Transferable Adversarial Attacks for Image and Video Object Detection

被引:0
|
作者
Wei, Xingxing [1 ]
Liang, Siyuan [2 ]
Chen, Ning [1 ]
Cao, Xiaochun [2 ]
机构
[1] Tsinghua Univ, THBI Lab, State Key Lab Intell Tech & Syst, Dept Comp Sci & Tech Inst Artificial Intelligence, Beijing, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
基金
中国博士后科学基金;
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Identifying adversarial examples is beneficial for understanding deep networks and developing robust models. However, existing attacking methods for image object detection have two limitations: weak transferability-the generated adversarial examples often have a low success rate to attack other kinds of detection methods, and high computation cost-they need much time to deal with video data, where many frames need polluting. To address these issues, we present a generative method to obtain adversarial images and videos, thereby significantly reducing the processing time. To enhance transferability, we manipulate the feature maps extracted by a feature network, which usually constitutes the basis of object detectors. Our method is based on the Generative Adversarial Network (GAN) framework, where we combine a high-level class loss and a low-level feature loss to jointly train the adversarial example generator. Experimental results on PASCAL VOC and ImageNet VID datasets show that our method efficiently generates image and video adversarial examples, and more importantly, these adversarial examples have better transferability, therefore being able to simultaneously attack two kinds of representative object detection models: proposal based models like Faster-RCNN and regression based models like SSD.
引用
收藏
页码:954 / 960
页数:7
相关论文
共 50 条
  • [11] Transferable Adversarial Attacks Against ASR
    Gao, Xiaoxue
    Li, Zexin
    Chen, Yiming
    Liu, Cong
    Li, Haizhou
    IEEE SIGNAL PROCESSING LETTERS, 2024, 31 : 2200 - 2204
  • [12] Adversarial Attacks on Video Object Segmentation With Hard Region Discovery
    Li, Ping
    Zhang, Yu
    Yuan, Li
    Zhao, Jian
    Xu, Xianghua
    Zhang, Xiaoqin
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2024, 34 (06) : 5049 - 5062
  • [13] Towards Transferable Adversarial Attacks on Vision Transformers
    Wei, Zhipeng
    Chen, Jingjing
    Goldblum, Micah
    Wu, Zuxuan
    Goldstein, Tom
    Jiang, Yu-Gang
    THIRTY-SIXTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTY-FOURTH CONFERENCE ON INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE / THE TWELVETH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2022, : 2668 - 2676
  • [14] ADAPTIVE WARPING NETWORK FOR TRANSFERABLE ADVERSARIAL ATTACKS
    Son, Minji
    Kwon, Myung-Joon
    Kim, Hee-Seon
    Byun, Junyoung
    Cho, Seungju
    Kim, Changick
    2022 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP, 2022, : 3056 - 3060
  • [15] Towards Transferable Adversarial Attacks with Centralized Perturbation
    Wu, Shangbo
    Tan, Yu-an
    Wang, Yajie
    Ma, Ruinan
    Ma, Wencong
    Li, Yuanzhang
    THIRTY-EIGHTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 38 NO 6, 2024, : 6109 - 6116
  • [16] Exploring the Adversarial Robustness of Video Object Segmentation via One-shot Adversarial Attacks
    Jiang, Kaixun
    Hong, Lingyi
    Chen, Zhaoyu
    Guo, Pinxue
    Tao, Zeng
    Wang, Yan
    Zhang, Wenqiang
    PROCEEDINGS OF THE 31ST ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA, MM 2023, 2023, : 8598 - 8607
  • [17] Survey of Physical Adversarial Attacks Against Object Detection Models
    Cai, Wei
    Di, Xingyu
    Jiang, Xinhao
    Wang, Xin
    Gao, Weijie
    Computer Engineering and Applications, 2024, 60 (10) : 61 - 75
  • [18] ROSA: Robust Salient Object Detection Against Adversarial Attacks
    Li, Haofeng
    Li, Guanbin
    Yu, Yizhou
    IEEE TRANSACTIONS ON CYBERNETICS, 2020, 50 (11) : 4835 - 4847
  • [19] DETECTSEC: Evaluating the robustness of object detection models to adversarial attacks
    Du, Tianyu
    Ji, Shouling
    Wang, Bo
    He, Sirui
    Li, Jinfeng
    Li, Bo
    Wei, Tao
    Jia, Yunhan
    Beyah, Raheem
    Wang, Ting
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (09) : 6463 - 6492
  • [20] Non-targeted Adversarial Attacks on Object Detection Models
    Mi, Jian-Xun
    Zhao, Xiangjin
    Chen, Yongtao
    Cheng, Xiao
    Tian, Peng
    Lv, Xiaohong
    Zhong, Jiayong
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT IX, ICIC 2024, 2024, 14870 : 3 - 12