<i>Pasadena:</i> Perceptually Aware and Stealthy Adversarial Denoise Attack

نویسندگان

چکیده

Image denoising can remove natural noise that widely exists in images captured by multimedia devices due to low-quality imaging sensors, unstable image transmission processes, or low light conditions. Recent works also find benefits the high-level vision tasks, e.g., classification. In this work, we try challenge common sense and explore a totally new problem, i.e., whether be given capability of fooling state-of-the-art deep neural networks (DNNs) while enhancing quality. To end, initiate very first attempt study problem from perspective adversarial attack propose adversarial denoise attack. More specifically, our main contributions are three-fold: First, identify task stealthily embeds attacks inside module deployed as an post-processing operation simultaneously enhance visual quality fool DNNs. Second, formulate kernel prediction for filtering adversarial-denoising prediction produce adversarial-noiseless kernels effective attacking simultaneously. Third, implement adaptive perceptual region localization semantic-related vulnerability regions with which more not doing too much harm denoising. We name proposed method Pasadena (Perceptually Aware Stealthy Adversarial DENoise Attack) validate on NeurIPS&#x2019;17 competition dataset, CVPR2021-AIC-VI: unrestricted ImageNet, Tiny-ImageNet-C dataset. The comprehensive evaluation analysis demonstrate only realizes but achieves significantly higher success rate transferability over attacks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Divide, Denoise, and Defend against Adversarial Attacks

Deep neural networks, although shown to be a successful class of machine learning algorithms, are known to be extremely unstable to adversarial perturbations. Improving the robustness of neural networks against these attacks is important, especially for security-critical applications. To defend against such attacks, we propose dividing the input image into multiple patches, denoising each patch...

متن کامل

A Stealthy Attack Against Tor Guard Selection

Tor is a popular low-latency anonymous communication system which could provide anonymity and anti-censorship. Based on previous researches on de-anonymization of Tor, this paper proposes a novel approach to attack users’ guard selection which can pose great threat against Tor users' anonymity. Under the current design of Tor, once entry guards are compromised, the probability that an attacker ...

متن کامل

Flush+Flush: A Fast and Stealthy Cache Attack

Research on cache attacks has shown that CPU caches leak significant information. Proposed detection mechanisms assume that all cache attacks cause more cache hits and cache misses than benign applications and use hardware performance counters for detection. In this article, we show that this assumption does not hold by developing a novel attack technique: the Flush+Flush attack. The Flush+Flus...

متن کامل

A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication

Wireless networking technologies have fundamentally changed the way we compute, allowing ubiquitous, anytime, any-where access to information. At the same time, wireless technologies come with the security cost that adversaries may receive signals and engage in unauthorized communication even when not physically close to a network. Because of the utmost importance of wireless security, many sta...

متن کامل

Attack-Aware Cooperative Spectrum Sensing in Cognitive Radio Networks under Byzantine Attack

Cooperative Spectrum Sensing (CSS) is an effective approach to overcome the impact of multi-path fading and shadowing issues. The reliability of CSS can be severely degraded under Byzantine attack, which may be caused by either malfunctioning sensing terminals or malicious nodes. Almost, the previous studies have not analyzed and considered the attack in their models. The present study introduc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Multimedia

سال: 2022

ISSN: ['1520-9210', '1941-0077']

DOI: https://doi.org/10.1109/tmm.2021.3108009