Context-Guided Black-Box Attack for Visual Tracking

被引:0
|
作者
Huang, Xingsen [1 ,2 ]
Miao, Deshui [1 ]
Wang, Hongpeng [1 ,2 ]
Wang, Yaowei [2 ]
Li, Xin [2 ]
机构
[1] Harbin Inst Technol Shenzhen, Sch Comp Sci & Technol, Shenzhen 518055, Peoples R China
[2] Peng Cheng Lab, Shenzhen 518055, Peoples R China
基金
中国国家自然科学基金;
关键词
Target tracking; Feature extraction; Visualization; Transformers; Interference; Image reconstruction; Robustness; Visual tracking; adversarial attack;
D O I
10.1109/TMM.2024.3382473
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the recent advancement of deep neural networks, visual tracking has achieved substantial progress in tracking accuracy. However, the robustness and security of tracking methods developed based on current deep models have not been thoroughly explored, a critical consideration for real-world applications. In this study, we propose a context-guided black-box attack method to investigate the robustness of recent advanced deep trackers against spatial and temporal interference. For spatial interference, the proposed algorithm generates adversarial target samples by mixing the information of the target object and the similar background regions around it in an embedded feature space of an encoder-decoder model, which evaluates the ability of trackers to handle background distractors. For temporal interference, we use the target state in the previous frame to generate the adversarial sample, which easily fools the trackers that rely too heavily on tracking prior assumptions, such as that the appearance changes and movements of a video target object are small between two consecutive frames. We assess the proposed attack method under both CNN-based and transformer-based tracking frameworks on four diverse datasets: OTB100, VOT2018, GOT-10 k, and LaSOT. The experimental results demonstrate that our approach substantially deteriorates the performance of all these deep trackers across numerous datasets, even in the black-box attack mode. This reveals the weak robustness of recent deep tracking methods against background distractors and prior dependencies.
引用
收藏
页码:8824 / 8835
页数:12
相关论文
共 50 条
  • [41] THE BLACK-BOX
    KYLE, SA
    NEW SCIENTIST, 1986, 110 (1512) : 61 - 61
  • [42] An Invisible Black-Box Backdoor Attack Through Frequency Domain
    Wang, Tong
    Yao, Yuan
    Xu, Feng
    An, Shengwei
    Tong, Hanghang
    Wang, Ting
    COMPUTER VISION, ECCV 2022, PT XIII, 2022, 13673 : 396 - 413
  • [43] SurFree: a fast surrogate-free black-box attack
    Maho, Thibault
    Furon, Teddy
    Le Merrer, Erwan
    2021 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, CVPR 2021, 2021, : 10425 - 10434
  • [44] Research Status of Black-Box Intelligent Adversarial Attack Algorithms
    Wei, Jian
    Song, Xiaoqing
    Wang, Qinzhao
    Computer Engineering and Applications, 2023, 59 (13) : 61 - 73
  • [45] Spanning attack: reinforce black-box attacks with unlabeled data
    Lu Wang
    Huan Zhang
    Jinfeng Yi
    Cho-Jui Hsieh
    Yuan Jiang
    Machine Learning, 2020, 109 : 2349 - 2368
  • [46] Spanning attack: reinforce black-box attacks with unlabeled data
    Wang, Lu
    Zhang, Huan
    Yi, Jinfeng
    Hsieh, Cho-Jui
    Jiang, Yuan
    MACHINE LEARNING, 2020, 109 (12) : 2349 - 2368
  • [47] HYBRID ADVERSARIAL SAMPLE CRAFTING FOR BLACK-BOX EVASION ATTACK
    Zheng, Juan
    He, Zhimin
    Lin, Zhe
    2017 INTERNATIONAL CONFERENCE ON WAVELET ANALYSIS AND PATTERN RECOGNITION (ICWAPR), 2017, : 236 - 242
  • [48] Black-box adversarial attacks on XSS attack detection model
    Wang, Qiuhua
    Yang, Hui
    Wu, Guohua
    Choo, Kim-Kwang Raymond
    Zhang, Zheng
    Miao, Gongxun
    Ren, Yizhi
    COMPUTERS & SECURITY, 2022, 113
  • [49] Optimized Gradient Boosting Black-Box Adversarial Attack Algorithm
    Liu, Mengting
    Ling, Jie
    Computer Engineering and Applications, 2023, 59 (18) : 260 - 267
  • [50] THE BLACK-BOX
    WISEMAN, J
    ECONOMIC JOURNAL, 1991, 101 (404): : 149 - 155