Pick-Object-Attack: Type-specific adversarial attack for object detection
نویسندگان
چکیده
Many recent studies have shown that deep neural models are vulnerable to adversarial samples: images with imperceptible perturbations, for example, can fool image classifiers. In this paper, we present the first type-specific approach generating examples object detection, which entails detecting bounding boxes around multiple objects in and classifying them at same time, making it a harder task than against classification. We specifically aim attack widely used Faster R-CNN by changing predicted label particular an image: where prior work has targeted one specific (a stop sign), generalise arbitrary objects, key challenge being need change labels of all instances type. To do so, propose novel method, named Pick-Object-Attack. Pick-Object-Attack successfully adds perturbations only object, preserving other detected image. terms perceptibility, induced method very small. Furthermore, examine effect attacks on detection downstream task, captioning; show modify types leads obvious changes captions, from our constrained much less apparent.
منابع مشابه
Feature-based Malicious URL and Attack Type Detection Using Multi-class Classification
Nowadays, malicious URLs are the common threat to the businesses, social networks, net-banking etc. Existing approaches have focused on binary detection i.e. either the URL is malicious or benign. Very few literature is found which focused on the detection of malicious URLs and their attack types. Hence, it becomes necessary to know the attack type and adopt an effective countermeasure. This pa...
متن کاملMultiple Object Detection for Pick-and-Place Applications
This paper presents a novel approach for detecting multiple instances of the same object for pick-and-place automation. The working conditions are very challenging, with complex objects, arranged at random in the scene, and heavily occluded. This approach exploits SIFT to obtain a set of correspondences between the object model and the current image. In order to segment the multiple instances o...
متن کاملLearning to Attack: Adversarial Transformation Networks
With the rapidly increasing popularity of deep neural networks for image recognition tasks, a parallel interest in generating adversarial examples to attack the trained models has arisen. To date, these approaches have involved either directly computing gradients with respect to the image pixels or directly solving an optimization on the image pixels. We generalize this pursuit in a novel direc...
متن کاملA two-phase wormhole attack detection scheme in MANETs
Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...
متن کاملThe Object Detection Efficiency in Synthetic Aperture Radar Systems
The main purpose of this paper is to develop the method of characteristic functions for calculating the detection characteristics in the case of the object surrounded by rough surfaces. This method is to be implemented in synthetic aperture radar (SAR) systems using optimal resolution algorithms. By applying the specified technique, the expressions have been obtained for the false alarm and cor...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer Vision and Image Understanding
سال: 2021
ISSN: ['1090-235X', '1077-3142']
DOI: https://doi.org/10.1016/j.cviu.2021.103257