Evoattack: suppressive adversarial attacks against object detection models using evolutionary search

被引:2
作者
Chan, Kenneth H. [1 ]
Cheng, Betty H. C. [1 ]
机构
[1] Michigan State Univ, Dept Comp Sci & Engn, 428 S Shaw Lane, E Lansing, MI 48824 USA
关键词
Black-box Adversarial Attacks; Cybersecurity; Evolutionary Computing; Object Detection; Cybersecure AI; Deep Neural Networks;
D O I
10.1007/s10515-024-00470-9
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
State-of-the-art deep neural networks are increasingly used in image classification, recognition, and detection tasks for a range of real-world applications. Moreover, many of these applications are safety-critical, where the failure of the system may cause serious harm, injuries, or even deaths. Adversarial examples are expected inputs that are maliciously modified, but difficult to detect, such that the machine learning models fail to classify them correctly. While a number of evolutionary search-based approaches have been developed to generate adversarial examples against image classification problems, evolutionary search-based attacks against object detection algorithms remain largely unexplored. This paper describes EvoAttack that demonstrates how evolutionary search-based techniques can be used as a black-box, model- and data-agnostic approach to attack state-of-the-art object detection algorithms (e.g., RetinaNet, Faster R-CNN, and YoloV5). A proof-of-concept implementation is provided to demonstrate how evolutionary search can generate adversarial examples that existing models fail to correctly process, which can be used to assess model robustness against such attacks. In contrast to other adversarial example approaches that cause misclassification or incorrect labeling of objects, EvoAttack applies minor perturbations to generate adversarial examples that suppress the ability of object detection algorithms to detect objects. We applied EvoAttack to popular benchmark datasets for autonomous terrestrial and aerial vehicles.
引用
收藏
页数:37
相关论文
共 59 条
[1]   GenAttack: Practical Black-box Attacks with Gradient-Free Optimization [J].
Alzantot, Moustafa ;
Sharma, Yash ;
Chakraborty, Supriyo ;
Zhang, Huan ;
Hsieh, Cho-Jui ;
Srivastava, Mani B. .
PROCEEDINGS OF THE 2019 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE (GECCO'19), 2019, :1111-1119
[2]   Zero-Query Transfer Attacks on Context-Aware Object Detectors [J].
Cai, Zikui ;
Rane, Shantanu ;
Brito, Alejandro E. ;
Song, Chengyu ;
Krishnamurthy, Srikanth, V ;
Roy-Chowdhury, Amit K. ;
Asif, M. Salman .
2022 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2022), 2022, :15004-15014
[3]   VisDrone-DET2021: The Vision Meets Drone Object detection Challenge Results [J].
Cao, Yaru ;
He, Zhijian ;
Wang, Lujia ;
Wang, Wenguan ;
Yuan, Yixuan ;
Zhang, Dingwen ;
Zhang, Jinglin ;
Zhu, Pengfei ;
Van Gool, Luc ;
Han, Junwei ;
Hoi, Steven ;
Hu, Qinghua ;
Liu, Ming ;
Cheng, Chong ;
Liu, Fanfan ;
Cao, Guojin ;
Li, Guozhen ;
Wang, Hongkai ;
He, Jianye ;
Wan, Junfeng ;
Wan, Qi ;
Zhao, Qi ;
Lyu, Shuchang ;
Zhao, Wenzhe ;
Lu, Xiaoqiang ;
Zhu, Xingkui ;
Liu, Yingjie ;
Lv, Yixuan ;
Ma, Yujing ;
Yang, Yuting ;
Wang, Zhe ;
Xu, Zhenyu ;
Luo, Zhipeng ;
Zhang, Zhimin ;
Zhang, Zhiguang ;
Li, Zihao ;
Zhang, Zixiao .
2021 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION WORKSHOPS (ICCVW 2021), 2021, :2847-2854
[4]   Towards Evaluating the Robustness of Neural Networks [J].
Carlini, Nicholas ;
Wagner, David .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :39-57
[5]  
Chan K.H., 2023, INT S SEARCH BAS SOF, P19
[6]   EvoAttack: An Evolutionary Search-Based Adversarial Attack for Object Detection Models [J].
Chan, Kenneth ;
Cheng, Betty H. C. .
SEARCH-BASED SOFTWARE ENGINEERING, SSBSE 2022, 2022, 13711 :83-97
[7]   POBA-GA: Perturbation optimized black-box adversarial attacks via genetic algorithm [J].
Chen, Jinyin ;
Su, Mengmeng ;
Shen, Shijing ;
Xiong, Hui ;
Zheng, Haibin .
COMPUTERS & SECURITY, 2019, 85 :89-106
[8]   A fast and elitist multiobjective genetic algorithm: NSGA-II [J].
Deb, K ;
Pratap, A ;
Agarwal, S ;
Meyarivan, T .
IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2002, 6 (02) :182-197
[9]   Robust Physical-World Attacks on Deep Learning Visual Classification [J].
Eykholt, Kevin ;
Evtimov, Ivan ;
Fernandes, Earlence ;
Li, Bo ;
Rahmati, Amir ;
Xiao, Chaowei ;
Prakash, Atul ;
Kohno, Tadayoshi ;
Song, Dawn .
2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2018, :1625-1634
[10]   A Review and Comparative Study on Probabilistic Object Detection in Autonomous Driving [J].
Feng, Di ;
Harakeh, Ali ;
Waslander, Steven L. ;
Dietmayer, Klaus .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (08) :9961-9980