An Adversarial Attack on Salient Regions of Traffic Sign

IF 4.8 1区 工程技术 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC Automotive Innovation Pub Date : 2023-04-10 DOI:10.1007/s42154-023-00220-9
Jun Yan, Huilin Yin, Bin Ye, Wanchen Ge, Hao Zhang, Gerhard Rigoll
{"title":"An Adversarial Attack on Salient Regions of Traffic Sign","authors":"Jun Yan,&nbsp;Huilin Yin,&nbsp;Bin Ye,&nbsp;Wanchen Ge,&nbsp;Hao Zhang,&nbsp;Gerhard Rigoll","doi":"10.1007/s42154-023-00220-9","DOIUrl":null,"url":null,"abstract":"<div><p>The state-of-the-art deep neural networks are vulnerable to the attacks of adversarial examples with small-magnitude perturbations. In the field of deep-learning-based automated driving, such adversarial attack threats testify to the weakness of AI models. This limitation can lead to severe issues regarding the safety of the intended functionality (SOTIF) in automated driving. From the perspective of causality, the adversarial attacks can be regarded as confounding effects with spurious correlations established by the non-causal features. However, few previous research works are devoted to building the relationship between adversarial examples, causality, and SOTIF. This paper proposes a robust physical adversarial perturbation generation method that aims at the salient image regions of the targeted attack class with the guidance of class activation mapping (CAM). With the utilization of CAM, the maximization of the confounding effects can be achieved through the intermediate variable of the front-door criterion between images and targeted attack labels. In the simulation experiment, the proposed method achieved a 94.6% targeted attack success rate (ASR) on the released dataset when the speed-speed-limit-60 km/h (speed-limit-60) signs could be attacked as speed-speed-limit-80 km/h (speed-limit-80) signs. In the real physical experiment, the targeted ASR is 75% and the untargeted ASR is 100%. Besides the state-of-the-art attack result, a detailed experiment is implemented to evaluate the performance of the proposed method under low resolutions, diverse optimizers, and multifarious defense methods. The code and data are released at the repository: https://github.com/yebin999/rp2-with-cam.</p></div>","PeriodicalId":36310,"journal":{"name":"Automotive Innovation","volume":"6 2","pages":"190 - 203"},"PeriodicalIF":4.8000,"publicationDate":"2023-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Automotive Innovation","FirstCategoryId":"1087","ListUrlMain":"https://link.springer.com/article/10.1007/s42154-023-00220-9","RegionNum":1,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

Abstract

The state-of-the-art deep neural networks are vulnerable to the attacks of adversarial examples with small-magnitude perturbations. In the field of deep-learning-based automated driving, such adversarial attack threats testify to the weakness of AI models. This limitation can lead to severe issues regarding the safety of the intended functionality (SOTIF) in automated driving. From the perspective of causality, the adversarial attacks can be regarded as confounding effects with spurious correlations established by the non-causal features. However, few previous research works are devoted to building the relationship between adversarial examples, causality, and SOTIF. This paper proposes a robust physical adversarial perturbation generation method that aims at the salient image regions of the targeted attack class with the guidance of class activation mapping (CAM). With the utilization of CAM, the maximization of the confounding effects can be achieved through the intermediate variable of the front-door criterion between images and targeted attack labels. In the simulation experiment, the proposed method achieved a 94.6% targeted attack success rate (ASR) on the released dataset when the speed-speed-limit-60 km/h (speed-limit-60) signs could be attacked as speed-speed-limit-80 km/h (speed-limit-80) signs. In the real physical experiment, the targeted ASR is 75% and the untargeted ASR is 100%. Besides the state-of-the-art attack result, a detailed experiment is implemented to evaluate the performance of the proposed method under low resolutions, diverse optimizers, and multifarious defense methods. The code and data are released at the repository: https://github.com/yebin999/rp2-with-cam.

Abstract Image

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
交通标志显著区域的对抗性攻击
最先进的深度神经网络很容易受到具有小幅度扰动的对抗性示例的攻击。在基于深度学习的自动驾驶领域,这种对抗性攻击威胁证明了人工智能模型的弱点。这种限制可能会导致自动驾驶中预期功能(SOTIF)安全性方面的严重问题。从因果关系的角度来看,对抗性攻击可以看作是由非因果特征建立的虚假相关性的混淆效应。然而,很少有先前的研究工作致力于建立对抗性例子、因果关系和SOTIF之间的关系。提出了一种基于类激活映射(CAM)的鲁棒物理对抗摄动生成方法,该方法针对目标攻击类的显著图像区域。利用CAM,通过图像与目标攻击标签之间的前门准则这一中间变量,实现混淆效果的最大化。在仿真实验中,当限速60 km/h(限速60)标志被攻击为限速80 km/h(限速80)标志时,该方法在发布的数据集上实现了94.6%的目标攻击成功率(ASR)。在真实物理实验中,目标ASR为75%,非目标ASR为100%。除了最先进的攻击结果外,还实施了详细的实验来评估所提出的方法在低分辨率,多种优化器和多种防御方法下的性能。代码和数据在存储库中发布:https://github.com/yebin999/rp2-with-cam。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Automotive Innovation
Automotive Innovation Engineering-Automotive Engineering
CiteScore
8.50
自引率
4.90%
发文量
36
期刊介绍: Automotive Innovation is dedicated to the publication of innovative findings in the automotive field as well as other related disciplines, covering the principles, methodologies, theoretical studies, experimental studies, product engineering and engineering application. The main topics include but are not limited to: energy-saving, electrification, intelligent and connected, new energy vehicle, safety and lightweight technologies. The journal presents the latest trend and advances of automotive technology.
期刊最新文献
Driver Steering Behaviour Modelling Based on Neuromuscular Dynamics and Multi-Task Time-Series Transformer Mechanically Joined Extrusion Profiles for Battery Trays Mode Switching and Consistency Control for Electric-Hydraulic Hybrid Steering System Review of Electrical and Electronic Architectures for Autonomous Vehicles: Topologies, Networking and Simulators In-Vehicle Network Injection Attacks Detection Based on Feature Selection and Classification
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1