Transferable Black Box Attack on Visual Object Tracking Based on Important Features

被引:0
|
作者
Yao R. [1 ,2 ,3 ]
Zhu X.-B. [1 ,2 ]
Zhou Y. [1 ,2 ]
Wang P. [3 ,4 ]
Zhang Y.-N. [3 ,4 ]
Zhao J.-Q. [1 ,2 ]
机构
[1] School of Computer Science and Technology, China University of Mining and Technology, Jiangsu, Xuzhou
[2] Ministry of Education Engineering Research Center of Mine Digitization, Jiangsu, Xuzhou
[3] National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology, Shaanxi, Xi’an
[4] School of Computer Science, Northwestern Polytechnical University, Shaanxi, Xi’an
来源
Tien Tzu Hsueh Pao/Acta Electronica Sinica | 2023年 / 51卷 / 04期
基金
中国国家自然科学基金;
关键词
adversarial attack; black box attack; feature similarity; important features; transferability; visual object tracking;
D O I
10.12263/DZXB.20220057
中图分类号
学科分类号
摘要
Black-box attack methods for video object tracking have received increasing attention in order to evaluate the robustness of object trackers and thus improve the security of trackers. Most of the current researches are based on que⁃ ry-based black-box attacks. Although fairly good attack effects are achieved, a large number of queries still cannot be ob⁃ tained for attack in practical application. We propose a transfer based black-box attack method, which attacks the important features in the features that are highly related to the tracking target and are not affected by the source model, reduceing their importance and enhancing the unimportant features to realize the transferable attack. Specifically, the corresponding gradi⁃ ent is obtained by back propagation to reflect the importance of its features, and then the weighted feature obtained by the gradient is used to attack. In addition, this paper uses the temporal information of similarity between adjacent video frames to propose a sequential-aware feature similarity attack method to attack the object tracker by reducing the feature similarity be⁃ tween adjacent frames. This paper evaluates the proposed attack method on the current mainstream deep learning target track⁃ er. The experimental results on multiple datasets prove the effectiveness and strong mobility of this method. In OTB bench⁃ mark, the tracking success rate and accuracy of SiamRPN tracking model are reduced by 71.5% and 79.9%, respectively. © 2023 Chinese Institute of Electronics. All rights reserved.
引用
收藏
页码:826 / 834
页数:8
相关论文
共 22 条
  • [1] SZEGEDY C, ZAREMBA W, SUTSKEVER I, Et al., In⁃ triguing properties of neural networks
  • [2] YAN B, WANG D, LU H C, Et al., Cooling-shrinking at⁃ tack: Blinding the tracker with imperceptible noises, 2020 IEEE/CVF Conference on Computer Vision and Pat⁃ tern Recognition (CVPR), pp. 987-996, (2020)
  • [3] YAN X Y, CHEN X S, JIANG Y, Et al., Hijacking tracker: A powerful adversarial attack on visual tracking, ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2897-2901, (2020)
  • [4] LIANG S Y, WEI X X, YAO S Y, Et al., Efficient adversar⁃ ial attacks for visual object tracking, European Confer⁃ ence on Computer Vision - ECCV 2020, pp. 34-50, (2020)
  • [5] CHEN X S, YAN X Y, ZHENG F, Et al., One-shot adver⁃ sarial attacks on visual tracking with dual attention, 2020 IEEE/CVF Conference on Computer Vision and Pat⁃ tern Recognition (CVPR), pp. 10173-10182, (2020)
  • [6] GUO Q, CHENG Z Y, JUEFEI-XU F, Et al., Learning to adversarially blur visual object tracking, 2021 IEEE/ CVF International Conference on Computer Vision (IC⁃ CV), pp. 10819-10828, (2022)
  • [7] GUO Q, XIE X F, JUEFEI-XU F, Et al., SPARK: Spatial-aware online incremental attack against visual tracking, European Conference on Computer Vision - ECCV 2020, pp. 202-219, (2020)
  • [8] JIA S, SONG Y B, MA C, Et al., IoU attack: Towards tem⁃ porally coherent black-box adversarial attack for visual ob⁃ ject tracking, 2021 IEEE/CVF Conference on Comput⁃ er Vision and Pattern Recognition (CVPR), pp. 6705-6714, (2021)
  • [9] WANG Z B, GUO H C, ZHANG Z F, Et al., Feature impor⁃ tance-aware transferable adversarial attacks, 2021 IEEE/CVF International Conference on Computer Vision (ICCV), pp. 7619-7628, (2022)
  • [10] WEI X, LIANG S, CHEN N, Et al., Transferable adversari⁃ al attacks for image and video object detection