To make yourself invisible with Adversarial Semantic Contours

نویسندگان

چکیده

Modern object detectors are vulnerable to adversarial examples, which may bring risks real-world applications. The sparse attack is an important task which, compared with the popular perturbation on whole image, needs select potential pixels that generally regularized by ℓ0-norm constraint, and simultaneously optimize corresponding texture. non-differentiability of ℓ0 norm brings challenges many works attacking detection adopted manually-designed patterns address them, meaningless independent objects, therefore lead relatively poor performance. In this paper, we propose Adversarial Semantic Contour (ASC), MAP estimate a Bayesian formulation deceived prior contour. contour effectively reduces search space pixel selection improves introducing more semantic bias. Extensive experiments demonstrate ASC can corrupt prediction 9 modern different architectures (e.g., one-stage, two-stage Transformer) modifying fewer than 5% area in COCO white-box scenario around 10% those black-box scenario. We further extend datasets for autonomous driving systems verify effectiveness. conclude cautions about being common weakness various architecture care needed applying them safety-sensitive scenarios.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Semantic Adversarial Examples

Deep neural networks are known to be vulnerable to adversarial examples, i.e., images that are maliciously perturbed to fool the model. Generating adversarial examples has been mostly limited to finding small perturbations that maximize the model prediction error. Such images, however, contain artificial perturbations that make them somewhat distinguishable from natural images. This property is...

متن کامل

Editorial Will ubicomp make GIS invisible ?

While speculating about the future of computers in the 21st century, Mark Weiser argued back in 1991 that ‘‘the most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it (p. 94).’’ Although the computer as we know it has not vanished as Weiser (1991) predicted, recent advances in ubiquitous computing (ubi...

متن کامل

Kinesthesis can make an invisible hand visible.

Self-generated body movements have reliable visual consequences. This predictive association between vision and action likely underlies modulatory effects of action on visual processing. However, it is unknown whether actions can have generative effects on visual perception. We asked whether, in total darkness, self-generated body movements are sufficient to evoke normally concomitant visual pe...

متن کامل

How to Make a Semantic Network Probabilistic

Words and phrases associate with each other to form a semantic network. Characterizing such associations is a first step toward understanding natural languages for machines. Psychologists and linguists have used concepts such as typicality and basic level conceptualization to characterize such associations. However, how to quantify such concepts is an open problem. Recently, much work has focus...

متن کامل

Semantic Segmentation using Adversarial Networks

Adversarial training has been shown to produce state of the art results for generative image modeling. In this paper we propose an adversarial training approach to train semantic segmentation models. We train a convolutional semantic segmentation network along with an adversarial network that discriminates segmentation maps coming either from the ground truth or from the segmentation network. T...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computer Vision and Image Understanding

سال: 2023

ISSN: ['1090-235X', '1077-3142']

DOI: https://doi.org/10.1016/j.cviu.2023.103659