Benchmarking Adversarial Patch Against Aerial Detection

Deep neural networks (DNNs) have become essential for aerial detection. However, DNNs are vulnerable to adversarial examples, which pose great security concerns for security-critical systems. Researchers recently devised adversarial patches to evaluate the vulnerability of DNNs-based aerial detectio...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on geoscience and remote sensing 2022, Vol.60, p.1-1
Hauptverfasser: Lian, Jiawei, Mei, Shaohui, Zhang, Shun, Ma, Mingyang
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1
container_issue
container_start_page 1
container_title IEEE transactions on geoscience and remote sensing
container_volume 60
creator Lian, Jiawei
Mei, Shaohui
Zhang, Shun
Ma, Mingyang
description Deep neural networks (DNNs) have become essential for aerial detection. However, DNNs are vulnerable to adversarial examples, which pose great security concerns for security-critical systems. Researchers recently devised adversarial patches to evaluate the vulnerability of DNNs-based aerial detection methods physically. Nonetheless, adversarial patches generated by existing algorithms are not strong enough and extremely time-consuming. Moreover, the complicated physical factors are not accommodated well during the optimization process. In this paper, a novel adaptive-patch-based physical attack (AP-PA) framework is proposed to alleviate the above problems, which achieves state-of-the-art performance in both accuracy and efficiency. Specifically, the AP-PA aims to generate adversarial patches that are adaptive in both physical dynamics and varying scales, and by which the particular targets can be hidden from being detected. Furthermore, the adversarial patch is also gifted with attack effectiveness against all targets of the same class with a patch outside the target (No need to smear targeted objects) and robust enough in the physical world. In addition, a new loss is devised to consider more available information of detected objects to optimize the adversarial patch, which can significantly improve the patch's attack efficacy (Average precision drop up to 87.86% and 85.48% in white-box and black-box settings, respectively) and optimizing efficiency. We also establish one of the first comprehensive, coherent, and rigorous benchmarks to evaluate the attack efficacy of adversarial patches on aerial detection tasks. Finally, several proportionally scaled experiments are performed physically to demonstrate that the elaborated adversarial patches can successfully deceive aerial detection algorithms in dynamic physical circumstances. The code is available at https://github.com/JiaweiLian/AP-PA.
doi_str_mv 10.1109/TGRS.2022.3225306
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_2748564763</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9965436</ieee_id><sourcerecordid>2748564763</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-7034d26f67045a4ccafefcda14b8f9ad8cb08cfdbf803400163855f078118ee73</originalsourceid><addsrcrecordid>eNo9kMtKw0AUhgdRMFYfQNwEXKfO_bKMVatQULSuh-nkTJtakzqTCr69iS2uDhy-_1w-hC4JHhOCzc18-vo2ppjSMaNUMCyPUEaE0AWWnB-jDBMjC6oNPUVnKa0xJlwQlSF1C41ffbr4UTfLvKy-ISYXa7fJX1znV3m5dHWTuryEv-YddOC7um3O0UlwmwQXhzpC7w_388ljMXuePk3KWeGpYV2hMOMVlUEqzIXj3rsAwVeO8IUOxlXaL7D2oVoE3ZP9VZJpIQJWmhANoNgIXe_nbmP7tYPU2XW7i02_0lLFtZBcSdZTZE_52KYUIdhtrPunfizBdvBjBz928GMPfvrM1T5TA8A_b4wUnEn2C30sYHI</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2748564763</pqid></control><display><type>article</type><title>Benchmarking Adversarial Patch Against Aerial Detection</title><source>IEEE/IET Electronic Library (IEL)</source><creator>Lian, Jiawei ; Mei, Shaohui ; Zhang, Shun ; Ma, Mingyang</creator><creatorcontrib>Lian, Jiawei ; Mei, Shaohui ; Zhang, Shun ; Ma, Mingyang</creatorcontrib><description>Deep neural networks (DNNs) have become essential for aerial detection. However, DNNs are vulnerable to adversarial examples, which pose great security concerns for security-critical systems. Researchers recently devised adversarial patches to evaluate the vulnerability of DNNs-based aerial detection methods physically. Nonetheless, adversarial patches generated by existing algorithms are not strong