Understanding Black-Box Attacks Against Object Detectors from a User's Perspective

被引:0
作者
Midtlid, Kim Andre [1 ]
Asheim, Johannes [1 ]
Li, Jingyue [1 ]
机构
[1] Norwegian Univ Sci & Technol, Trondheim, Norway
来源
QUALITY OF INFORMATION AND COMMUNICATIONS TECHNOLOGY, QUATIC 2022 | 2022年 / 1621卷
关键词
Artificial intelligence; Object detection; Image classification; Adversarial attacks; ADVERSARIAL ATTACKS;
D O I
10.1007/978-3-031-14179-9_18
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to recent developments in object detection systems, and the realistic threat of black-box adversarial attacks on object detector models, we argue the need for a contextual understanding of the attacks from the users' perspective. Existing literature reviews either do not provide complete and up-to-date summaries of such attacks or focus on the knowledge from the researchers' perspective. In this research, we conducted a systematic literature review to identify state-of-the-art black-box attacks and extract the information to help users evaluate and mitigate the risks. The literature review resulted in 29 black-box attack methods. We analyzed each attack from the following main aspects: attackers' knowledge needed to perform the attack, attack consequences, attack generalizability, and strategies to mitigate the attacks. Our results demonstrate an emerging increase in highly generalizable attacks, which now make up more than 50% of the landscape. We also reveal that more than 50% of recent attacks remain untested against mitigation strategies.
引用
收藏
页码:266 / 280
页数:15
相关论文
共 51 条
[1]   Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey [J].
Akhtar, Naveed ;
Mian, Ajmal .
IEEE ACCESS, 2018, 6 :14410-14430
[2]  
Alzantot M, 2019, Arxiv, DOI arXiv:1805.11090
[3]  
Amazon, 2021, AWS REK
[4]  
Amazon, 2021, AWS MACH LEARN
[5]  
[Anonymous], 2021, AutoML
[6]   Practical Black-Box Attacks on Deep Neural Networks Using Efficient Query Mechanisms [J].
Bhagoji, Arjun Nitin ;
He, Warren ;
Li, Bo ;
Song, Dawn .
COMPUTER VISION - ECCV 2018, PT XII, 2018, 11216 :158-174
[7]  
Bhambri S, 2020, Arxiv, DOI [arXiv:1912.01667, DOI 10.48550/ARXIV.1912.01667]
[8]  
Borkar J, 2021, Arxiv, DOI arXiv:2105.09685
[9]  
Brendel W, 2018, Arxiv, DOI arXiv:1712.04248
[10]   HopSkipJumpAttack: A Query-Efficient Decision-Based Attack [J].
Chen, Jianbo ;
Jordan, Michael, I ;
Wainwright, Martin J. .
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, :1277-1294