Benchmarking Adversarial Patch Against Aerial Detection
Deep neural networks (DNNs) have become essential for aerial detection. However, DNNs are vulnerable to adversarial examples, which pose great security concerns for security-critical systems. Researchers recently devised adversarial patches to evaluate the vulnerability of DNNs-based aerial detectio...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on geoscience and remote sensing 2022, Vol.60, p.1-1 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | IEEE transactions on geoscience and remote sensing |
container_volume | 60 |
creator | Lian, Jiawei Mei, Shaohui Zhang, Shun Ma, Mingyang |
description | Deep neural networks (DNNs) have become essential for aerial detection. However, DNNs are vulnerable to adversarial examples, which pose great security concerns for security-critical systems. Researchers recently devised adversarial patches to evaluate the vulnerability of DNNs-based aerial detection methods physically. Nonetheless, adversarial patches generated by existing algorithms are not strong enough and extremely time-consuming. Moreover, the complicated physical factors are not accommodated well during the optimization process. In this paper, a novel adaptive-patch-based physical attack (AP-PA) framework is proposed to alleviate the above problems, which achieves state-of-the-art performance in both accuracy and efficiency. Specifically, the AP-PA aims to generate adversarial patches that are adaptive in both physical dynamics and varying scales, and by which the particular targets can be hidden from being detected. Furthermore, the adversarial patch is also gifted with attack effectiveness against all targets of the same class with a patch outside the target (No need to smear targeted objects) and robust enough in the physical world. In addition, a new loss is devised to consider more available information of detected objects to optimize the adversarial patch, which can significantly improve the patch's attack efficacy (Average precision drop up to 87.86% and 85.48% in white-box and black-box settings, respectively) and optimizing efficiency. We also establish one of the first comprehensive, coherent, and rigorous benchmarks to evaluate the attack efficacy of adversarial patches on aerial detection tasks. Finally, several proportionally scaled experiments are performed physically to demonstrate that the elaborated adversarial patches can successfully deceive aerial detection algorithms in dynamic physical circumstances. The code is available at https://github.com/JiaweiLian/AP-PA. |
doi_str_mv | 10.1109/TGRS.2022.3225306 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_journals_2748564763</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9965436</ieee_id><sourcerecordid>2748564763</sourcerecordid><originalsourceid>FETCH-LOGICAL-c293t-7034d26f67045a4ccafefcda14b8f9ad8cb08cfdbf803400163855f078118ee73</originalsourceid><addsrcrecordid>eNo9kMtKw0AUhgdRMFYfQNwEXKfO_bKMVatQULSuh-nkTJtakzqTCr69iS2uDhy-_1w-hC4JHhOCzc18-vo2ppjSMaNUMCyPUEaE0AWWnB-jDBMjC6oNPUVnKa0xJlwQlSF1C41ffbr4UTfLvKy-ISYXa7fJX1znV3m5dHWTuryEv-YddOC7um3O0UlwmwQXhzpC7w_388ljMXuePk3KWeGpYV2hMOMVlUEqzIXj3rsAwVeO8IUOxlXaL7D2oVoE3ZP9VZJpIQJWmhANoNgIXe_nbmP7tYPU2XW7i02_0lLFtZBcSdZTZE_52KYUIdhtrPunfizBdvBjBz928GMPfvrM1T5TA8A_b4wUnEn2C30sYHI</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2748564763</pqid></control><display><type>article</type><title>Benchmarking Adversarial Patch Against Aerial Detection</title><source>IEEE/IET Electronic Library (IEL)</source><creator>Lian, Jiawei ; Mei, Shaohui ; Zhang, Shun ; Ma, Mingyang</creator><creatorcontrib>Lian, Jiawei ; Mei, Shaohui ; Zhang, Shun ; Ma, Mingyang</creatorcontrib><description>Deep neural networks (DNNs) have become essential for aerial detection. However, DNNs are vulnerable to adversarial examples, which pose great security concerns for security-critical systems. Researchers recently devised adversarial patches to evaluate the vulnerability of DNNs-based aerial detection methods physically. Nonetheless, adversarial patches generated by existing algorithms are not strong enough and extremely time-consuming. Moreover, the complicated physical factors