enough and extremely time-consuming. Moreover, the complicated physical factors are not accommodated well during the optimization process. In this paper, a novel adaptive-patch-based physical attack (AP-PA) framework is proposed to alleviate the above problems, which achieves state-of-the-art performance in both accuracy and efficiency. Specifically, the AP-PA aims to generate adversarial patches that are adaptive in both physical dynamics and varying scales, and by which the particular targets can be hidden from being detected. Furthermore, the adversarial patch is also gifted with attack effectiveness against all targets of the same class with a patch outside the target (No need to smear targeted objects) and robust enough in the physical world. In addition, a new loss is devised to consider more available information of detected objects to optimize the adversarial patch, which can significantly improve the patch's attack efficacy (Average precision drop up to 87.86% and 85.48% in white-box and black-box settings, respectively) and optimizing efficiency. We also establish one of the first comprehensive, coherent, and rigorous benchmarks to evaluate the attack efficacy of adversarial patches on aerial detection tasks. Finally, several proportionally scaled experiments are performed physically to demonstrate that the elaborated adversarial patches can successfully deceive aerial detection algorithms in dynamic physical circumstances. The code is available at https://github.com/JiaweiLian/AP-PA.</description><identifier>ISSN: 0196-2892</identifier><identifier>EISSN: 1558-0644</identifier><identifier>DOI: 10.1109/TGRS.2022.3225306</identifier><identifier>CODEN: IGRSD2</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>adaptive ; adversarial examples ; adversarial patch ; aerial detection ; Algorithms ; Artificial neural networks ; benchmark ; Benchmarks ; Deep neural networks ; Detection ; Effectiveness ; Neural networks ; Object recognition ; Optimization ; Patches (structures) ; physical attack ; Physical factors ; Security ; Vulnerability</subject><ispartof>IEEE transactions on geoscience and remote sensing, 2022, Vol.60, p.1-1</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c293t-7034d26f67045a4ccafefcda14b8f9ad8cb08cfdbf803400163855f078118ee73</citedby><cites>FETCH-LOGICAL-c293t-7034d26f67045a4ccafefcda14b8f9ad8cb08cfdbf803400163855f078118ee73</cites><orcidid>0000-0003-3380-8957 ; 0000-0002-3899-0797 ; 0000-0002-8018-596X ; 0000-0002-2944-628X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9965436$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,4024,27923,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9965436$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Lian, Jiawei</creatorcontrib><creatorcontrib>Mei, Shaohui</creatorcontrib><creatorcontrib>Zhang, Shun</creatorcontrib><creatorcontrib>Ma, Mingyang</creatorcontrib><title>Benchmarking Adversarial Patch Against Aerial Detection</title><title>IEEE transactions on geoscience and remote sensing</title><addtitle>TGRS</addtitle><description>Deep neural networks (DNNs) have become essential for aerial detection. However, DNNs are vulnerable to adversarial examples, which pose great security concerns for security-critical systems. Researchers recently devised adversarial patches to evaluate the vulnerability of DNNs-based aerial detection methods physically. Nonetheless, adversarial patches generated by existing algorithms are not strong enough and extremely time-consuming. Moreover, the complicated physical factors are not accommodated well during the optimization process. In this paper, a novel adaptive-patch-based physical attack (AP-PA) framework is proposed to alleviate the above problems, which achieves state-of-the-art performance in both accuracy and efficiency. Specifically, the AP-PA aims to generate adversarial patches that are adaptive in both physical dynamics and varying scales, and by which the particular targets can be hidden from being detected. Furthermore, the adversarial patch is also gifted with attack effectiveness against all targets of the same class with a patch outside the target (No need to smear targeted objects) and robust enough in the physical world. In