Understanding Black-Box Attacks Against Object Detectors from a User's Perspective

被引:0
作者
Midtlid, Kim Andre [1 ]
Asheim, Johannes [1 ]
Li, Jingyue [1 ]
机构
[1] Norwegian Univ Sci & Technol, Trondheim, Norway
来源
QUALITY OF INFORMATION AND COMMUNICATIONS TECHNOLOGY, QUATIC 2022 | 2022年 / 1621卷
关键词
Artificial intelligence; Object detection; Image classification; Adversarial attacks; ADVERSARIAL ATTACKS;
D O I
10.1007/978-3-031-14179-9_18
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to recent developments in object detection systems, and the realistic threat of black-box adversarial attacks on object detector models, we argue the need for a contextual understanding of the attacks from the users' perspective. Existing literature reviews either do not provide complete and up-to-date summaries of such attacks or focus on the knowledge from the researchers' perspective. In this research, we conducted a systematic literature review to identify state-of-the-art black-box attacks and extract the information to help users evaluate and mitigate the risks. The literature review resulted in 29 black-box attack methods. We analyzed each attack from the following main aspects: attackers' knowledge needed to perform the attack, attack consequences, attack generalizability, and strategies to mitigate the attacks. Our results demonstrate an emerging increase in highly generalizable attacks, which now make up more than 50% of the landscape. We also reveal that more than 50% of recent attacks remain untested against mitigation strategies.
引用
收藏
页码:266 / 280
页数:15
相关论文
共 50 条
  • [31] Measurable Trust: The Key to Unlocking User Confidence in Black-Box AI
    Palazzolo, Puntis
    Stahl, Bernd
    Webb, Helena
    PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON TRUSTWORTHY AUTONOMOUS SYSTEMS, TAS 2024, 2024,
  • [32] Safety Assessment: From Black-Box to White-Box
    Kurzidem, Iwo
    Misik, Adam
    Schleiss, Philipp
    Burton, Simon
    2022 IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW 2022), 2022, : 295 - 300
  • [33] Black-box Transferable Attack Method for Object Detection Based on GAN
    Lu Y.-X.
    Liu Z.-Y.
    Luo Y.-G.
    Deng S.-Y.
    Jiang T.
    Ma J.-Y.
    Dong Y.-P.
    Ruan Jian Xue Bao/Journal of Software, 2024, 35 (07): : 3531 - 3550
  • [34] Understanding the black-box: towards interpretable and reliable deep learning models
    Qamar, Tehreem
    Bawany, Narmeen Zakaria
    PEERJ COMPUTER SCIENCE, 2023, 9
  • [35] Adversarial patch attacks against aerial imagery object detectors
    Tang, Guijian
    Jiang, Tingsong
    Zhou, Weien
    Li, Chao
    Yao, Wen
    Zhao, Yong
    NEUROCOMPUTING, 2023, 537 : 128 - 140
  • [36] Object-Aware Transfer-Based Black-Box Adversarial Attack on Object Detector
    Leng, Zhuo
    Cheng, Zesen
    Wei, Pengxu
    Chen, Jie
    PATTERN RECOGNITION AND COMPUTER VISION, PRCV 2023, PT XII, 2024, 14436 : 278 - 289
  • [37] Practical Black-Box Attacks on Deep Neural Networks Using Efficient Query Mechanisms
    Bhagoji, Arjun Nitin
    He, Warren
    Li, Bo
    Song, Dawn
    COMPUTER VISION - ECCV 2018, PT XII, 2018, 11216 : 158 - 174
  • [38] DetectorGuard: Provably Securing Object Detectors against Localized Patch Hiding Attacks
    Xiang, Chong
    Mittal, Prateek
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 3177 - 3196
  • [39] Cross-domain Cross-architecture Black-box Attacks on Fine-tuned Models with Transferred Evolutionary Strategies
    Zhang, Yinghua
    Song, Yangqiu
    Bai, Kun
    Yang, Qiang
    PROCEEDINGS OF THE 31ST ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, CIKM 2022, 2022, : 2661 - 2670
  • [40] FastTextDodger: Decision-Based Adversarial Attack Against Black-Box NLP Models With Extremely High Efficiency
    Hu, Xiaoxue
    Liu, Geling
    Zheng, Baolin
    Zhao, Lingchen
    Wang, Qian
    Zhang, Yufei
    Du, Minxin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 2398 - 2411