, and θc, respectively. The original DLSS model can be divided into E and P structurally, where E and P together constitute the DLSS model. The initial parameters of both are inherited from the trained OSS. During domain-adaptation training, the parameter θp remains unchanged, while θe and θc are the parameters to be learned. The optimization objectives are:

argminθcLC,

(10)

argminθeLPλLC,

(11)

where λ represents the scaling factor for the reversed gradients, LP represents the sensing loss, and LC represents the domain classifier loss. The computational equations for these losses are defined as:

LP=xiorig,yiorigDorigMSE(P(E(xiorig)),yiorig)+xiadvDadv,yiorigDorigMSE(P(E(xiadv)),yiorig),

(12)

LC=xiorigDorigBCE(C(E(xiorig)),0)+xiadvDadvBCE(C(E(xiadv)),1),

(13)

where MSE represents the mean-square error and BCE represents the binary cross entropy [22]. During training, both original samples xiorig and adversarial samples xiadv are processed by the feature extractor E, followed by primary variable prediction using P and domain classification using the gradient reversal layer and domain classifier C. The gradient reversal layer does not affect the forward propagation of data but reverses gradients during backpropagation to help E extract common features between original and adversarial samples. Under the constraints of LP and LC, the common features extracted by E make it challenging for C to distinguish between original and adversarial samples, while minimizing the sensing loss, thus allowing the OSS to balance both adversarial robustness and predictive performance through DAAT. The domain-adaptive training model uses the gradient descent algorithm for iterative training. In the n-th iteration, the updates for the parameters θe and θc are computed as follows:

θn+1e=θneζ(LPθneλLCθne),

(14)

θn+1c=θncζLCθnc,

(15)

where ζ represents the learning rate. The domain-adaptive training stops when the predefined number of iterations N2 is reached. Finally, E and P are extracted and sequentially connected to obtain a DLSS model with adversarial robustness after DAAT.

Open in a separate window

Figure 2

Structure of the domain-adaptive training model for soft sensing.

3. Experiments

3.1. Case Description

This paper explores an adversarial defense method for DLSS using a semiconductor soft sensor to measure quality variables during silicon single-crystal manufacturing as a case study, as illustrated in Figure 3. The manufacturing process of silicon single crystals takes place in an environment characterized by high temperatures, inert gases, and strong magnetic fields, making it a complex industrial manufacturing process. To minimize the formation of native point defects during silicon single-crystal growth and achieve isodiametric growth, the crystal quality variable (denoted as V/G, where V represents the lifting speed of the crystal and G represents the temperature gradient of the crystal growth interface) is sensed and controlled to maintain it within a normal range. This ensures that the solid–liquid interface morphology remains ideal, resulting in the growth of high-quality silicon single crystals [27].

Open in a separate window

Figure 3

Complex industrial manufacturing process of silicon single-crystal growth.

Due to the challenges faced by hardware sensors in stably measuring V/G in complex and harsh environments over extended periods, DLSS was developed to predict V/G. Eight auxiliary variables including crystal diameter, main heater power, crystal rising speed, crucible rising speed, heating element temperature, liquid surface temperature, crystal rotation speed, and crucible rotation speed were obtained, with V/G serving as the primary variable. As part of the ongoing establishment of a silicon single-crystal growth digital twin monitoring system based on an industrial internet platform, the production environment transitioned from a closed system to an interconnected one with the outside world. This placed stringent requirements on the deployed DLSS to defend against adversarial attacks effectively. Strong adversarial robustness in the DLSS model ensures that the soft sensor results of V/G remain unaffected by adversarial attacks, thus controlling V/G within the normal range and ensuring the quality of crystal manufacturing. Therefore, soft-sensor data from the silicon single-crystal growth process were used to establish the DLSS model, and the proposed DAAT method was employed to enhance the DLSS’s adversarial robustness. Specific parameter settings for the experiment will be detailed in the following subsection.