are not accommodated well during the optimization process. In this paper, a novel adaptive-patch-based physical attack (AP-PA) framework is proposed to alleviate the above problems, which achieves state-of-the-art performance in both accuracy and efficiency. Specifically, the AP-PA aims to generate adversarial patches that are adaptive in both physical dynamics and varying scales, and by which the particular targets can be hidden from being detected. Furthermore, the adversarial patch is also gifted with attack effectiveness against all targets of the same class with a patch outside the target (No need to smear targeted objects) and robust enough in the physical world. In addition, a new loss is devised to consider more available information of detected objects to optimize the adversarial patch, which can significantly improve the patch's attack efficacy (Average precision drop up to 87.86% and 85.48% in white-box and black-box settings, respectively) and optimizing efficiency. We also establish one of the first comprehensive, coherent, and rigorous benchmarks to evaluate the attack efficacy of adversarial patches on aerial detection tasks. Finally, several proportionally scaled experiments are performed physically to demonstrate that the elaborated adversarial patches can successfully deceive aerial detection algorithms in dynamic physical circumstances. The code is available at https://github.com/JiaweiLian/AP-PA.</description><identifier>ISSN: 0196-2892</identifier><identifier>EISSN: 1558-0644</identifier><identifier>DOI: 10.1109/TGRS.2022.3225306</identifier><identifier>CODEN: IGRSD2</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>adaptive ; adversarial examples ; adversarial patch ; aerial detection ; Algorithms ; Artificial neural networks ; benchmark ; Benchmarks ; Deep neural networks ; Detection ; Effectiveness ; Neural networks ; Object recognition ; Optimization ; Patches (structures) ; physical attack ; Physical factors ; Security ; Vulnerability</subject><ispartof>IEEE transactions on geoscience and remote sensing, 2022, Vol.60, p.1-1</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c293t-7034d26f67045a4ccafefcda14b8f9ad8cb08cfdbf803400163855f078118ee73</citedby><cites>FETCH-LOGICAL-c293t-7034d26f67045a4ccafefcda14b8f9ad8cb08cfdbf803400163855f078118ee73</cites><orcidid>0000-0003-3380-8957 ; 0000-0002-3899-0797 ; 0000-0002-8018-596X ; 0000-0002-2944-628X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9965436$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,4024,27923,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/9965436$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Lian, Jiawei</creatorcontrib><creatorcontrib>Mei, Shaohui</creatorcontrib><creatorcontrib>Zhang, Shun</creatorcontrib><creatorcontrib>Ma, Mingyang</creatorcontrib><title>Benchmarking Adversarial Patch Against Aerial Detection</title><title>IEEE transactions on geoscience and remote sensing</title><addtitle>TGRS</addtitle><description>Deep neural networks (DNNs) have become essential for aerial detection. However, DNNs are vulnerable to adversarial examples, which pose great security concerns for security-critical systems. Researchers recently devised adversarial patches to evaluate the vulnerability of DNNs-based aerial detection methods physically. Nonetheless, adversarial patches generated by existing algorithms are not strong enough and extremely time-consuming. Moreover, the complicated physical factors are not accommodated well during the optimization process. In this paper, a novel adaptive-patch-based physical attack (AP-PA) framework is proposed to alleviate the above problems, which achieves state-of-the-art performance in both accuracy and efficiency. Specifically, the AP-PA aims to generate adversarial patches that are adaptive in both physical dynamics and varying scales, and by which the particular targets can be hidden from being detected. Furthermore, the adversarial patch is also gifted with attack effectiveness against all targets of the same class with a patch outside the target (No need to smear targeted objects) and robust enough in the physical world. In addition, a new loss is devised to consider more available