BENCHMARKING ADVERSARIAL ATTACKS AND DEFENSES IN REMOTE SENSING IMAGES

被引:1
|
作者
Zhang, Hanmeng [1 ]
Jiang, Xue [1 ]
机构
[1] Shanghai Jiao Tong Univ, Shanghai, Peoples R China
基金
中国国家自然科学基金;
关键词
adversarial attack; adversarial defense; remote sensing images;
D O I
10.1109/IGARSS52108.2023.10283102
中图分类号
P [天文学、地球科学];
学科分类号
07 ;
摘要
Deep neural networks are prone to being fooled by adversarial examples, which are created by adding imperceptible perturbations to deceive the classifier and induce incorrect predictions. Several defense methods have been proposed to address this issue. However, little attention has been given to the application of these methods in the field of remote sensing image (RSI) area. In this research, we have developed a comprehensive open-source benchmark that aims to evaluate the effectiveness of adversarial attacks and defenses in the context of RSI scene classification 1. Extensive experiments have been conducted on both SAR and optical image datasets to thoroughly analyze white-box attacks, black-box attacks, and defense scenarios. We anticipate that our benchmark will assist researchers in constructing deep neural networks with enhanced resistance against adversarial attacks in the RSI field.
引用
收藏
页码:899 / 902
页数:4
相关论文
共 50 条
  • [21] Adversarial Examples: Attacks and Defenses for Deep Learning
    Yu, Xiaoyong
    He, Pan
    Zhu, Qile
    Li, Xiaolin
    IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2019, 30 (09) : 2805 - 2824
  • [22] Adversarial examples: attacks and defenses in the physical world
    Ren, Huali
    Huang, Teng
    Yan, Hongyang
    INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2021, 12 (11) : 3325 - 3336
  • [23] Adversarial Attacks and Defenses: Frontiers, Advances and Practice
    Xu, Han
    Li, Yaxin
    Jin, Wei
    Tang, Jiliang
    KDD '20: PROCEEDINGS OF THE 26TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2020, : 3541 - 3542
  • [24] Adversarial pan-sharpening attacks for object detection in remote sensing
    Wei, Xingxing
    Yuan, Maoxun
    PATTERN RECOGNITION, 2023, 139
  • [25] Adaptive Normalized Attacks for Learning Adversarial Attacks and Defenses in Power Systems
    Tian, Jiwei
    Li, Tengyao
    Shang, Fute
    Cao, Kunrui
    Li, Jing
    Ozay, Mete
    2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CONTROL, AND COMPUTING TECHNOLOGIES FOR SMART GRIDS (SMARTGRIDCOMM), 2019,
  • [26] Adversarial attacks and defenses in explainable artificial intelligence: A survey
    Baniecki, Hubert
    Biecek, Przemyslaw
    INFORMATION FUSION, 2024, 107
  • [27] Adversarial attacks and defenses for digital communication signals identification
    Tian, Qiao
    Zhang, Sicheng
    Mao, Shiwen
    Lin, Yun
    DIGITAL COMMUNICATIONS AND NETWORKS, 2024, 10 (03) : 756 - 764
  • [28] Adversarial Example Attacks and Defenses in DNS Data Exfiltration
    Savic, Izabela
    Yan, Haonan
    Lin, Xiaodong
    Gillis, Daniel
    EMERGING INFORMATION SECURITY AND APPLICATIONS, EISA 2023, 2024, 2004 : 147 - 163
  • [29] An Analysis of Adversarial Attacks and Defenses on Autonomous Driving Models
    Deng, Yao
    Zheng, Xi
    Zhang, Tianyi
    Chen, Chen
    Lou, Guannan
    Kim, Miryung
    2020 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM 2020), 2020,
  • [30] On the Robustness of Deep Clustering Models: Adversarial Attacks and Defenses
    Chhabra, Anshuman
    Sekhari, Ashwin
    Mohapatra, Prasant
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 35 (NEURIPS 2022), 2022,