3.2. Parameter Settings

The DAAT method consists of two stages: the generation of adversarial samples and domain-adaptive training. Therefore, the parameter settings for the adversarial sample generation stage were established first. The OSS model structure was defined as 8-64-48-32-16-10-1. A PSS model, which achieved prediction accuracy close to that of the OSS, was trained with a structure of 8-64-32-16-1. The OSS and PSS are all constructed with fully connected layers. The activation function for the hidden neurons in the OSS and PSS is set to ReLU. Before training the OSS and PSS, the connection weights of the two models are initialized via the Xavier method [28]. The training dataset size for OSS and PSS was set to 10,000, the validation dataset to 2000, and the testing dataset to 400 (specifically allocated for evaluating adversarial training results). For convenience, model inputs are normalized to [0, 1]. Both models were trained using the Adam optimizer with default parameter settings and training halted upon reaching the early stopping condition [29]. The mechanism-driven soft sensor model used in the KGAA method is detailed in [30]. Next, the HGAA parameters were empirically set as follows: N1=20, r=0.05, η=0.0025, and μ=0.55. The parameter settings for the domain-adaptation training stage primarily involved the structures of the feature extractor E, primary variable predictor P, and domain classifier C, set as 8-64-48-32, 32-16-10-1, and 32-24-18-9-1, respectively. Other parameters were empirically set as follows: λ=1, ζ=0.001, and N2=1000.

3.3. Results

First, the domain-adaptive training model must be confirmed to be well-trained. The change curve of the model’s loss function is illustrated in Figure 4. In an ideal case, after DAAT, E in the model can extract the common features of the adversarial samples and the original samples, while C cannot effectively distinguish the two. Because BCE was selected when calculating the domain classification loss LC, the ideal loss value of LC should approximate convergence to 1.38 after quantizing C’s output to [0, 1] [31]. DAAT training stops when it reaches the early stopping condition, when the value of LC eventually converges around 1.38, as depicted in Figure 4a. Meanwhile, the blackish-green curve in Figure 4b indicates that the soft sensing loss LP decreases continuously during the DAAT process, indicating that the prediction accuracy of the soft sensor model is constantly improving. Combining the changes in the two curves confirms that the domain-adaptive training model has been well-trained after DAAT. The features extracted by E not only make it difficult for C to distinguish between normal and adversarial samples but also consider the soft sensing prediction accuracy.

Open in a separate window

Figure 4

Convergence process of DAAT. (a) Soft sensing loss. (b) Domain classification loss.

Next, a comparison of the attack efficacy between KGAA and the proposed method HGAA was conducted on the test dataset, with the results of transfer attacks from both methods depicted in Figure 5. The first half curve in blue represents the output of 200 unattacked original samples. After the second half’s 200 adversarial samples are fed into OSS, the prediction output is represented by the red curve (these 200 adversarial samples were obtained by KGAA and HGAA, respectively). The output fluctuations after being attacked by KGAA are notably distinct, showing a significant deviation from normal predictions. In contrast, the output fluctuations after being attacked by HGAA depict less change, aligning more closely with the output of the unattacked samples. Such an attack is considered more feasible in practical applications.

Open in a separate window

Figure 5

Attack results. (a) Attack effect of KGAA. (b) Attack effect of HGAA. (c) OSS prediction error. (d) Cosine similarity of adjacent gradients.

In the soft-sensing phase of industrial manufacturing, operators are often unaware of the true label value of the current input sample. However, they understand domain knowledge and possess the mechanism-driven soft sensor model. Therefore, by comparing the output value of the current sample with that of the mechanism-driven model, it is possible to determine whether the current output is reasonable. The error curves between the output after adversarial attacks (KGAA and HGAA) and the output of the mechanism-driven model are plotted in Figure 5c. The error values between the output values after HGAA and the output of the mechanism-driven model are small. In contrast, the error values between the output values after KGAA and the output of the mechanism-driven model are large. Meanwhile, the mean absolute error (MAE) values between the outputs after the attacks (HGAA and KGAA) and the mechanism model’s output were calculated as 0.2 × 10−3 and 0.9 × 10−3, respectively. The output attacked by HGAA exhibited a smaller MAE, indicating that HGAA was a more rational attack method numerically. Therefore, HGAA is considered closer to the operator’s understanding.

