2022
DOI: 10.48550/arxiv.2211.08859
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Attacking Object Detector Using A Universal Targeted Label-Switch Patch

Abstract: Adversarial attacks against deep learning-based object detectors (ODs) have been studied extensively in the past few years. These attacks cause the model to make incorrect predictions by placing a patch containing an adversarial pattern on the target object or anywhere within the frame. However, none of prior research proposed a misclassification attack on ODs, in which the patch is applied on the target object. In this study, we propose a novel, universal, targeted, label-switch attack against the state-of-th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…Recently, Shapira et al [89] developed a targeted attack method to generate the adversarial patch that is pasted on the car hood to attack object detectors (i.e., YOLOv3 and Faster RCNN) in a more realistic monitor scenario. Specifically, the author devised a tailored projection method to adaptively adjust the position and shape of the adversarial patch in terms of the camera orientation.…”
Section: Switchattackmentioning
confidence: 99%
“…Recently, Shapira et al [89] developed a targeted attack method to generate the adversarial patch that is pasted on the car hood to attack object detectors (i.e., YOLOv3 and Faster RCNN) in a more realistic monitor scenario. Specifically, the author devised a tailored projection method to adaptively adjust the position and shape of the adversarial patch in terms of the camera orientation.…”
Section: Switchattackmentioning
confidence: 99%
“…Face recognition entails the detection and recognition of specific individuals based on their facial characteristics, enabling applications such as identity verification, access control, and surveillance systems. The advent of deep learning models, specifically [74] White-box TV,NPS,D2P -Static 2D Adversarial YOLO [82] White-box EOT,TV,NPS -Dynamic 2D NestedAE [76] White-box D2P, Alignment Pattern, Shape and Color control loss Dynamic 3D DPATCH [69] White-box EOT -Static 2D DPatch2 [70] White-box EOT -Static 2D LPAttack [72] White-box EOT,TV,NPS -Static 2D Translucent Patch [77] White-box Affine,NPS -Static 2D SwitchPatch [73] White-box TV -Static 2D Object Hider [71] White-box --Static 2D ScreenAttack [99] White-box TV -Static 2D Invisible Cloak [81] White-box EOT,TV -Static 3D Adversarial T-shirt [84] White-box EOT,TPS -Static 2D Invisible Cloak2 [85] White-box TPS -Static 2D LAP [87] White-box TV,NPS Static 2D NAP [86] White-box TV GAN Static 2D TC-EGA [168] White-box EOT,TPS -Static 2D SLAP [78] White-box EOT,TV -Static 2D CAMOU [97] White-box EOT -Static 2D ER attack [98] Black-box --Static 3D UPC [83] White-box EOT, TV L∞ norm Static 3D DAS [101] White-box TV Evasion loss Static 3D FCA [103] White-box TV -Static 3D CAC [104] White-box EOT -Static 3D DTA [102] White-box EOT -Static 3D Adversarial Bulbs [92] White-box EOT,TV -Static 2D QRAttack [93] White-box EOT,TPS Material Static 2D HOTCOLD [94] White-box SSP Material Static 2D AIP [95] White-box Binary & Aggregation regularization Material Static 2D AdvIB [96] Black-box EOT Material Static 2D PG [100] Black-box --Static 2D AdvART [89] White-box EOT, TV Similarity loss Static 2D DAP [91] White-box EOT, TV Similarity loss Dynamic 2D TPatch…”
Section: Physical Attacks On Face Recognition and Person Re-identific...mentioning
confidence: 99%
“…The DAS achieves strong transferability by suppressing both model and human attention, thereby enhancing the efficacy of the attack. In [194], the researchers propose a novel targeted and universal attack against the SOTA object detector using a label-switching technique. The attack aims to fool the object detector into misclassifying a specific target object as another object category chosen by the attacker.…”
Section: Black-box Attacksmentioning
confidence: 99%
“…In paper [95], the authors conduct the first investigation towards adversarial attacks that are directed at X-ray prohibited item detection and demonstrate the grave hazards posed by such attacks in this context of paramount safety significance. Finally, we summarize physical attacks against object detection ( [65], [76], [94]- [96], [105]- [107], [160], [184]- [190], [192]- [194], [197], [201]- [204]) in Table VI.…”
Section: Black-box Attacksmentioning
confidence: 99%