Understanding Black-Box Attacks Against Object Detectors from a User's Perspective

被引:0
作者
Midtlid, Kim Andre [1 ]
Asheim, Johannes [1 ]
Li, Jingyue [1 ]
机构
[1] Norwegian Univ Sci & Technol, Trondheim, Norway
来源
QUALITY OF INFORMATION AND COMMUNICATIONS TECHNOLOGY, QUATIC 2022 | 2022年 / 1621卷
关键词
Artificial intelligence; Object detection; Image classification; Adversarial attacks; ADVERSARIAL ATTACKS;
D O I
10.1007/978-3-031-14179-9_18
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to recent developments in object detection systems, and the realistic threat of black-box adversarial attacks on object detector models, we argue the need for a contextual understanding of the attacks from the users' perspective. Existing literature reviews either do not provide complete and up-to-date summaries of such attacks or focus on the knowledge from the researchers' perspective. In this research, we conducted a systematic literature review to identify state-of-the-art black-box attacks and extract the information to help users evaluate and mitigate the risks. The literature review resulted in 29 black-box attack methods. We analyzed each attack from the following main aspects: attackers' knowledge needed to perform the attack, attack consequences, attack generalizability, and strategies to mitigate the attacks. Our results demonstrate an emerging increase in highly generalizable attacks, which now make up more than 50% of the landscape. We also reveal that more than 50% of recent attacks remain untested against mitigation strategies.
引用
收藏
页码:266 / 280
页数:15
相关论文
共 50 条
  • [41] Black-box Adversarial Examples against Intelligent Beamforming in 5G Networks
    Zolotukhin, Mikhail
    Miraghaie, Parsa
    Zhang, Di
    Hamalainen, Timo
    Ke, Wang
    Dunderfelt, Marja
    2022 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING, CSCN, 2022, : 64 - 70
  • [42] Comparing Explanations from Glass-Box and Black-Box Machine-Learning Models
    Kuk, Michal
    Bobek, Szymon
    Nalepa, Grzegorz J.
    COMPUTATIONAL SCIENCE - ICCS 2022, PT III, 2022, 13352 : 668 - 675
  • [43] A brief history of artificial intelligence embryo selection: from black-box to glass-box
    Lee, Tammy
    Natalwala, Jay
    Chapple, Vincent
    Liu, Yanhe
    HUMAN REPRODUCTION, 2024, 39 (02) : 285 - 292
  • [44] All Your Fake Detector are Belong to Us: Evaluating Adversarial Robustness of Fake-News Detectors Under Black-Box Settings
    Ali, Hassan
    Khan, Muhammad Suleman
    Alghadhban, Amer
    Alazmi, Meshari
    Alzamil, Ahmad
    Al-Utaibi, Khaled
    Qadir, Junaid
    IEEE ACCESS, 2021, 9 : 81678 - 81692
  • [45] Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers
    Rosenberg, Ishai
    Shabtai, Asaf
    Rokach, Lior
    Elovici, Yuval
    RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, RAID 2018, 2018, 11050 : 490 - 510
  • [46] FE-DaST: Fast and effective data-free substitute training for black-box adversarial attacks
    Yu, Mengran
    Sun, Shiliang
    COMPUTERS & SECURITY, 2022, 113
  • [47] Analysing object detectors from the perspective of co-occurring object categories
    Nemes, Csaba
    Jordan, Sandor
    2018 9TH IEEE INTERNATIONAL CONFERENCE ON COGNITIVE INFOCOMMUNICATIONS (COGINFOCOM), 2018, : 169 - 173
  • [48] GSM-HM: Generation of Saliency Maps for Black-Box Object Detection Model Based on Hierarchical Masking
    Yan, Yicheng
    Li, Xianfeng
    Zhan, Ying
    Sun, Lianpeng
    Zhu, Jinjun
    IEEE ACCESS, 2022, 10 : 98268 - 98277
  • [49] Adversarial patch-based false positive creation attacks against aerial imagery object detectors
    Tang, Guijian
    Yao, Wen
    Jiang, Tingsong
    Zhao, Yong
    Sun, Jialiang
    NEUROCOMPUTING, 2024, 579
  • [50] Improved YOLOv8s Model for Small Object Detection from Perspective of Drones
    Pan, Wei
    Wei, Chao
    Qian, Chunyu
    Yang, Zhe
    Computer Engineering and Applications, 2024, 60 (09) : 142 - 150