The key difference between HGAA and KGAA lies in introducing historical gradients to correct the update direction in HGAA, enabling a more accurate estimation of the transfer gradient. As illustrated in Figure 5d, in the iterative process of HGAA and KGAA, the cosine similarity curves between adjacent gradients are grey and pink, respectively. Each point on the curves is averaged by the cosine similarity of 200 test samples. A cosine similarity of 1 indicates that the adjacent gradients are pointing in the same direction, and a cosine similarity of −1 indicates that the adjacent gradients are pointing in opposite directions. The cosine similarity of adjacent gradients of HGAA is approximately 1 at most points, which indicates that the direction of adjacent gradients of HGAA can remain similar in the iterative process. This enables the algorithm to stabilize in one direction for more accurate searches during the adversarial sample generation phase. The cosine similarity of the adjacent gradients of KGAA is between −0.5 and −0.1 in most cases, indicating certain differences in the direction of the two adjacent gradients in the iterative process. Compared with HGAA, KGAA lacks the operation of introducing historical gradients to correct the update direction, which makes KGAA unable to rely on the gradient of the previous iteration to reduce the error in the update direction during the iteration process, thus making it difficult for the algorithm to carry out accurate searches in a stable direction. Based on the analysis results shown in Figure 5 and numerical metrics, HGAA demonstrated superior performance. Therefore, it was concluded that HGAA obtained stronger adversarial samples by achieving a more accurate estimation of transfer gradients, making it a more powerful attack method.

Adversarial samples were generated for the set of 10,000 original training samples using HGAA, and DAAT was conducted using these generated adversarial samples. After completing DAAT, the last 200 out of 400 test samples were input to evaluate the adversarial robustness of the OSS, and the results are shown in Figure 6 and Figure 7. In Figure 6, the adversarial samples are fed into the OSS trained with DAAT, and the resulting output is represented by the purple curve. It is noticeable that the output curve shifts closer to the real curve after DAAT, indicating a reduction in the error between the output and the actual values. The bias introduced by the adversarial samples was mitigated, demonstrating that DAAT effectively defended against HGAA and enhanced the adversarial robustness of the OSS. Figure 7 illustrates the performance of the OSS trained with DAAT when original samples are input. The resulting output is represented by the tan-colored curve. The fluctuations in the output curve reduced, and the curve shifted closer to the real curve after DAAT. This reduction in fluctuations signifies a decrease in prediction errors, indicating an improvement in prediction accuracy for the original samples. In conclusion, the DAAT method not only enhanced adversarial robustness but also led to a slight improvement in prediction accuracy, achieving the desired effect.

Open in a separate window

Figure 6

Adversarial robustness testing results after DAAT (inputting adversarial samples).

Open in a separate window

Figure 7

Adversarial robustness testing results after DAAT (inputting original samples).

The adversarial robustness test results of the normal adversarial training (NAT) method are illustrated in Figure 8. The NAT also includes two phases: the first stage is adversarial sample generation, and the second stage is adversarial training. The adversarial samples utilized in NAT are generated by HGAA, and the sample number and parameter settings are exactly the same as HGAA in DAAT. In other words, the first stage of NAT and the first stage of DAAT are the same, but their second stages differ. The NAT adopts classical adversarial training methods, and the training process and settings are consistent with those in [32], while DAAT employs the proposed domain-adaptive training method. In Figure 8, the gray curve represents the OSS prediction results after the NAT with original samples, while the yellow curve depicts predictions with adversarial samples. As observed in Figure 8, the yellow curve closely approximates the real curve, whereas the gray curve exhibits a noticeable deviation from the real curve. This indicates that the OSS model, after NAT, has overlearned from adversarial samples, resulting in decreased accuracy when predicting with original samples and demonstrating significant adversarial robust overfitting. Comparing this with the DAAT method, represented by the purple and yellow curves in Figure 6 and Figure 7, respectively, both curves are distributed around the truth curve and closely approximate it. This suggests that the OSS model, following DAAT, did not overlearn from either adversarial or original samples. In conclusion, compared to NAT, DAAT effectively mitigates the issue of adversarial robust overfitting and achieves a better balance between original prediction accuracy and adversarial robustness.

Open in a separate window

Figure 8

Adversarial robustness testing results after NAT (inputting adversarial or original samples).

To further demonstrate the effectiveness of the proposed method, contrast experiments were conducted, and the numerical results are presented in Table 1. In the table, xorig represents the original samples, xadv_HGAA, xadv_IDAO, xadv_RNAA, and xadv_KGAA represent the adversarial samples generated by xorig using the HGAA, IDAO, RNAA, and KGAA methods, respectively, MAE represents the prediction error of OSS, MAEDAAT_HGAA and MAEDAAT_KGAA represent the prediction error of OSS after applying DAAT (with the HGAA and KGAA attack methods, respectively), and MAENAT_HGAA represents the prediction error of OSS after NAT using adversarial samples generated by HGAA.

Table 1

Adversarial robustness testing results for different adversarial training methods.

