QESAR: Query Effective Decision-Based Attack on Skeletal Action Recognition

被引:0
|
作者
Kang, Zi [1 ]
Zhang, Yumei [1 ]
Zhang, Rui [1 ]
Jiang, Yanan [1 ]
Xia, Hui [1 ]
机构
[1] Ocean Univ China, Comp Sci & Technol, Qingdao 266100, Peoples R China
基金
中国国家自然科学基金;
关键词
Deep Learning; Adversarial Attack; Adversarial Example; Decision-based Attack; Skeleton-based Action Recognition;
D O I
10.1007/978-981-99-8543-2_34
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Generating high-quality adversarial examples in a black-box setting often requires larger query volumes and adds more noticeable perturbations in skeleton action recognition tasks. We propose a query effective decision-based attack on skeletal action recognition (QESAR) to address this. We use the current gradient direction and successful historical information to reduce query volumes to update the sampling distribution, enabling a quick estimation of the next gradient direction. To ensure the imperceptibility of adversarial examples, we propose a hierarchical joint perturbation method to estimate the direction of perturbation accurately. Additionally, we design an objective function that satisfies joint angle and bone length constraints to minimize the magnitude of perturbation, ensuring that the generated adversarial examples do not exhibit noticeable distortions. Finally, in experiments, we find that QESAR can generate adversarial examples that satisfy skeletal action constraints with lower query volume. On the HDM05 and NTU datasets targeted at the ST-GCN and SGN models, QESAR achieves a 100% attack success rate while reducing the query volume by hundreds to thousands. Specifically, in the untargeted attack scenario, the QESAR scheme outperforms in terms of four metrics on the HDM05 dataset against the SGN model: average joint position deviation, average joint position acceleration deviation, average joint angle deviation, reducing them by 0.0078, 0.0679, and 6.9311, respectively.
引用
收藏
页码:417 / 429
页数:13
相关论文
共 50 条
  • [1] HopSkipJumpAttack: A Query-Efficient Decision-Based Attack
    Chen, Jianbo
    Jordan, Michael, I
    Wainwright, Martin J.
    [J]. 2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, : 1277 - 1294
  • [2] Triangle Attack: A Query-Efficient Decision-Based Adversarial Attack
    Wang, Xiaosen
    Zhang, Zeliang
    Tong, Kangheng
    Gong, Dihong
    He, Kun
    Li, Zhifeng
    Liu, Andwei
    [J]. COMPUTER VISION - ECCV 2022, PT V, 2022, 13665 : 156 - 174
  • [3] DAIR: A Query-Efficient Decision-based Attack on Image Retrieval Systems
    Chen, Mingyang
    Lu, Junda
    Wang, Yi
    Qin, Jianbin
    Wang, Wei
    [J]. SIGIR '21 - PROCEEDINGS OF THE 44TH INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL, 2021, : 1064 - 1073
  • [4] Decision-Based Query Efficient Adversarial Attack via Adaptive Boundary Learning
    Shen, Meng
    Li, Changyue
    Yu, Hao
    Li, Qi
    Zhu, Liehuang
    Xu, Ke
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 1740 - 1753
  • [5] Query-Efficient Decision-Based Black-Box Patch Attack
    Chen, Zhaoyu
    Li, Bo
    Wu, Shuang
    Ding, Shouhong
    Zhang, Wenqiang
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 5522 - 5536
  • [6] Query-efficient decision-based attack via sampling distribution reshaping
    Sun, Xuxiang
    Cheng, Gong
    Pei, Lei
    Han, Junwei
    [J]. PATTERN RECOGNITION, 2022, 129
  • [7] Decision-based query and questionnaire systems
    Nikravesh, Masoud
    [J]. FORGING NEW FRONTIERS: FUZZY PIONEERS II, 2008, 218 : 21 - 51
  • [8] A Geometry-Inspired Decision-Based Attack
    Liu, Yujia
    Moosavi-Dezfooli, Seyed-Mohsen
    Frossard, Pascal
    [J]. 2019 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2019), 2019, : 4889 - 4897
  • [9] Decision-Based Adversarial Attack With Frequency Mixup
    Li, Xiu-Chuan
    Zhang, Xu-Yao
    Yin, Fei
    Liu, Cheng-Lin
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1038 - 1052
  • [10] Decision-Based Adversarial Attack with Frequency Mixup
    Li, Xiu-Chuan
    Zhang, Xu-Yao
    Yin, Fei
    Liu, Cheng-Lin
    [J]. IEEE Transactions on Information Forensics and Security, 2022, 17 : 1038 - 1052