information of detected objects to optimize the adversarial patch, which can significantly improve the patch's attack efficacy (Average precision drop up to 87.86% and 85.48% in white-box and black-box settings, respectively) and optimizing efficiency. We also establish one of the first comprehensive, coherent, and rigorous benchmarks to evaluate the attack efficacy of adversarial patches on aerial detection tasks. Finally, several proportionally scaled experiments are performed physically to demonstrate that the elaborated adversarial patches can successfully deceive aerial detection algorithms in dynamic physical circumstances. The code is available at https://github.com/JiaweiLian/AP-PA.</description><subject>adaptive</subject><subject>adversarial examples</subject><subject>adversarial patch</subject><subject>aerial detection</subject><subject>Algorithms</subject><subject>Artificial neural networks</subject><subject>benchmark</subject><subject>Benchmarks</subject><subject>Deep neural networks</subject><subject>Detection</subject><subject>Effectiveness</subject><subject>Neural networks</subject><subject>Object recognition</subject><subject>Optimization</subject><subject>Patches (structures)</subject><subject>physical attack</subject><subject>Physical factors</subject><subject>Security</subject><subject>Vulnerability</subject><issn>0196-2892</issn><issn>1558-0644</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kMtKw0AUhgdRMFYfQNwEXKfO_bKMVatQULSuh-nkTJtakzqTCr69iS2uDhy-_1w-hC4JHhOCzc18-vo2ppjSMaNUMCyPUEaE0AWWnB-jDBMjC6oNPUVnKa0xJlwQlSF1C41ffbr4UTfLvKy-ISYXa7fJX1znV3m5dHWTuryEv-YddOC7um3O0UlwmwQXhzpC7w_388ljMXuePk3KWeGpYV2hMOMVlUEqzIXj3rsAwVeO8IUOxlXaL7D2oVoE3ZP9VZJpIQJWmhANoNgIXe_nbmP7tYPU2XW7i02_0lLFtZBcSdZTZE_52KYUIdhtrPunfizBdvBjBz928GMPfvrM1T5TA8A_b4wUnEn2C30sYHI</recordid><startdate>2022</startdate><enddate>2022</enddate><creator>Lian, Jiawei</creator><creator>Mei, Shaohui</creator><creator>Zhang, Shun</creator><creator>Ma, Mingyang</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7UA</scope><scope>8FD</scope><scope>C1K</scope><scope>F1W</scope><scope>FR3</scope><scope>H8D</scope><scope>H96</scope><scope>KR7</scope><scope>L.G</scope><scope>L7M</scope><orcidid>https://orcid.org/0000-0003-3380-8957</orcidid><orcidid>https://orcid.org/0000-0002-3899-0797</orcidid><orcidid>https://orcid.org/0000-0002-8018-596X</orcidid><orcidid>https://orcid.org/0000-0002-2944-628X</orcidid></search><sort><creationdate>2022</creationdate><title>Benchmarking Adversarial Patch Against Aerial Detection</title><author>Lian, Jiawei ; Mei, Shaohui ; Zhang, Shun ; Ma, Mingyang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c293t-7034d26f67045a4ccafefcda14b8f9ad8cb08cfdbf803400163855f078118ee73</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>adaptive</topic><topic>adversarial examples</topic><topic>adversarial patch</topic><topic>aerial detection</topic><topic>Algorithms</topic><topic>Artificial neural networks</topic><topic>benchmark</topic><topic>Benchmarks</topic><topic>Deep neural networks</topic><topic>Detection</topic><topic>Effectiveness</topic><topic>Neural networks</topic><topic>Object recognition</topic><topic>Optimization</topic><topic>Patches (structures)</topic><topic>physical attack</topic><topic>Physical factors</topic><topic>Security</topic><topic>Vulnerability</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Lian, Jiawei</creatorcontrib><creatorcontrib>Mei, Shaohui</creatorcontrib><creatorcontrib>Zhang, Shun</creatorcontrib><creatorcontrib>Ma, Mingyang</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005–Present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998–Present</collection><collection>IEEE/IET Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Water Resources Abstracts</collection><collection>Technology Research Database</collection><collection>Environmental Sciences and Pollution Management</collection><collection>ASFA: Aquatic Sciences and Fisheries Abstracts</collection><collection>Engineering Research Database</collection><collection>Aerospace Database</collection><collection>Aquatic Science & Fisheries Abstracts (ASFA) 2: Ocean Technology, Policy & Non-Living Resources</collection><collection>Civil