Test SamplesTest Indexes
MAEMAEDAAT_HGAAMAEDAAT_KGAAMAENAT_HGAA
xorig1.2×1031.0×1031.4×1033.4×103
xadv_HGAA3.1×1031.1×1031.5×1031.7×103
xadv_KGAA4.1×1031.1×1031.5×1031.4×103
xadv_IDAO11.4×1034.4×1033.1×1035.6×103
xadv_RNAA3.2×1033.1×1033.6×1034.0×103

Open in a separate window

Table 1 illustrates that when the input is xorig, MAE is 1.2×103, with MAEDAAT_HGAA decreasing to 1.0×103. Conversely, MAEDAAT_KGAA and MAENAT_HGAA increase, suggesting that DAAT based on HGAA can maintain good prediction accuracy when dealing with original samples. The difference between DAAT based on HGAA and DAAT based on KGAA lies in HGAA’s more accurate estimation of the transfer gradient, which aids in generating superior adversarial samples and improving OSS predictive performance. When the input is xadv_HGAA, the MAE is 3.1×103, and MAEDAAT_HGAA, MAEDAAT_KGAA, and MAENAT_HGAA all exhibit varying degrees of decline. This indicates that these three adversarial training methods enhance defense against HGAA. Among the three MAE values, the value of MAEDAAT_HGAA is the lowest. When the input is xadv_KGAA and xadv_RNAA, the MAEDAAT_HGAA is also the lowest, and when the input is xadv_IDAO, the MAEDAAT_HGAA is the second lowest, indicating that the DAAT method based on HGAA defends against HGAA and also achieves good defense against KGAA, IDAO, and RNAA. When the input is xadv_IDAO, the value of MAEDAAT_HGAA is bigger than the value of MAEDAAT_KGAA. It does not mean that the DAAT method based on KGAA improves the overall robustness of OSS. The experimental results only confirm that the OSS has a stronger defense capability against IDAO at this time. As IDAO in this example exhibits a significant shift in attack results, the practicality of the attack is insufficient, and it is difficult to better simulate real attack behavior. Therefore, it is more practical to employ the HGAA, KGAA, and RNAA methods to evaluate the defense ability of OSS because the three attack methods are commonly considered practical attack methods. In summary, the DAAT method based on HGAA balances against adversarial samples while maintaining predictive accuracy for original samples, thereby enhancing the adversarial robustness of DLSS models.

3.4. Discussion

Although adversarial training can enhance a model’s adversarial robustness, the effectiveness of using NAT to improve the adversarial robustness of the DLSS model (i.e., the OSS model in the experiment) is quite limited. The issues of transfer gradient estimation and overfitting in adversarial robustness often arise, yet previous relevant research has not systematically addressed these problems. Therefore, this paper proposes a novel adversarial training method, DAAT, to tackle these challenges in DLSS, yielding promising results. While many effective adversarial training methods have been developed for classification models, DLSS as a regression prediction model is still at an early stage of improving its adversarial robustness. The proposed method represents a valuable exploration in this area. In addition, most studies in the DLSS field select representative industrial process data and verify the effectiveness of the proposed method on the process data. The data size is generally between thousands and tens of thousands, and the data dimension (the number of auxiliary variables) is between several to dozens. Therefore, this study is consistent with the convention of most studies, utilizing data from the V/G soft-sensing process with a similar data size as most studies to verify the effectiveness of the proposed DAAT method. In future studies, datasets with larger sizes will be utilized to further enhance the method’s performance. Meanwhile, the method will also be validated on data from other cases to improve potential limitations in the results.

4. Conclusions

To address the challenges associated with the accurate estimation of transfer gradients and adversarial robustness overfitting when employing adversarial training methods to enhance the adversarial robustness of DLSS, a new DLSS adversarial training method named DAAT was proposed and its effectiveness was verified through the soft-sensing stage of silicon single-crystal quality variables. During the DAAT process, HGAA was employed, which introduced historical gradient information into the iterative process of generating adversarial examples. This approach considers the similarity of gradients between adjacent iteration steps to stabilize the update direction, thereby increasing the accuracy of transfer gradient estimation and generating stronger adversarial examples. This optimization addresses the internal maximization problem in DAAT. DLSS learns the common features between adversarial samples generated by HGAA and original samples through DAAT, achieving a good balance between sensing accuracy and adversarial robustness. This optimization addresses the external minimization problem in DAAT. As a result, DLSS not only enhances its adversarial robustness against HGAA but also acquires defensive ability against KGAA after undergoing DAAT. Given that DLSS is deployed in safety-critical industrial environments, merely defending against existing attack methods is insufficient. It is essential to further study more robust adversarial training methods to defend against potential new types of unknown adversarial attacks. Additionally, developing detection methods for adversarial attacks is crucial to quickly distinguish between normal samples and adversarial samples, thus establishing a more efficient and comprehensive defense system. Ultimately, improving the safety and reliability of DLSS and promoting its extensive deployment and application in complex industrial processes requires advancements in both adversarial training methods and adversarial attack detection techniques. This holistic approach will contribute to the overall security and reliability of DLSS in critical industrial settings.