addition, a new loss is devised to consider more available information of detected objects to optimize the adversarial patch, which can significantly improve the patch's attack efficacy (Average precision drop up to 87.86% and 85.48% in white-box and black-box settings, respectively) and optimizing efficiency. We also establish one of the first comprehensive, coherent, and rigorous benchmarks to evaluate the attack efficacy of adversarial patches on aerial detection tasks. Finally, several proportionally scaled experiments are performed physically to demonstrate that the elaborated adversarial patches can successfully deceive aerial detection algorithms in dynamic physical circumstances. The code is available at https://github.com/JiaweiLian/AP-PA.</description><subject>adaptive</subject><subject>adversarial examples</subject><subject>adversarial patch</subject><subject>aerial detection</subject><subject>Algorithms</subject><subject>Artificial neural networks</subject><subject>benchmark</subject><subject>Benchmarks</subject><subject>Deep neural networks</subject><subject>Detection</subject><subject>Effectiveness</subject><subject>Neural networks</subject><subject>Object recognition</subject><subject>Optimization</subject><subject>Patches (structures)</subject><subject>physical attack</subject><subject>Physical factors</subject><subject>Security</subject><subject>Vulnerability</subject><issn>0196-2892</issn><issn>1558-0644</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kMtKw0AUhgdRMFYfQNwEXKfO_bKMVatQULSuh-nkTJtakzqTCr69iS2uDhy-_1w-hC4JHhOCzc18-vo2ppjSMaNUMCyPUEaE0AWWnB-jDBMjC6oNPUVnKa0xJlwQlSF1C41ffbr4UTfLvKy-ISYXa7fJX1znV3m5dHWTuryEv-YddOC7um3O0UlwmwQXhzpC7w_388ljMXuePk3KWeGpYV2hMOMVlUEqzIXj3rsAwVeO8IUOxlXaL7D2oVoE3ZP9VZJpIQJWmhANoNgIXe_nbmP7tYPU2XW7i02_0lLFtZBcSdZTZE_52KYUIdhtrPunfizBdvBjBz928GMPfvrM1T5TA8A_b4wUnEn2C30sYHI</recordid><startdate>2022</startdate><enddate>2022</enddate><creator>Lian, Jiawei</creator><creator>Mei, Shaohui</creator><creator>Zhang, Shun</creator><creator>Ma, Mingyang</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7UA</scope><scope>8FD</scope><scope>C1K</scope><scope>F1W</scope><scope>FR3</scope><scope>H8D</scope><scope>H96</scope><scope>KR7</scope><scope>L.G</scope><scope>L7M</scope><orcidid>https://orcid.org/0000-0003-3380-8957</orcidid><orcidid>https://orcid.org/0000-0002-3899-0797</orcidid><orcidid>https://orcid.org/0000-0002-8018-596X</orcidid><orcidid>https://orcid.org/0000-0002-2944-628X</orcidid></search><sort><creationdate>2022</creationdate><title>Benchmarking Adversarial Patch Against Aerial Detection</title><author>Lian, Jiawei ; Mei, Shaohui ; Zhang, Shun ; Ma, Mingyang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-7034d26f67045a4ccafefcda14b8f9ad8cb08cfdbf803400163855f078118ee73</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>adaptive</topic><topic>adversarial examples</topic><topic>adversarial patch</topic><topic>aerial detection</topic><topic>Algorithms</topic><topic>Artificial neural networks</topic><topic>benchmark</topic><topic>Benchmarks</topic><topic>Deep neural networks</topic><topic>Detection</topic><topic>Effectiveness</topic><topic>Neural networks</topic><topic>Object recognition</topic><topic>Optimization</topic><topic>Patches (structures)</topic><topic>physical attack</topic><topic>Physical factors</topic><topic>Security</topic><topic>Vulnerability</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Lian, Jiawei</creatorcontrib><creatorcontrib>Mei, Shaohui</creatorcontrib><creatorcontrib>Zhang, Shun</creatorcontrib><creatorcontrib>Ma, Mingyang</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005–Present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998–Present</collection><collection>IEEE/IET Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Water Resources Abstracts</collection><collection>Technology Research Database</collection><collection>Environmental Sciences and Pollution Management</collection><collection>ASFA: Aquatic Sciences and Fisheries Abstracts</collection><collection>Engineering Research Database</collection><collection>Aerospace Database</collection><collection>Aquatic Science &amp; Fisheries Abstracts (ASFA) 2: Ocean Technology, Policy &amp; Non-Living