2021
DOI: 10.1016/j.cviu.2020.103111
|View full text |Cite
|
Sign up to set email alerts
|

Investigating the significance of adversarial attacks and their relation to interpretability for radar-based human activity recognition systems

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 40 publications
0
6
0
Order By: Relevance
“…Data security has been addressed through local training via federated architecture, preventing data from being sent to third parties [99]. Detection of spoofing attacks in video replay and vulnerability to adversarial attacks in video and radar data have also been investigated [100,101].…”
Section: Privacymentioning
confidence: 99%
“…Data security has been addressed through local training via federated architecture, preventing data from being sent to third parties [99]. Detection of spoofing attacks in video replay and vulnerability to adversarial attacks in video and radar data have also been investigated [100,101].…”
Section: Privacymentioning
confidence: 99%
“…To develop the universal and targeted adversarial attack against such HAR system, several challenges should be solved: (1) Rather than an untargeted attack aimed at disabling the HAR system, our attack should employ more complex adversarial learning processes to make the adversarial mmWave data be recognized as the adversary-desired activity; (2) The difference between the produced adversarial sample and the original mmWave data representation should be as little as possible, making the activity data stealthy and unnoticeable to bare human eyes; (3) In order to make the attack be launched in practice, the method should produce adversarial samples within a short latency that the targeted attack is ready to be launched without any additional computation.…”
Section: Challengesmentioning
confidence: 99%
“…More recently, researchers explores the vulnerability of adversarial attacks in mmWave-based HAR systems. However, they only investigate the feasibility of making the HAR systems output incorrect labels [2]. How to make the HAR systems output desired labels still remains unexplored.…”
Section: Introductionmentioning
confidence: 99%
“…In the radar domain, research has not progressed that far, and in addition, preprocessing of radar data complicates attack methodologies. Thus, there is some work in the radar adversarial attack area, but their commonality is the limitation to attack scenarios on already preprocessed and recorded data [21]. This means that the radar-specific signal shape is not taken into account, but the problem is transformed into a visual representation and attacked with successful algorithms from the visual domain.…”
Section: Adversarial Attacksmentioning
confidence: 99%