Funding Statement

This research was funded in part by the National Natural Science Foundation of China (NSFC) under Grant 92270117 and 62376214, in part by the Natural Science Basic Research Program of Shaanxi under Grant 2024JC-YBQN-0697 and 2023-JC-YB-533, and in part by the Doctoral Scientific Research Startup Foundation of Xi’an University of Technology under Grant 103-451123015.

Author Contributions

Conceptualization, R.G. and Q.C.; methodology, R.G.; software, R.G. and Q.C.; validation, R.G., Q.C., H.L. and W.W.; formal analysis, R.G., Q.C., H.L. and W.W.; investigation, R.G. and Q.C.; resources, R.G. and H.L.; data curation, R.G. and H.L.; writing—original draft preparation, R.G.; writing—review and editing, R.G. and Q.C.; visualization, R.G. and Q.C.; supervision, H.L.; project administration, R.G. and H.L.; funding acquisition, R.G., H.L. and W.W. All authors have read and agreed to the published version of the manuscript.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data are available for reasonable reasons by contacting the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

Footnotes

Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

References

1. Guo R., Liu H., Xie G., Zhang Y., Liu D. A Self-Interpretable Soft Sensor Based on Deep Learning and Multiple Attention Mechanism: From Data Selection to Sensor Modeling. IEEE Trans. Ind. Inform. 2023;19:6859–6871. doi:10.1109/TII.2022.3181692. [CrossRef] [Google Scholar]

2. Yuan X., Huang L., Ye L., Wang Y., Wang K., Yang C., Gui W., Shen F. Quality Prediction Modeling for Industrial Processes Using Multiscale Attention-Based Convolutional Neural Network. IEEE Trans. Cybern. 2024;54:2696–2707. doi:10.1109/TCYB.2024.3365068. [PubMed] [CrossRef] [Google Scholar]

3. Lv J., Kuang J., Yu Z., Sun G., Liu J., Leon J.I. Diagnosis of PEM Fuel Cell System Based on Electrochemical Impedance Spectroscopy and Deep Learning Method. IEEE Trans. Ind. Electron. 2024;71:657–666. doi:10.1109/TIE.2023.3241404. [CrossRef] [Google Scholar]

4. Cheng H., Liu Y., Huang D., Xu C., Wu J. A Novel Ensemble Adaptive Sparse Bayesian Transfer Learning Machine for Nonlinear Large-Scale Process Monitoring. Sensors. 2020;20:6139. doi:10.3390/s20216139. [PMC free article] [PubMed] [CrossRef] [Google Scholar]

5. Yuan X., Wang Y., Wang C., Ye L., Wang K., Wang Y., Yang C., Gui W., Shen F. Variable Correlation Analysis-Based Convolutional Neural Network for Far Topological Feature Extraction and Industrial Predictive Modeling. IEEE Trans. Instrum. Meas. 2024;73:3001110. doi:10.1109/TIM.2024.3373085. [CrossRef] [Google Scholar]

6. Chen Y., Chen Z., Gui W., Yang C. Real-Time Detection and Short-Term Prediction of Blast Furnace Burden Level Based on Space-Time Fusion Features. Sensors. 2022;22:5412. doi:10.3390/s22145412. [PMC free article] [PubMed] [CrossRef] [Google Scholar]

7. Zhang Z., Yan G., Qiao T., Fang Y., Pang Y. Multi-Source Unsupervised Soft Sensor Based on Joint Distribution Alignment and Mapping Structure Preservation. J. Process Contr. 2022;109:44–59. doi:10.1016/j.jprocont.2021.11.009. [CrossRef] [Google Scholar]

