4.6 Article

To make yourself invisible with Adversarial Semantic Contours

期刊

出版社

ACADEMIC PRESS INC ELSEVIER SCIENCE
DOI: 10.1016/j.cviu.2023.103659

关键词

Adversarial examples; Sparse attacks; Object detection; Detection transformer

向作者/读者索取更多资源

This paper proposes a method for sparse attack on modern object detectors, which selects potential pixels and optimizes texture to attack the detectors. The method effectively reduces the search space of pixel selection and introduces more semantic bias, thereby improving the attack performance. Experiments demonstrate that the method can modify fewer than 5% of the pixels in the object area and corrupt the prediction of 9 modern detectors with different architectures. The attack is also extended to datasets for autonomous driving systems to verify its effectiveness.
Modern object detectors are vulnerable to adversarial examples, which may bring risks to real-world applications. The sparse attack is an important task which, compared with the popular adversarial perturbation on the whole image, needs to select the potential pixels that is generally regularized by an l(0)-norm constraint, and simultaneously optimize the corresponding texture. The non-differentiability of l(0) norm brings challenges and many works on attacking object detection adopted manually-designed patterns to address them, which are meaningless and independent of objects, and therefore lead to relatively poor attack performance. In this paper, we propose Adversarial Semantic Contour (ASC), an MAP estimate of a Bayesian formulation of sparse attack with a deceived prior of object contour. The object contour prior effectively reduces the search space of pixel selection and improves the attack by introducing more semantic bias. Extensive experiments demonstrate that ASC can corrupt the prediction of 9 modern detectors with different architectures (e.g., one-stage, two-stage and Transformer) by modifying fewer than 5% of the pixels of the object area in COCO in white-box scenario and around 10% of those in black-box scenario. We further extend the attack to datasets for autonomous driving systems to verify the effectiveness. We conclude with cautions about contour being the common weakness of object detectors with various architecture and the care needed in applying them in safety-sensitive scenarios.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据