Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence 2019
DOI: 10.24963/ijcai.2019/134
|View full text |Cite
|
Sign up to set email alerts
|

Transferable Adversarial Attacks for Image and Video Object Detection

Abstract: Identifying adversarial examples is beneficial for understanding deep networks and developing robust models. However, existing attacking methods for image object detection have two limitations: weak transferability-the generated adversarial examples often have a low success rate to attack other kinds of detection methods, and high computation cost-they need much time to deal with video data, where many frames need polluting. To address these issues, we present a generative method to obtain adversarial images a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
66
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 113 publications
(72 citation statements)
references
References 11 publications
(20 reference statements)
0
66
0
Order By: Relevance
“…We focus on one-stage detectors in this work due to its essential role in different variants of detectors. A number of attacks for object detectors have been developed very recently [57,32,6,11,55,23,22,31]. [57] extends the attack generation method from classification to detection and demonstrates that it is possible to attack objectors using a designed classification loss.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…We focus on one-stage detectors in this work due to its essential role in different variants of detectors. A number of attacks for object detectors have been developed very recently [57,32,6,11,55,23,22,31]. [57] extends the attack generation method from classification to detection and demonstrates that it is possible to attack objectors using a designed classification loss.…”
Section: Related Workmentioning
confidence: 99%
“…Many different attack methods for object detectors have been developed very recently [57,32,6,11,55,23,22,31]. Although there are many differences in the formulations of these attacks, when viewed from the multi-task learning…”
Section: Detection Attacks Guided By Task Lossesmentioning
confidence: 99%
See 2 more Smart Citations
“…In this paper, we summarize applications in four fields. In the computer vision field, there are adversarial attacks in image classification [15,17,[24][25][26], semantic image segmentation, and object detection [27,28]. In natural language processing fields, there are adversarial attacks in machine translation [29] and text generation [30].…”
Section: Introductionmentioning
confidence: 99%