8. Guo R., Liu H. A Hybrid Mechanism- and Data-Driven Soft Sensor Based on the Generative Adversarial Network and Gated Recurrent Unit. IEEE Sens. J. 2021;22:25901–25911. doi:10.1109/JSEN.2021.3117981. [CrossRef] [Google Scholar]

9. Li J., Li K. Application in Soft Sensing Modeling of Chemical Process based on K-OPLS Method. J. Meas. Sci. Instrum. 2020;11:17–27. [Google Scholar]

10. Wang Y., Jin H., Chen X., Wang B., Yang B., Qian B. Online-Dynamic-Clustering-Based Soft Sensor for Industrial Semi-Supervised Data Streams. Sensors. 2023;23:1520. doi:10.3390/s23031520. [PMC free article] [PubMed] [CrossRef] [Google Scholar]

11. Yan A., Gu T. Model Prediction and Optimal Control of Gas Oxygen Content for A Municipal Solid Waste Incineration Process. Instrumentation. 2024;11:101–111. [Google Scholar]

12. Lv J., Yu Z., Sun G., Liu J. Deep Learning-Based Fault Diagnosis and Electrochemical Impedance Spectroscopy Frequency Selection Method for Proton Exchange Membrane Fuel Cell. J. Power Sources. 2024;591:233815. doi:10.1016/j.jpowsour.2023.233815. [CrossRef] [Google Scholar]

13. Zhu K., Zhao C. Dynamic Graph-Based Adaptive Learning for Online Industrial Soft Sensor with Mutable Spatial Coupling Relations. IEEE Trans. Ind. Electron. 2023;70:9614–9622. doi:10.1109/TIE.2022.3215448. [CrossRef] [Google Scholar]

14. Chen L., Zhu Q.-X., He Y.-L. Adversarial Attacks for Neural Network-Based Industrial Soft Sensors: Mirror Output Attack and Translation Mirror Output Attack. IEEE Trans. Ind. Inform. 2024;20:2378–2386. doi:10.1109/TII.2023.3291717. [CrossRef] [Google Scholar]

15. Gaur V.S., Sharma V., McAllister J. Abusive Adversarial Agents and Attack Strategies in Cyber-Physical Systems. CAAI Trans. Intell. Technol. 2023;8:149–165. doi:10.1049/cit2.12171. [CrossRef] [Google Scholar]

16. Kurniawan A., Ohsita Y., Murata M. Experiments on Adversarial Examples for Deep Learning Model Using Multimodal Sensors. Sensors. 2022;22:8642. doi:10.3390/s22228642. [PMC free article] [PubMed] [CrossRef] [Google Scholar]

17. Yuan X., Jia Z., Xu Z., Xu N., Ye L., Wang K., Wang Y., Yang C., Gui W., Shen F. Hierarchical Self-Attention Network for Industrial Data Series Modeling with Different Sampling Rates Between the Input and Output Sequences. IEEE Trans. Neur. Net. Lear. 2024 doi:10.1109/TNNLS.2024.3388151. early access. [PubMed] [CrossRef] [Google Scholar]

18. Guo R., Liu H., Liu D. When Deep Learning-Based Soft Sensors Encounter Reliability Challenges: A Practical Knowledge-Guided Adversarial Attack and Its Defense. IEEE Trans. Ind. Inform. 2024;20:2702–2714. doi:10.1109/TII.2023.3297663. [CrossRef] [Google Scholar]

19. Wu T., Wang X., Qiao S., Xian X., Liu Y., Zhang L. Small Perturbations Are Enough: Adversarial Attacks on Time Series Prediction. Inf. Sci. 2022;587:794–812. doi:10.1016/j.ins.2021.11.007. [CrossRef] [Google Scholar]

20. Kong X., Ge Z. Adversarial Attacks on Neural-Network-Based Soft Sensors: Directly Attack Output. IEEE Trans. Ind. Inform. 2022;18:2443–2451. doi:10.1109/TII.2021.3093386. [CrossRef] [Google Scholar]

21. Yuan X., Zhang Z., Wang X., Wu L. Semantic-Aware Adversarial Training for Reliable Deep Hashing Retrieval. IEEE Trans. Inform. Foren. Sec. 2023;18:4681–4694. doi:10.1109/TIFS.2023.3297791. [CrossRef] [Google Scholar]

