BASAR:Black-box Attack on Skeletal Action Recognition

被引:30
作者
Diao, Yunfeng [1 ,2 ]
Shao, Tianjia [3 ]
Yang, Yong-Liang [4 ]
Zhou, Kun [3 ]
Wang, He [1 ]
机构
[1] Univ Leeds, Leeds, W Yorkshire, England
[2] Southwest Jiaotong Univ, Chengdu, Peoples R China
[3] Zhejiang Univ, State Key Lab CAD & CG, Hangzhou, Peoples R China
[4] Univ Bath, Bath, Avon, England
来源
2021 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, CVPR 2021 | 2021年
基金
英国工程与自然科学研究理事会; 欧盟地平线“2020”;
关键词
D O I
10.1109/CVPR46437.2021.00751
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Skeletal motion plays a vital role in human activity recognition as either an independent data source or a complement [33]. The robustness of skeleton-based activity recognizers has been questioned recently [29,50], which shows that they are vulnerable to adversarial attacks when the full-knowledge of the recognizer is accessible to the attacker. However, this white-box requirement is overly restrictive in most scenarios and the attack is not truly threatening. In this paper, we show that such threats do exist under black-box settings too. To this end, we propose the first black-box adversarial attack method BASAR. Through BASAR, we show that adversarial attack is not only truly a threat but also can be extremely deceitful, because on-manifold adversarial samples are rather common in skeletal motions, in contrast to the common belief that adversarial samples only exist off-manifold [18]. Through exhaustive evaluation and comparison, we show that BASAR can deliver successful attacks across models, data, and attack modes. Through harsh perceptual studies, we show that it achieves effective yet imperceptible attacks. By analyzing the attack on different activity recognizers, BASAR helps identify the potential causes of their vulnerability and provides insights on what classifiers are likely to be more robust against attack.
引用
收藏
页码:7593 / 7603
页数:11
相关论文
共 61 条
[1]   Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey [J].
Akhtar, Naveed ;
Mian, Ajmal .
IEEE ACCESS, 2018, 6 :14410-14430
[2]  
[Anonymous], 2019, IEEE T VISUALIZATION, DOI DOI 10.1109/ACCESS.2019.2895338
[3]  
[Anonymous], ARXIV180102774CS
[4]  
Baluja S., 2017, ARXIV PREPRINT ARXIV
[5]  
Brendel W., 2018, 6 INT C LEARN REPR
[6]   Realtime Multi-Person 2D Pose Estimation using Part Affinity Fields [J].
Cao, Zhe ;
Simon, Tomas ;
Wei, Shih-En ;
Sheikh, Yaser .
30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017), 2017, :1302-1310
[7]   Towards Evaluating the Robustness of Neural Networks [J].
Carlini, Nicholas ;
Wagner, David .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :39-57
[8]  
Chakraborty Anirban, 2018, arXiv
[9]   HopSkipJumpAttack: A Query-Efficient Decision-Based Attack [J].
Chen, Jianbo ;
Jordan, Michael, I ;
Wainwright, Martin J. .
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, :1277-1294
[10]  
Chen P.-Y., 2017, P 10 ACM WORKSH ART, P15, DOI DOI 10.1145/3128572.3140448