Making an Invisibility Cloak: Real World Adversarial Attacks on Object Detectors

10/31/2019
by   Zuxuan Wu, et al.
73

We present a systematic study of adversarial attacks on state-of-the-art object detection frameworks. Using standard detection datasets, we train patterns that suppress the objectness scores produced by a range of commonly used detectors, and ensembles of detectors. Through extensive experiments, we benchmark the effectiveness of adversarially trained patches under both white-box and black-box settings, and quantify transferability of attacks between datasets, object classes, and detector models. Finally, we present a detailed study of physical world attacks using printed posters and wearable clothes, and rigorously quantify the performance of such attacks with different metrics.

READ FULL TEXT

page 1

page 3

page 4

page 5

page 7

page 8

page 9

research
03/07/2023

Patch of Invisibility: Naturalistic Black-Box Adversarial Attacks on Object Detectors

Adversarial attacks on deep-learning models have been receiving increase...
research
12/17/2019

APRICOT: A Dataset of Physical Adversarial Attacks on Object Detection

Physical adversarial attacks threaten to fool object detection systems, ...
research
03/27/2023

EMShepherd: Detecting Adversarial Samples via Side-channel Leakage

Deep Neural Networks (DNN) are vulnerable to adversarial perturbations-s...
research
11/13/2020

Transformer-Encoder Detector Module: Using Context to Improve Robustness to Adversarial Attacks on Object Detection

Deep neural network approaches have demonstrated high performance in obj...
research
07/11/2023

Differential Analysis of Triggers and Benign Features for Black-Box DNN Backdoor Detection

This paper proposes a data-efficient detection method for deep neural ne...
research
07/23/2023

Towards Generic and Controllable Attacks Against Object Detection

Existing adversarial attacks against Object Detectors (ODs) suffer from ...
research
02/04/2023

A Minimax Approach Against Multi-Armed Adversarial Attacks Detection

Multi-armed adversarial attacks, in which multiple algorithms and object...

Please sign up or login with your details

Forgot password? Click here to reset