Pattern Corruption-Assisted Physical Attacks Against Object Detection in UAV Remote Sensing

被引:0
作者
Zhang, Yu [1 ]
Gong, Zhiqiang [2 ]
Wen, Hao [1 ]
Hu, Xikun [1 ]
Xia, Xiaoyan [1 ]
Jiang, Hejun [3 ]
Zhong, Ping [1 ]
机构
[1] Natl Univ Def Technol, Natl Key Lab Sci & Technol ATR, Changsha 410073, Peoples R China
[2] Chinese Acad Mil Sci, Natl Innovat Inst Def Technol, Beijing 100000, Peoples R China
[3] Key Lab Near Ground Detect Technol, Wuxi 214035, Peoples R China
关键词
Perturbation methods; Three-dimensional displays; Generators; Autonomous aerial vehicles; Synthetic aperture radar; Detectors; Training; Decision boundary; generator; object detection; physical attacks; transferability;
D O I
10.1109/JSTARS.2024.3422377
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Deep neural networks (DNNs) have attained remarkable success in aerial detection tasks, yet they remain susceptible to adversarial samples, posing a significant challenge for their practical applications. While numerous transferable attacks have been proposed, they frequently overlook the essential balance between attack effectiveness and the feasibility of physical implementation. In this article, we concentrate our efforts on adversarial attacks against aerial detection, crafting transferable adversarial patches that can be implemented in the physical world. To this end, we introduce localized pattern corruptions, such as light spots and shadows, around the target during the training phase. These corruptions could pull the image distributions closer to the decision boundaries of the surrogate model, thereby enhancing the transferability of patches. In addition, we avoid directly optimizing adversarial patterns with traditional gradient-based techniques. Instead, we opt to update the weights of a specialized generator, which employs multilayer perceptrons (MLPs) as its core component for mapping purposes. To verify the effectiveness of our method, we conduct experiments across both the digital and physical domains. The results reveal that our approach outperforms state-of-the-art methods in terms of attack performance.
引用
收藏
页码:12931 / 12944
页数:14
相关论文
共 57 条
[1]  
Athalye A, 2018, PR MACH LEARN RES, V80
[2]   Superpixel-Based Multiscale CNN Approach Toward Multiclass Object Segmentation From UAV-Captured Aerial Images [J].
Behera, Tanmay Kumar ;
Bakshi, Sambit ;
Nappi, Michele ;
Sa, Pankaj Kumar .
IEEE JOURNAL OF SELECTED TOPICS IN APPLIED EARTH OBSERVATIONS AND REMOTE SENSING, 2023, 16 :1771-1784
[3]   A Novel Transformer Network With Shifted Window Cross-Attention for Spatiotemporal Weather Forecasting [J].
Bojesomo, Alabi ;
Almarzouqi, Hasan ;
Liatsis, Panos .
IEEE JOURNAL OF SELECTED TOPICS IN APPLIED EARTH OBSERVATIONS AND REMOTE SENSING, 2024, 17 :45-55
[4]   DaViT: Dual Attention Vision Transformers [J].
Ding, Mingyu ;
Xiao, Bin ;
Codella, Noel ;
Luo, Ping ;
Wang, Jingdong ;
Yuan, Lu .
COMPUTER VISION, ECCV 2022, PT XXIV, 2022, 13684 :74-92
[5]   Query-Efficient Black-Box Adversarial Attacks Guided by a Transfer-Based Prior [J].
Dong, Yinpeng ;
Cheng, Shuyu ;
Pang, Tianyu ;
Su, Hang ;
Zhu, Jun .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2022, 44 (12) :9536-9548
[6]  
Dosovitskiy A., 2021, P INT C LEARN REPR I
[7]  
Dosovitskiy Alexey, 2017, Conference on robot learning, P1
[8]   Physical Adversarial Attacks on an Aerial Imagery Object Detector [J].
Du, Andrew ;
Chen, Bo ;
Chin, Tat-Jun ;
Law, Yee Wei ;
Sasdelli, Michele ;
Rajasegaran, Ramesh ;
Campbell, Dillon .
2022 IEEE WINTER CONFERENCE ON APPLICATIONS OF COMPUTER VISION (WACV 2022), 2022, :3798-3808
[9]   AdvDrop: Adversarial Attack to DNNs by Dropping Information [J].
Duan, Ranjie ;
Chen, Yuefeng ;
Niu, Dantong ;
Yang, Yun ;
Qin, A. K. ;
He, Yuan .
2021 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2021), 2021, :7486-7495
[10]  
Fang SM, 2022, AAAI CONF ARTIF INTE, P571