81
Views
2
CrossRef citations to date
0
Altmetric
Articles

Adversarial attack to fool object detector

&

References

  • Alex Krizhevsky , Ilya Sutskever , and Geoffrey E. Hinton , ImageNet Classification with Deep Convolutional Neural Networks, Communications of the ACM 60.6, pp. 84-90, (2017). doi: 10.1145/3065386
  • Andras Rozsa , Ethan M. Rudd , and Terrance E. Boult , Adversarial diversity and hard positive generation, IEEE Conference on Computer Vision and Pattern Recognition Workshops , pp. 25-32, (2016).
  • Anh Nguyen , Jason Yosinski , and Jeff Clune , Deep neural networks are easily fooled: High confidence predictions for unrecognizable images, IEEE Conference on Computer Vision and Pattern Recognition (CVPR) , pp. 1-20, (2015).
  • Christian Szegedy , Wei Liu , Yangqing Jia , Pierre Sermanet , Scott Reed , Dragomir Anguelov , Dumitru Erhan , Vincent Vanhoucke , and Andrew Rabinovich , Going deeper with convolutions, IEEE Conference on Computer Vision and Pattern Recognition (CVPR) , pp. 1-9, (2015).
  • Christian Szegedy , Wojciech Zaremba , Ilya Sutskever , Joan Bruna , Dumitru Erhan , Ian Goodfellow , and Rob Fergus , Intriguing properties of neural networks, International Conference on Learning Representations (ICLR) , (2014).
  • Cihang Xie , Jianyu Wang , Zhishuai Zhang , Yuyin Zhou , Lingxi Xie , and Alan Yuille , Adversarial examples for semantic segmentation and object detection, IEEE International Conference on Computer Vision (ICCV) , pp. 1369-1378, (2017).
  • Dawn Song , Kevin Eykholt , Ivan Evtimov , Earlence Fernandes , Bo Li , Amir Rahmati , Florian Tramer , Atul Prakash , and Tadayoshi Kohno , Physical adversarial examples for object detectors, In 12th {USENIX} Workshop on Offensive Technologies (WOOT) , (2018).
  • Ian J. Goodfellow , Jonathon Shlens , and Christian Szegedy, Explaining and harnessing adversarial examples, International Conference on Learning Representations (ICLR) , (2014).
  • Jan H. Metzen , Mummadi Chaithanya Kumar , Thomas Brox , and Volker Fischer , Universal adversarial perturbations against semantic image segmentation, IEEE International Conference on Computer Vision (ICCV) , pp. 2774-2783, (2017). doi: 10.1109/ICCV.2017.300
  • Jia Deng , Wei Dong , Richard Socher , Li-Jia Li , Kai Li , and Li Fei-Fei , ImageNet: A large-scale hierarchical image database, IEEE Conference on Computer Vision and Pattern Recognition , pp. 1-8, (2009).
  • Jiawei Su , Danilo Vasconcellos Vargas , and Kouichi Sakurai , One Pixel Attack for Fooling Deep Neural Networks, IEEE Transactions on Evolutionary Computation , pp. 1-1, (2019).
  • Joseph Redmon , and Ali Farhadi , YOLO9000: Better, Faster, Stronger, IEEE Conference on Computer Vision and Pattern Recognition (CVPR) , pp. 6517-6525, (2017).
  • Joseph Redmon , Santosh Divvala , Ross Girshick , and Ali Farhadi , You Only Look Once: Unified, Real-Time Object Detection, IEEE Conference on Computer Vision and Pattern Recognition (CVPR) , pp. 779-788, (2016).
  • Kaiming He , Xiangyu Zhang , Shaoqing Ren , and Jian Sun , Deep Residual Learning for Image Recognition, IEEE Conference on Computer Vision and Pattern Recognition (CVPR) , pp. 770-778, (2016).
  • Karen Simonyan , and Andrew Zisserman , Very Deep Convolutional Networks for Large-Scale Image Recognition, CoRR , vol. abs/1409.1556, pp. 1-12, (2014).
  • Yask , & Kumar, B. S. (2019). Construct the filter for malware detection in distributed control system. Journal of Information and Optimization Sciences , 40(5), 1155-1166. doi: 10.1080/02522667.2019.1642433
  • Makoto Matsumoto , and Takuji Nishimura , Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator, ACM Transactions on Modeling and Computer Simulation (TOMACS) 8.1, pp. 3-30, (1998). doi: 10.1145/272991.272995
  • Mark Everingham , Luc Van Gool , Christopher KI Williams , John Winn , and Andrew Zisserman , The Pascal Visual Object Classes (VOC) Challenge, International Journal of Computer Vision , vol. 88, no. 2, pp. 303-338, (2009). doi: 10.1007/s11263-009-0275-4