22. Guo Y., Zhang J., Sun B., Wang Y. Adversarial Deep Transfer Learning in Fault Diagnosis: Progress, Challenges, and Future Prospects. Sensors. 2023;23:7263. doi:10.3390/s23167263. [PMC free article] [PubMed] [CrossRef] [Google Scholar]

23. Chen C., Ye D., He Y., Tang L., Xu Y. Improving Adversarial Robustness with Adversarial Augmentations. IEEE Internet Things. 2024;11:5105–5117. doi:10.1109/JIOT.2023.3301608. [CrossRef] [Google Scholar]

24. Xie Y., Wang J., Xie S., Chen X. Adversarial Training-Based Deep Layer-Wise Probabilistic Network for Enhancing Soft Sensor Modeling of Industrial Processes. IEEE Trans. Syst. Man Cybern. Syst. 2024;54:972–984. doi:10.1109/TSMC.2023.3322195. [CrossRef] [Google Scholar]

25. Xiao G., Peng S., Xiang W., Chen H., Guo J., Gong Z. CMFT: Contrastive Memory Feature Transfer for Nonshared-and-Imbalanced Unsupervised Domain Adaption. IEEE Trans. Ind. Inform. 2023;19:9227–9238. doi:10.1109/TII.2022.3227637. [CrossRef] [Google Scholar]

26. Liu Z., Zhang O., Gao Y., Zhao Y., Sun Y., Liu J. Adaptive Neural Network-Based Fixed-Time Control for Trajectory Tracking of Robotic Systems. IEEE Trans. Circuits-II. 2023;7:241–245. doi:10.1109/TCSII.2022.3194917. [CrossRef] [Google Scholar]

27. Fisher G., Seacrist M.R., Standley R.W. Silicon Crystal Growth and Wafer Technologies. Proc. IEEE. 2012;100:1454–1474. doi:10.1109/JPROC.2012.2189786. [CrossRef] [Google Scholar]

28. Zhang H., Liu H., Liang L., Ma W., Liu D. BiLSTMTANet: An Adaptive Diverse Scenes Model with Context Embeddings for Few-Shot Learning. Appl. Intell. 2024;54:5097–5116. doi:10.1007/s10489-024-05440-y. [CrossRef] [Google Scholar]

29. Zhao Y., Liu H., Guo R., Xie G., Zhang Y. Air Preheater Rotor Deformation Soft Sensor Based on Wavelet Analysis and SVR; Proceedings of the 2020 Chinese Automation Congress (CAC); Shanghai, China. 6–8 November 2020; pp. 4490–4495. [Google Scholar]

30. Ren J.C., Liu D., Wan Y. Data-Driven and Mechanism-Based Hybrid Model for Semiconductor Silicon Monocrystalline Quality Prediction in the Czochralski Process. IEEE Trans. Semiconduct. Manuf. 2022;35:658–669. doi:10.1109/TSM.2022.3202610. [CrossRef] [Google Scholar]

31. Li Y., Song Y., Jia L., Gao S., Li Q., Qiu M. Intelligent Fault Diagnosis by Fusing Domain Adversarial Training and Maximum Mean Discrepancy via Ensemble Learning. IEEE Trans. Ind. Inform. 2021;17:2833–2841. doi:10.1109/TII.2020.3008010. [CrossRef] [Google Scholar]

32. Mądry A., Makelov A., Schmidt L., Tsipras D., Vladu A. Towards Deep Learning Models Resistant to Adversarial Attacks; Proceedings of the 2018 6th International Conference on Learning Representations (ICLR); Vancouver, BC, Canada. 30 April–3 May 2018. [Google Scholar]

Articles from Sensors (Basel, Switzerland) are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

Adversarial Robustness Enhancement for Deep Learning-Based Soft Sensors: An Adversarial Training Strategy Using Historical Gradients and Domain Adaptation (2024)
Top Articles
Latest Posts
Article information

Author: Neely Ledner

Last Updated:

Views: 5988

Rating: 4.1 / 5 (42 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Neely Ledner

Birthday: 1998-06-09

Address: 443 Barrows Terrace, New Jodyberg, CO 57462-5329

Phone: +2433516856029

Job: Central Legal Facilitator

Hobby: Backpacking, Jogging, Magic, Driving, Macrame, Embroidery, Foraging

Introduction: My name is Neely Ledner, I am a bright, determined, beautiful, adventurous, adventurous, spotless, calm person who loves writing and wants to share my knowledge and understanding with you.