Transferable Adversarial Attacks for Image and Video Object Detection

被引:0
|
作者
Wei, Xingxing [1 ]
Liang, Siyuan [2 ]
Chen, Ning [1 ]
Cao, Xiaochun [2 ]
机构
[1] Tsinghua Univ, THBI Lab, State Key Lab Intell Tech & Syst, Dept Comp Sci & Tech Inst Artificial Intelligence, Beijing, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
基金
中国博士后科学基金;
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Identifying adversarial examples is beneficial for understanding deep networks and developing robust models. However, existing attacking methods for image object detection have two limitations: weak transferability-the generated adversarial examples often have a low success rate to attack other kinds of detection methods, and high computation cost-they need much time to deal with video data, where many frames need polluting. To address these issues, we present a generative method to obtain adversarial images and videos, thereby significantly reducing the processing time. To enhance transferability, we manipulate the feature maps extracted by a feature network, which usually constitutes the basis of object detectors. Our method is based on the Generative Adversarial Network (GAN) framework, where we combine a high-level class loss and a low-level feature loss to jointly train the adversarial example generator. Experimental results on PASCAL VOC and ImageNet VID datasets show that our method efficiently generates image and video adversarial examples, and more importantly, these adversarial examples have better transferability, therefore being able to simultaneously attack two kinds of representative object detection models: proposal based models like Faster-RCNN and regression based models like SSD.
引用
收藏
页码:954 / 960
页数:7
相关论文
共 50 条
  • [31] Frequency-constrained transferable adversarial attack on image manipulation detection and localization
    Zeng, Yijia
    Pun, Chi-Man
    VISUAL COMPUTER, 2024, 40 (07): : 4817 - 4828
  • [32] Adversarial Attacks for Object Detection Based on Region of Interest of Feature Maps
    Wang, Yekui
    Cao, Tieyong
    Zheng, Yunfei
    Fang, Zheng
    Wang, Yang
    Liu, Yajiu
    Fu, Bingyang
    Chen, Lei
    Computer Engineering and Applications, 2024, 59 (02) : 261 - 270
  • [33] Adversarial Attacks Assessment of Salient Object Detection via Symbolic Learning
    Olague, Gustavo
    Pineda, Roberto
    Ibarra-Vazquez, Gerardo
    Olague, Matthieu
    Martinez, Axel
    Bakshi, Sambit
    Vargas, Jonathan
    Reducindo, Isnardo
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2023, 11 (04) : 1018 - 1030
  • [34] Mitigating Adversarial Attacks in Object Detection through Conditional Diffusion Models
    Ye, Xudong
    Zhang, Qi
    Cui, Sanshuai
    Ying, Zuobin
    Sun, Jingzhang
    Du, Xia
    MATHEMATICS, 2024, 12 (19)
  • [35] Adversarial Machine Learning Attacks Against Video Anomaly Detection Systems
    Mumcu, Furkan
    Doshi, Keval
    Yilmaz, Yasin
    2022 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS, CVPRW 2022, 2022, : 205 - 212
  • [36] Transferable Adversarial Attacks for Remote Sensing Object Recognition via Spatial-Frequency Co-Transformation
    Fu, Yimin
    Liu, Zhunga
    Lyu, Jialin
    IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, 2024, 62
  • [37] Transferable adversarial attack on image tampering localization
    Cao, Gang
    Wang, Yuqi
    Zhu, Haochen
    Lou, Zijie
    Yu, Lifang
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2024, 102
  • [38] Channel-augmented joint transformation for transferable adversarial attacks
    Zheng, Desheng
    Ke, Wuping
    Li, Xiaoyu
    Zhang, Shibin
    Yin, Guangqiang
    Qian, Weizhong
    Zhou, Yong
    Min, Fan
    Yang, Shan
    APPLIED INTELLIGENCE, 2024, 54 (01) : 428 - 442
  • [39] Channel-augmented joint transformation for transferable adversarial attacks
    Desheng Zheng
    Wuping Ke
    Xiaoyu Li
    Shibin Zhang
    Guangqiang Yin
    Weizhong Qian
    Yong Zhou
    Fan Min
    Shan Yang
    Applied Intelligence, 2024, 54 : 428 - 442
  • [40] AutoMA: Towards Automatic Model Augmentation for Transferable Adversarial Attacks
    Yuan, Haojie
    Chu, Qi
    Zhu, Feng
    Zhao, Rui
    Liu, Bin
    Yu, Nenghai
    IEEE TRANSACTIONS ON MULTIMEDIA, 2023, 25 : 203 - 213