Object-Aware Transfer-Based Black-Box Adversarial Attack on Object Detector

被引:0
作者
Leng, Zhuo [1 ]
Cheng, Zesen [1 ]
Wei, Pengxu [2 ]
Chen, Jie [1 ,3 ]
机构
[1] Peking Univ, Sch Elect & Comp Engn, Shenzhen, Peoples R China
[2] Sun Yat Sen Univ, Guangzhou, Peoples R China
[3] Peng Cheng Lab, Shenzhen, Peoples R China
来源
PATTERN RECOGNITION AND COMPUTER VISION, PRCV 2023, PT XII | 2024年 / 14436卷
基金
国家重点研发计划;
关键词
Black-box attack; Adversarial Attack; Object Detection;
D O I
10.1007/978-981-99-8555-5_22
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Deep neural networks have been demonstrated to be vulnerable to adversarial noise from attacks. Compared with white-box attacks, black-box attacks fool deep neural networks to yield erroneous predictions without knowing the model parameters. Black-box attacks include query-based attacks and transfer-based attacks; the former rely on querying the model while the latter just rely on the transferability of adversarial examples, thus challenging. Existing transfer-based black-box adversarial attack methods focus on the image classification task. Especially, we empirically verify that those methods struggle to balance the attack on objects with different classes and sizes, and thus they perform poorly in the attack on object detectors. In this work, we propose an Object-Aware mechanism to address this issue. It includes Object-Wise Gradient (OWG) calculation to balance the attack on multiple objects and a Domain-Division Map (DDM) to weigh the attack in size. Incorporating our method with seminal baselines (e.g., I-FGSM, MI-FGSM), we achieve superior attack performance on multiple object detectors (e.g., Faster R-CNN, DETR, SSD), which justifies the effectiveness and generality of our method.
引用
收藏
页码:278 / 289
页数:12
相关论文
共 30 条
[1]  
Brendel W, 2018, Arxiv, DOI [arXiv:1712.04248, DOI 10.48550/ARXIV.1712.04248]
[2]   End-to-End Object Detection with Transformers [J].
Carion, Nicolas ;
Massa, Francisco ;
Synnaeve, Gabriel ;
Usunier, Nicolas ;
Kirillov, Alexander ;
Zagoruyko, Sergey .
COMPUTER VISION - ECCV 2020, PT I, 2020, 12346 :213-229
[3]  
Chen K, 2019, Arxiv, DOI arXiv:1906.07155
[4]   Class-Aware Robust Adversarial Training for Object Detection [J].
Chen, Pin-Chun ;
Kung, Bo-Han ;
Chen, Jun-Cheng .
2021 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, CVPR 2021, 2021, :10415-10424
[5]   Benchmarking Adversarial Robustness on Image Classification [J].
Dong, Yinpeng ;
Fu, Qi-An ;
Yang, Xiao ;
Pang, Tianyu ;
Su, Hang ;
Xiao, Zihao ;
Zhu, Jun .
2020 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2020, :318-328
[6]   Evading Defenses to Transferable Adversarial Examples by Translation-Invariant Attacks [J].
Dong, Yinpeng ;
Pang, Tianyu ;
Su, Hang ;
Zhu, Jun .
2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, :4307-4316
[7]   Boosting Adversarial Attacks with Momentum [J].
Dong, Yinpeng ;
Liao, Fangzhou ;
Pang, Tianyu ;
Su, Hang ;
Zhu, Jun ;
Hu, Xiaolin ;
Li, Jianguo .
2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2018, :9185-9193
[8]   Deep Residual Learning for Image Recognition [J].
He, Kaiming ;
Zhang, Xiangyu ;
Ren, Shaoqing ;
Sun, Jian .
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, :770-778
[9]  
Huang H., 2021, IEEE INT C MULTIMEDI, P1
[10]  
Goodfellow IJ, 2015, Arxiv, DOI arXiv:1412.6572