  • Matthew D. Zeiler , and Rob Fergus, Visualizing and Understanding Convolutional Networks , Computer Vision – ECCV , pp. 818-833, (2014).
  • Mohammad J. Shafiee , Brendan Chywl , Francis Li , and Alexander Wong , Fast YOLO: a fast you only look once system for real-time embedded object detection in video, arXiv preprint arXiv:1709.05943 , (2017).
  • Moosavi-Dezfooli, Seyed-Mohsen , Alhussein Fawzi , and Pascal Frossard , DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks, IEEE Conference on Computer Vision and Pattern Recognition (CVPR ), pp. 2574-2582, (2016).
  • Moosavi-Dezfooli, Seyed-Mohsen , Alhussein Fawzi , Omar Fawzi , and Pascal Frossard , Universal Adversarial Perturbations, IEEE Conference on Computer Vision and Pattern Recognition (CVPR) , pp. 1765-1763, (2017).
  • Moses Olafenwa , and John Olafenwa , Imageai Documentation. Imageai.Readthedocs.Io. https://buildmedia.readthedocs.org/media/pdf/imageai/latest/imageai.pdf, [Last Accessed: 14-Oct-2019].
  • Nicholas Carlini , and David Wagner , Towards evaluating the robustness of neural networks, IEEE Symposium on Security and Privacy (SP) , pp. 39-57, (2017).
  • Nicholas Carlini , Pratyush Mishra , Tavish Vaidya , Yuankai Zhang , Micah Sherr , Clay Shields , David Wagner , and Wenchao Zhou , Hidden voice commands, {USENIX} Security Symposium , pp. 513-530, (2016).
  • Olga Russakovsky , Jia Deng , Hao Su , Jonathan Krause , Sanjeev Satheesh , Sean Ma , Zhiheng Huang et al. , ImageNet Large Scale Visual Recognition Challenge, International Journal of Computer Vision , vol. 115, no. 3, pp. 211-252, (2015). doi: 10.1007/s11263-015-0816-y
  • Ross Girshick , Fast R-CNN , IEEE International Conference on Computer Vision (ICCV) , pp. 1440-1448, (2015).
  • Ross Girshick , Jeff Donahue , Trevor Darrell , and Jitendra Malik , Rich Feature Hierarchies for Accurate Object Detection and Semantic Segmentation, IEEE Conference on Computer Vision and Pattern Recognition , pp. 580-587, (2014).
  • Shaoqing Ren , Kaiming He , Ross Girshick , and Jian Sun , Faster RCNN: Towards Real-Time Object Detection with Region Proposal Networks, IEEE Transactions on Pattern Analysis and Machine Intelligence , vol. 39, no. 6, pp. 1137-1149, (2017). doi: 10.1109/TPAMI.2016.2577031
  • Simen Thys , Wiebe Van Ranst , and Toon Goedemé , Fooling automat surveillance cameras: adversarial patches to attack person detection, IEEE Conference on Computer Vision and Pattern Recognition Workshops , (2019)
  • Tsung-Yi Lin , Michael Maire , Serge Belongie , James Hays , Pietro Perona , Deva Ramanan , Piotr Dollár , and C. Lawrence Zitnick , Microsoft coco: Common objects in context, European conference on computer vision (ECCV ), pp. 740-755, (2014).
  • Tsung-Yi Lin , Piotr Dollár , Ross Girshick , Kaiming He , Bharath Hariharan , and Serge Belongie , Feature pyramid networks for object detection, IEEE conference on computer vision and pattern recognition , pp. 2117-2125, (2017).
  • Tsung-Yi Lin , Priya Goyal , Ross Girshick , Kaiming He , and Piotr Dollár , Focal loss for dense object detection, IEEE international conference on computer vision (ICCV ), pp. 2980-2988, (2017).
  • Wei Liu , Dragomir Anguelov , Dumitru Erhan , Christian Szegedy , Scott Reed , Cheng-Yang Fu , and Alexander C. Berg , Ssd: Single shot multibox detector, European conference on computer vision (ECCV ), pp. 21-37, (2016). doi: 10.1007/s11263-015-0844-7
  • Yanming Guo , Yu Liu , Ard Oerlemans , Songyang Lao , Song Wu , and Michael S. Lew , Deep learning for visual understanding: A review, Neurocomputing 187, pp. 27-48, (2016). doi: 10.1016/j.neucom.2015.09.116
  • Yann LeCun , Léon Bottou , Yoshua Bengio , and Patrick Haffner , Gradient-based learning applied to document recognition, Proceedings of the IEEE 86.11, 2278-2324, (1998). doi: 10.1109/5.726791
  • Zhengxia Zou , Zhenwei Shi , Yuhong Guo , and Jieping Ye , Object Detection in 20 Years: A Survey, arXiv preprint arXiv:1905.05055 , (2019).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.