Transferable Adversarial Attacks for Image and Video Object Detection

被引:0
|
作者
Wei, Xingxing [1 ]
Liang, Siyuan [2 ]
Chen, Ning [1 ]
Cao, Xiaochun [2 ]
机构
[1] Tsinghua Univ, THBI Lab, State Key Lab Intell Tech & Syst, Dept Comp Sci & Tech Inst Artificial Intelligence, Beijing, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
基金
中国博士后科学基金;
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Identifying adversarial examples is beneficial for understanding deep networks and developing robust models. However, existing attacking methods for image object detection have two limitations: weak transferability-the generated adversarial examples often have a low success rate to attack other kinds of detection methods, and high computation cost-they need much time to deal with video data, where many frames need polluting. To address these issues, we present a generative method to obtain adversarial images and videos, thereby significantly reducing the processing time. To enhance transferability, we manipulate the feature maps extracted by a feature network, which usually constitutes the basis of object detectors. Our method is based on the Generative Adversarial Network (GAN) framework, where we combine a high-level class loss and a low-level feature loss to jointly train the adversarial example generator. Experimental results on PASCAL VOC and ImageNet VID datasets show that our method efficiently generates image and video adversarial examples, and more importantly, these adversarial examples have better transferability, therefore being able to simultaneously attack two kinds of representative object detection models: proposal based models like Faster-RCNN and regression based models like SSD.
引用
收藏
页码:954 / 960
页数:7
相关论文
共 50 条
  • [21] Detection of adversarial attacks based on differences in image entropy
    Ryu, Gwonsang
    Choi, Daeseon
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (01) : 299 - 314
  • [22] Detection of adversarial attacks based on differences in image entropy
    Gwonsang Ryu
    Daeseon Choi
    International Journal of Information Security, 2024, 23 : 299 - 314
  • [23] Real-Time Robust Video Object Detection System Against Physical-World Adversarial Attacks
    Han, Husheng
    Hu, Xing
    Hao, Yifan
    Xu, Kaidi
    Dang, Pucheng
    Wang, Ying
    Zhao, Yongwei
    Du, Zidong
    Guo, Qi
    Wang, Yanzhi
    Zhang, Xishan
    Chen, Tianshi
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 43 (01) : 366 - 379
  • [24] Feature Importance-aware Transferable Adversarial Attacks
    Wang, Zhibo
    Guo, Hengchang
    Zhang, Zhifei
    Liu, Wenxin
    Qin, Zhan
    Ren, Kui
    2021 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2021), 2021, : 7619 - 7628
  • [25] FAPA: Transferable Adversarial Attacks Based on Foreground Attention
    Yang, Zhifei
    Li, Wenmin
    Gao, Fei
    Wen, Qiaoyan
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [26] Transferable adversarial attacks for multi-model systems coupling image fusion with classification models
    Pengcheng Zhu
    Xin Jin
    Qian Jiang
    Xueshuai Gao
    Puming Wang
    Shaowen Yao
    Wei Zhou
    Cybersecurity, 8 (1)
  • [27] Adversarial pan-sharpening attacks for object detection in remote sensing
    Wei, Xingxing
    Yuan, Maoxun
    PATTERN RECOGNITION, 2023, 139
  • [28] A survey on adversarial attacks and defenses for object detection and their applications in autonomous vehicles
    Amirkhani, Abdollah
    Karimi, Mohammad Parsa
    Banitalebi-Dehkordi, Amin
    VISUAL COMPUTER, 2023, 39 (11): : 5293 - 5307
  • [29] Adversarial Evasion Noise Attacks Against TensorFlow Object Detection API
    Kannan, Raadhesh
    Jian, Chin Ji
    Guo, XiaoNing
    INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST-2020), 2020, : 172 - 175
  • [30] A survey on adversarial attacks and defenses for object detection and their applications in autonomous vehicles
    Abdollah Amirkhani
    Mohammad Parsa Karimi
    Amin Banitalebi-Dehkordi
    The Visual Computer, 2023, 39 : 5293 - 5307