Dynamic Quasi-Hyperbolic Momentum Iterative Attack With Small Perturbation for 4D-Flight Trajectory Prediction

Zhengyang Zhao, Buhong Wang, Xuan Yao, Jiwei Tian, Ruochen Dong, Peican Zhu

Research output: Contribution to journalArticlepeer-review

Abstract

With the rapid growth of global air traffic, 4Dflight trajectory prediction (4D-FTP) using deep learning (DL) methods has become essential for applications, such as flight delay prediction, fuel consumption analysis, and traffic management. However, the adversarial attacks pose significant security threats to DL-based 4D-FTP systems reliant on automatic dependent surveillance-broadcast (ADS-B) sensors. Furthermore, existing vulnerabilities in time-series prediction (TSP) models for 4DFTP remain underexplored due to the lack of effective and stealthy attack methods. To address this gap, we propose the dynamic quasi-hyperbolic momentum (QHM) iterative attack with small perturbation (DQM-Attack). This method leverages QHM and dynamic step sizes to optimize gradient utilization in 4D-FTP models. In addition, attack stealth is enhanced through the manifold smooth module (MSM) and sparse smooth reinforcement learning (SS-RL). Experimental results demonstrate that DQM-Attack effectively disrupts predictions with minimal perturbations across four state-of-the-art TSP models. This study appears to be the first to address stealthy adversarial attacks on 4D-FTP systems, revealing a critical security vulnerability in air traffic management (ATM).

Original languageEnglish
Pages (from-to)22533-22553
Number of pages21
JournalIEEE Internet of Things Journal
Volume12
Issue number12
DOIs
StatePublished - 2025

Keywords

  • 4-D trajectory flight prediction
  • adversarial example (AE)
  • quasi-hyperbolic momentum (QHM)
  • sparse smooth with reinforcement learning (SS-RL)
  • time-series prediction (TSP)

Fingerprint

Dive into the research topics of 'Dynamic Quasi-Hyperbolic Momentum Iterative Attack With Small Perturbation for 4D-Flight Trajectory Prediction'. Together they form a unique fingerprint.

Cite this