A CMA-ES-Based Adversarial Attack Against Black-Box Object Detectors

被引:0
|
作者
LYU Haoran [1 ]
TAN Yu'an [1 ]
XUE Yuan [2 ]
WANG Yajie [1 ]
XUE Jingfeng [1 ]
机构
[1] School of Computer Science and Technology, Beijing Institute of Technology
[2] Academy of Military Science
基金
中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
TP309 [安全保密]; TP391.41 [];
学科分类号
080203 ; 081201 ; 0839 ; 1402 ;
摘要
Object detection is one of the essential tasks of computer vision. Object detectors based on the deep neural network have been used more and more widely in safe-sensitive applications, like face recognition, video surveillance, autonomous driving, and other tasks. It has been proved that object detectors are vulnerable to adversarial attacks. We propose a novel black-box attack method, which can successfully attack regression-based and region-based object detectors. We introduce methods to reduce search dimensions, reduce the dimension of optimization problems and reduce the number of queries by using the Covariance matrix adaptation Evolution strategy(CMA-ES) as the primary method to generate adversarial examples. Our method only adds adversarial perturbations in the object box to achieve a precise attack.Our proposed attack can hide the specified object with an attack success rate of 86% and an average number of queries of 5, 124, and hide all objects with a success rate of74% and an average number of queries of 6, 154. Our work illustrates the effectiveness of the CMA-ES method to generate adversarial examples and proves the vulnerability of the object detectors against the adversarial attacks.
引用
收藏
页码:406 / 412
页数:7
相关论文
共 50 条
  • [41] Multi-view Correlation based Black-box Adversarial Attack for 3D Object Detection
    Liu, Bingyu
    Guo, Yuhong
    Jiang, Jianan
    Tang, Jian
    Deng, Weihong
    KDD '21: PROCEEDINGS OF THE 27TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2021, : 1036 - 1044
  • [42] Black-box Transferable Attack Method for Object Detection Based on GAN
    Lu Y.-X.
    Liu Z.-Y.
    Luo Y.-G.
    Deng S.-Y.
    Jiang T.
    Ma J.-Y.
    Dong Y.-P.
    Ruan Jian Xue Bao/Journal of Software, 2024, 35 (07): : 3531 - 3550
  • [43] An Optimized Black-Box Adversarial Simulator Attack Based on Meta-Learning
    Chen, Zhiyu
    Ding, Jianyu
    Wu, Fei
    Zhang, Chi
    Sun, Yiming
    Sun, Jing
    Liu, Shangdong
    Ji, Yimu
    ENTROPY, 2022, 24 (10)
  • [44] Boosting Decision-Based Black-Box Adversarial Attack with Gradient Priors
    Liu, Han
    Huang, Xingshuo
    Zhang, Xiaotong
    Li, Qimai
    Ma, Fenglong
    Wang, Wei
    Chen, Hongyang
    Yu, Hong
    Zhang, Xianchao
    PROCEEDINGS OF THE THIRTY-SECOND INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, IJCAI 2023, 2023, : 1195 - 1203
  • [45] Black-box Adversarial Attack Method Based on Evolution Strategy and Attention Mechanism
    Huang L.-F.
    Zhuang W.-Z.
    Liao Y.-X.
    Liu N.
    Ruan Jian Xue Bao/Journal of Software, 2021, 32 (11): : 3512 - 3529
  • [46] Greedy-Based Black-Box Adversarial Attack Scheme on Graph Structure
    Shao, Shushu
    Xia, Hui
    Zhang, Rui
    Cheng, Xiangguo
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2021, PT II, 2021, 12938 : 96 - 106
  • [47] SUBSTITUTE MODEL GENERATION FOR BLACK-BOX ADVERSARIAL ATTACK BASED ON KNOWLEDGE DISTILLATION
    Cui, Weiyu
    Li, Xiaorui
    Huang, Jiawei
    Wang, Wenyi
    Wang, Shuai
    Chen, Jianwen
    2020 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2020, : 648 - 652
  • [48] PISA: Pixel skipping-based attentional black-box adversarial attack
    Wang, Jie
    Yin, Zhaoxia
    Jiang, Jing
    Tang, Jin
    Luo, Bin
    COMPUTERS & SECURITY, 2022, 123
  • [49] TAGA: A Transfer-based Black-box Adversarial Attack with Genetic Algorithms
    Huang, Liang-Jung
    Yu, Tian-Li
    PROCEEDINGS OF THE 2022 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE (GECCO'22), 2022, : 712 - 720
  • [50] An Adversarial Network-based Multi-model Black-box Attack
    Lin, Bin
    Chen, Jixin
    Zhang, Zhihong
    Lai, Yanlin
    Wu, Xinlong
    Tian, Lulu
    Cheng, Wangchi
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2021, 30 (02): : 641 - 649