Physical Adversarial Attack Meets Computer Vision: A Decade Survey

被引:2
作者
Wei, Hui [1 ]
Tang, Hao [2 ]
Jia, Xuemei [1 ]
Wang, Zhixiang [3 ,4 ]
Yu, Hanxun [5 ]
Li, Zhubo [6 ]
Satoh, Shin'ichi [3 ,4 ]
Van Gool, Luc [7 ,8 ,9 ]
Wang, Zheng [1 ]
机构
[1] Wuhan Univ, Natl Engn Res Ctr Multimedia Software, Sch Comp Sci, Wuhan 430072, Peoples R China
[2] Peking Univ, Sch Comp Sci, Natl Key Lab Multimedia Informat Proc, Beijing 100871, Peoples R China
[3] Natl Inst Informat, Digital Content & Media Sci Res Div, Chiyoda City 1010003, Japan
[4] Univ Tokyo, Grad Sch Informat Sci & Technol, Dept Informat & Commun Engn, Bunkyo City 1138654, Japan
[5] Zhejiang Univ, Coll Software & Technol, Hangzhou 310027, Peoples R China
[6] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[7] Swiss Fed Inst Technol, Comp Vis Lab, CH-8092 Zurich, Switzerland
[8] Katholieke Univ Leuven, B-3000 Leuven, Belgium
[9] INSAIT, Sofia 1784, Bulgaria
基金
中国国家自然科学基金;
关键词
Perturbation methods; Data models; Biological system modeling; Task analysis; Predictive models; Computer vision; Surveys; Adversarial attack; adversarial medium; computer vision; physical world; survey; NEURAL-NETWORK;
D O I
10.1109/TPAMI.2024.3430860
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Despite the impressive achievements of Deep Neural Networks (DNNs) in computer vision, their vulnerability to adversarial attacks remains a critical concern. Extensive research has demonstrated that incorporating sophisticated perturbations into input images can lead to a catastrophic degradation in DNNs' performance. This perplexing phenomenon not only exists in the digital space but also in the physical world. Consequently, it becomes imperative to evaluate the security of DNNs-based systems to ensure their safe deployment in real-world scenarios, particularly in security-sensitive applications. To facilitate a profound understanding of this topic, this paper presents a comprehensive overview of physical adversarial attacks. First, we distill four general steps for launching physical adversarial attacks. Building upon this foundation, we uncover the pervasive role of artifacts carrying adversarial perturbations in the physical world. These artifacts influence each step. To denote them, we introduce a new term: adversarial medium. Then, we take the first step to systematically evaluate the performance of physical adversarial attacks, taking the adversarial medium as a first attempt. Our proposed evaluation metric, hiPAA, comprises six perspectives: Effectiveness, Stealthiness, Robustness, Practicability, Aesthetics, and Economics. We also provide comparative results across task categories, together with insightful observations and suggestions for future research directions.
引用
收藏
页码:9797 / 9817
页数:21
相关论文
共 180 条
  • [31] Robust Physical-World Attacks on Deep Learning Visual Classification
    Eykholt, Kevin
    Evtimov, Ivan
    Fernandes, Earlence
    Li, Bo
    Rahmati, Amir
    Xiao, Chaowei
    Prakash, Atul
    Kohno, Tadayoshi
    Song, Dawn
    [J]. 2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2018, : 1625 - 1634
  • [32] Feng W., 2023, IEEE Trans. Inf. ForensicsSecurity, V19, P1112
  • [33] Meta-Attack: Class-agnostic and Model-agnostic Physical Adversarial Attack
    Feng, Weiwei
    Wu, Baoyuan
    Zhang, Tianzhu
    Zhang, Yong
    Zhang, Yongdong
    [J]. 2021 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2021), 2021, : 7767 - 7776
  • [34] FLIR, 2022, "Teledyne flir free ADAS thermal datasets v2
  • [35] Gao YS, 2020, Arxiv, DOI arXiv:2007.10760
  • [36] Optical Adversarial Attack
    Gnanasambandam, Abhiram
    Sherman, Alex M.
    Chan, Stanley H.
    [J]. 2021 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION WORKSHOPS (ICCVW 2021), 2021, : 92 - 101
  • [37] Generative Adversarial Networks
    Goodfellow, Ian
    Pouget-Abadie, Jean
    Mirza, Mehdi
    Xu, Bing
    Warde-Farley, David
    Ozair, Sherjil
    Courville, Aaron
    Bengio, Yoshua
    [J]. COMMUNICATIONS OF THE ACM, 2020, 63 (11) : 139 - 144
  • [38] Grother P., 2014, NIST Interagency/InternalReport (NISTIR)-8009, P1
  • [39] DenseTNT: End-to-end Trajectory Prediction from Dense Goal Sets
    Gu, Junru
    Sun, Chen
    Zhao, Hang
    [J]. 2021 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2021), 2021, : 15283 - 15292
  • [40] Gu TY, 2019, Arxiv, DOI arXiv:1708.06733