Adversarial Attacks on Face Detectors using Neural Net based Constrained Optimization

被引:0
作者
Bose, Avishek Joey [1 ]
Aarabi, Parham [1 ]
机构
[1] Univ Toronto, Dept Elect & Comp Engn, Toronto, ON, Canada
来源
2018 IEEE 20TH INTERNATIONAL WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING (MMSP) | 2018年
关键词
Face Detection; Deep Learning; Adversarial Attacks; Object Detection;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Adversarial attacks involve adding, small, often imperceptible, perturbations to inputs with the goal of getting a machine learning model to misclassifying them. While many different adversarial attack strategies have been proposed on image classification models, object detection pipelines have been much harder to break. In this paper, we propose a novel strategy to craft adversarial examples by solving a constrained optimization problem using an adversarial generator network. Our approach is fast and scalable, requiring only a forward pass through our trained generator network to craft an adversarial sample. Unlike in many attack strategies we show that the same trained generator is capable of attacking new images without explicitly optimizing on them. We evaluate our attack on a trained Faster R-CNN face detector on the cropped 300-W face dataset where we manage to reduce the number of detected faces to 0.5% of all originally detected faces. In a different experiment, also on 300-W, we demonstrate the robustness of our attack to a JPEG compression based defense typical JPEG compression level of 75% reduces the effectiveness of our attack from only 0.5% of detected faces to a modest 5.0%.
引用
收藏
页数:6
相关论文
共 29 条
[21]   Practical Black-Box Attacks against Machine Learning [J].
Papernot, Nicolas ;
McDaniel, Patrick ;
Goodfellow, Ian ;
Jha, Somesh ;
Celik, Z. Berkay ;
Swami, Ananthram .
PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, :506-519
[22]   The Limitations of Deep Learning in Adversarial Settings [J].
Papernot, Nicolas ;
McDaniel, Patrick ;
Jha, Somesh ;
Fredrikson, Matt ;
Celik, Z. Berkay ;
Swami, Ananthram .
1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, 2016, :372-387
[23]  
Phillips PJ, 2005, PROC CVPR IEEE, P947
[24]   Deep learning in neural networks: An overview [J].
Schmidhuber, Juergen .
NEURAL NETWORKS, 2015, 61 :85-117
[25]  
Shlens J., 2014, PROC INT C LEARNING
[26]  
Simonyan K., 2015, P 3 INT C LEARNING R
[27]  
Szegedy Christian, 2013, INTRIGUING PROPERTIE
[28]  
Xie C., 2017, IEEE INT C COMP VIS
[29]  
Zhu XX, 2012, PROC CVPR IEEE, P2879, DOI 10.1109/CVPR.2012.6248014