To make yourself invisible with Adversarial Semantic Contours

被引:2
作者
Zhang, Yichi [1 ]
Zhu, Zijian [2 ]
Su, Hang [1 ]
Zhu, Jun [1 ]
Zheng, Shibao [2 ]
He, Yuan [3 ]
Xue, Hui [3 ]
机构
[1] Tsinghua Univ, Inst Artificial Intelligence, Dept Comp Sci & Technol, THBI Lab, Beijing 100084, Peoples R China
[2] Shanghai Jiao Tong Univ, Inst Image Commun, Network Engn, Shanghai 200240, Peoples R China
[3] Alibaba Grp, Hangzhou 311121, Peoples R China
关键词
Adversarial examples; Sparse attacks; Object detection; Detection transformer;
D O I
10.1016/j.cviu.2023.103659
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Modern object detectors are vulnerable to adversarial examples, which may bring risks to real-world applications. The sparse attack is an important task which, compared with the popular adversarial perturbation on the whole image, needs to select the potential pixels that is generally regularized by an l(0)-norm constraint, and simultaneously optimize the corresponding texture. The non-differentiability of l(0) norm brings challenges and many works on attacking object detection adopted manually-designed patterns to address them, which are meaningless and independent of objects, and therefore lead to relatively poor attack performance. In this paper, we propose Adversarial Semantic Contour (ASC), an MAP estimate of a Bayesian formulation of sparse attack with a deceived prior of object contour. The object contour prior effectively reduces the search space of pixel selection and improves the attack by introducing more semantic bias. Extensive experiments demonstrate that ASC can corrupt the prediction of 9 modern detectors with different architectures (e.g., one-stage, two-stage and Transformer) by modifying fewer than 5% of the pixels of the object area in COCO in white-box scenario and around 10% of those in black-box scenario. We further extend the attack to datasets for autonomous driving systems to verify the effectiveness. We conclude with cautions about contour being the common weakness of object detectors with various architecture and the care needed in applying them in safety-sensitive scenarios.
引用
收藏
页数:11
相关论文
共 23 条
  • [21] Quantum theory-inspired inter-sentence semantic interaction model for textual adversarial defense
    Huang, Jiacheng
    Chen, Long
    Yi, Xiaoyin
    Yu, Ning
    COMPLEX & INTELLIGENT SYSTEMS, 2025, 11 (01)
  • [22] TOWARDS ROBUST TRAINING OF MULTI-SENSOR DATA FUSION NETWORK AGAINST ADVERSARIAL EXAMPLES IN SEMANTIC SEGMENTATION
    Yu, Youngjoon
    Lee, Hong Joo
    Kim, Byeong Cheon
    Kim, Jung Uk
    Ro, Yong Man
    2021 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP 2021), 2021, : 4710 - 4714
  • [23] BeamAttack: Generating High-quality Textual Adversarial Examples Through Beam Search and Mixed Semantic Spaces
    Zhu, Hai
    Zhao, Qinyang
    Wu, Yuren
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PAKDD 2023, PT II, 2023, 13936 : 454 - 465