论文标题

通过对抗镜头了解对象检测

Understanding Object Detection Through An Adversarial Lens

论文作者

Chow, Ka-Ho, Liu, Ling, Gursoy, Mehmet Emre, Truex, Stacey, Wei, Wenqi, Wu, Yanzhao

论文摘要

基于深度神经网络的对象检测模型已彻底改变了计算机视觉,并推动了广泛的视觉识别应用的开发。但是,最近的研究表明,在对抗攻击下可能会损害深度对象探测器,从而导致受害者检测器未检测到任何对象,假物体或标记的对象。随着对象检测在许多关键安全应用中(例如自动驾驶汽车和智能城市)的广泛使用,我们认为,对对抗性攻击和深度对象检测系统的深入了解的整体方法对于研究社区发展了强大的防御机制,这是非常重要的。本文提出了一个框架,用于分析和评估对抗性镜头下最先进的对象探测器的漏洞,旨在分析和揭开攻击策略,不利影响和成本以及攻击的交叉模型和交叉分辨率转移性。使用一组定量指标,使用两个基准数据集(Pascal VOC和MS Coco),对来自三个流行家庭(Yolov3,SSD和更快的R-CNN)的六个代表性深对象检测器进行了广泛的实验。我们证明,所提出的框架可以作为分析实时对象检测系统中对抗行为和风险的有条不紊的基准。我们猜测,该框架还可以作为评估安全风险和将要部署在现实世界应用程序中的深层对象检测器的对抗性鲁棒性的工具。

Deep neural networks based object detection models have revolutionized computer vision and fueled the development of a wide range of visual recognition applications. However, recent studies have revealed that deep object detectors can be compromised under adversarial attacks, causing a victim detector to detect no object, fake objects, or mislabeled objects. With object detection being used pervasively in many security-critical applications, such as autonomous vehicles and smart cities, we argue that a holistic approach for an in-depth understanding of adversarial attacks and vulnerabilities of deep object detection systems is of utmost importance for the research community to develop robust defense mechanisms. This paper presents a framework for analyzing and evaluating vulnerabilities of the state-of-the-art object detectors under an adversarial lens, aiming to analyze and demystify the attack strategies, adverse effects, and costs, as well as the cross-model and cross-resolution transferability of attacks. Using a set of quantitative metrics, extensive experiments are performed on six representative deep object detectors from three popular families (YOLOv3, SSD, and Faster R-CNN) with two benchmark datasets (PASCAL VOC and MS COCO). We demonstrate that the proposed framework can serve as a methodical benchmark for analyzing adversarial behaviors and risks in real-time object detection systems. We conjecture that this framework can also serve as a tool to assess the security risks and the adversarial robustness of deep object detectors to be deployed in real-world applications.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源