Engineering Abstracts</collection><collection>Aquatic Science & Fisheries Abstracts (ASFA) Professional</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>IEEE transactions on geoscience and remote sensing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Lian, Jiawei</au><au>Mei, Shaohui</au><au>Zhang, Shun</au><au>Ma, Mingyang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Benchmarking Adversarial Patch Against Aerial Detection</atitle><jtitle>IEEE transactions on geoscience and remote sensing</jtitle><stitle>TGRS</stitle><date>2022</date><risdate>2022</risdate><volume>60</volume><spage>1</spage><epage>1</epage><pages>1-1</pages><issn>0196-2892</issn><eissn>1558-0644</eissn><coden>IGRSD2</coden><abstract>Deep neural networks (DNNs) have become essential for aerial detection. However, DNNs are vulnerable to adversarial examples, which pose great security concerns for security-critical systems. Researchers recently devised adversarial patches to evaluate the vulnerability of DNNs-based aerial detection methods physically. Nonetheless, adversarial patches generated by existing algorithms are not strong enough and extremely time-consuming. Moreover, the complicated physical factors are not accommodated well during the optimization process. In this paper, a novel adaptive-patch-based physical attack (AP-PA) framework is proposed to alleviate the above problems, which achieves state-of-the-art performance in both accuracy and efficiency. Specifically, the AP-PA aims to generate adversarial patches that are adaptive in both physical dynamics and varying scales, and by which the particular targets can be hidden from being detected. Furthermore, the adversarial patch is also gifted with attack effectiveness against all targets of the same class with a patch outside the target (No need to smear targeted objects) and robust enough in the physical world. In addition, a new loss is devised to consider more available information of detected objects to optimize the adversarial patch, which can significantly improve the patch's attack efficacy (Average precision drop up to 87.86% and 85.48% in white-box and black-box settings, respectively) and optimizing efficiency. We also establish one of the first comprehensive, coherent, and rigorous benchmarks to evaluate the attack efficacy of adversarial patches on aerial detection tasks. Finally, several proportionally scaled experiments are performed physically to demonstrate that the elaborated adversarial patches can successfully deceive aerial detection algorithms in dynamic physical circumstances. The code is available at https://github.com/JiaweiLian/AP-PA.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TGRS.2022.3225306</doi><tpages>1</tpages><orcidid>https://orcid.org/0000-0003-3380-8957</orcidid><orcidid>https://orcid.org/0000-0002-3899-0797</orcidid><orcidid>https://orcid.org/0000-0002-8018-596X</orcidid><orcidid>https://orcid.org/0000-0002-2944-628X</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 0196-2892 |
ispartof | IEEE transactions on geoscience and remote sensing, 2022, Vol.60, p.1-1 |
issn | 0196-2892 1558-0644 |
language | eng |
recordid | cdi_proquest_journals_2748564763 |
source | IEEE/IET Electronic Library (IEL) |
subjects | adaptive adversarial examples adversarial patch aerial detection Algorithms Artificial neural networks benchmark Benchmarks Deep neural networks Detection Effectiveness Neural networks Object recognition Optimization Patches (structures) physical attack Physical factors Security Vulnerability |
title | Benchmarking Adversarial Patch Against Aerial Detection |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-20T23%3A06%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Benchmarking%20Adversarial%20Patch%20Against%20Aerial%20Detection&rft.jtitle=IEEE%20transactions%20on%20geoscience%20and%20remote%20sensing&rft.au=Lian,%20Jiawei&rft.date=2022&rft.volume=60&rft.spage=1&rft.epage=1&rft.pages=1-1&rft.issn=0196-2892&rft.eissn=1558-0644&rft.coden=IGRSD2&rft_id=info:doi/10.1109/TGRS.2022.3225306&rft_dat=%3Cproquest_RIE%3E2748564763%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2748564763&rft_id=info:pmid/&rft_ieee_id=9965436&rfr_iscdi=true |