Resources</collection><collection>Civil Engineering Abstracts</collection><collection>Aquatic Science &amp; Fisheries Abstracts (ASFA) Professional</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>IEEE transactions on geoscience and remote sensing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Lian, Jiawei</au><au>Mei, Shaohui</au><au>Zhang, Shun</au><au>Ma, Mingyang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Benchmarking Adversarial Patch Against Aerial Detection</atitle><jtitle>IEEE transactions on geoscience and remote sensing</jtitle><stitle>TGRS</stitle><date>2022</date><risdate>2022</risdate><volume>60</volume><spage>1</spage><epage>1</epage><pages>1-1</pages><issn>0196-2892</issn><eissn>1558-0644</eissn><coden>IGRSD2</coden><abstract>Deep neural networks (DNNs) have become essential for aerial detection. However, DNNs are vulnerable to adversarial examples, which pose great security concerns for security-critical systems. Researchers recently devised adversarial patches to evaluate the vulnerability of DNNs-based aerial detection methods physically. Nonetheless, adversarial patches generated by existing algorithms are not strong enough and extremely time-consuming. Moreover, the complicated physical factors are not accommodated well during the optimization process. In this paper, a novel adaptive-patch-based physical attack (AP-PA) framework is proposed to alleviate the above problems, which achieves state-of-the-art performance in both accuracy and efficiency. Specifically, the AP-PA aims to generate adversarial patches that are adaptive in both physical dynamics and varying scales, and by which the particular targets can be hidden from being detected. Furthermore, the adversarial patch is also gifted with attack effectiveness against all targets of the same class with a patch outside the target (No need to smear targeted objects) and robust enough in the physical world. In addition, a new loss is devised to consider more available information of detected objects to optimize the adversarial patch, which can significantly improve the patch's attack efficacy (Average precision drop up to 87.86% and 85.48% in white-box and black-box settings, respectively) and optimizing efficiency. We also establish one of the first comprehensive, coherent, and rigorous benchmarks to evaluate the attack efficacy of adversarial patches on aerial detection tasks. Finally, several proportionally scaled experiments are performed physically to demonstrate that the elaborated adversarial patches can successfully deceive aerial detection algorithms in dynamic physical circumstances. The code is available at https://github.com/JiaweiLian/AP-PA.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TGRS.2022.3225306</doi><tpages>1</tpages><orcidid>https://orcid.org/0000-0003-3380-8957</orcidid><orcidid>https://orcid.org/0000-0002-3899-0797</orcidid><orcidid>https://orcid.org/0000-0002-8018-596X</orcidid><orcidid>https://orcid.org/0000-0002-2944-628X</orcidid></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 0196-2892
ispartof IEEE transactions on geoscience and remote sensing, 2022, Vol.60, p.1-1
issn 0196-2892
1558-0644
language eng
recordid cdi_proquest_journals_2748564763
source IEEE/IET Electronic Library (IEL)
subjects adaptive
adversarial examples
adversarial patch
aerial detection
Algorithms
Artificial neural networks
benchmark
Benchmarks
Deep neural networks
Detection
Effectiveness
Neural networks
Object recognition
Optimization
Patches (structures)
physical attack
Physical factors
Security
Vulnerability
title Benchmarking Adversarial Patch Against Aerial Detection
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-20T23%3A06%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Benchmarking%20Adversarial%20Patch%20Against%20Aerial%20Detection&rft.jtitle=IEEE%20transactions%20on%20geoscience%20and%20remote%20sensing&rft.au=Lian,%20Jiawei&rft.date=2022&rft.volume=60&rft.spage=1&rft.epage=1&rft.pages=1-1&rft.issn=0196-2892&rft.eissn=1558-0644&rft.coden=IGRSD2&rft_id=info:doi/10.1109/TGRS.2022.3225306&rft_dat=%3Cproquest_RIE%3E2748564763%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2748564763&rft_id=info:pmid/&rft_ieee_id=9965436&rfr_iscdi=true