论文标题
危险的披肩:基于自然触发的后门攻击物理世界中对象探测器
Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
论文作者
论文摘要
深度学习模型已被证明容易受到最近的后门攻击的攻击。一个后门模型通常对包含触发器选择触发器的输入通常行为,而对带有触发器的输入进行恶意。迄今为止,后门攻击和对策主要关注图像分类任务。其中大多数是通过数字触发器在数字世界中实施的。除了分类任务外,对象检测系统还被视为计算机视觉任务的基本基础之一。但是,即使在具有数字触发器的数字世界中,也没有对对象探测器的后门脆弱性的调查和理解。这项工作首次证明了现有的对象检测器本质上容易受到物理后门攻击的影响。我们使用从市场上购买的天然T恤作为触发效果来实现披肩效果 - 边界盒子在对象探测器前消失。我们表明,可以将这种后门从两个可剥削的攻击方案植入对象检测器中,该场景通过预告片模型外包或微调。我们已经广泛评估了三种流行的对象检测算法:基于锚的Yolo-V3,Yolo-V4和无锚的Centernet。在现实世界中拍摄的19个视频的基础上,我们确认后门攻击对各种因素是有力的:运动,距离,角度,非刚性变形和照明。具体而言,大多数视频中的攻击成功率(ASR)靠近它,而后式模型的清洁数据准确性与其干净的对应物相同。后者意味着仅通过验证集检测后门行为是不可行的。在Centernet评估的转移学习攻击方案中,平均ASR仍然足够高,可为78%。请参阅https://youtu.be/q3hof4oobby上的演示视频。
Deep learning models have been shown to be vulnerable to recent backdoor attacks. A backdoored model behaves normally for inputs containing no attacker-secretly-chosen trigger and maliciously for inputs with the trigger. To date, backdoor attacks and countermeasures mainly focus on image classification tasks. And most of them are implemented in the digital world with digital triggers. Besides the classification tasks, object detection systems are also considered as one of the basic foundations of computer vision tasks. However, there is no investigation and understanding of the backdoor vulnerability of the object detector, even in the digital world with digital triggers. For the first time, this work demonstrates that existing object detectors are inherently susceptible to physical backdoor attacks. We use a natural T-shirt bought from a market as a trigger to enable the cloaking effect--the person bounding-box disappears in front of the object detector. We show that such a backdoor can be implanted from two exploitable attack scenarios into the object detector, which is outsourced or fine-tuned through a pretrained model. We have extensively evaluated three popular object detection algorithms: anchor-based Yolo-V3, Yolo-V4, and anchor-free CenterNet. Building upon 19 videos shot in real-world scenes, we confirm that the backdoor attack is robust against various factors: movement, distance, angle, non-rigid deformation, and lighting. Specifically, the attack success rate (ASR) in most videos is 100% or close to it, while the clean data accuracy of the backdoored model is the same as its clean counterpart. The latter implies that it is infeasible to detect the backdoor behavior merely through a validation set. The averaged ASR still remains sufficiently high to be 78% in the transfer learning attack scenarios evaluated on CenterNet. See the demo video on https://youtu.be/Q3HOF4OobbY.