{"title":"当人工智能失明时:对抗性补丁的挑战","authors":"Michał Zimoń, Rafał Kasprzyk","doi":"10.5604/01.3001.0054.0092","DOIUrl":null,"url":null,"abstract":"Object detection, a key application of machine learning in image processing, has achieved significant success thanks to advances in deep learning (Girshick et al. 2014). In this paper, we focus on analysing the vulnerability of one of the leading object detection models, YOLOv5x (Redmon et al. 2016), to adversarial attacks using specially designed interference known as “adversarial patches” (Brown et al. 2017). These disturbances, while often visible, have the ability to confuse the model, which can have serious consequences in real world applications. We present a methodology for generating these interferences using various techniques and algorithms, and we analyse their effectiveness in various conditions. In addition, we discuss potential defences against these types of attacks and emphasise the importance of security research in the context of the growing popularity of ML technology (Papernot et al. 2016). Our results indicate the need for further research in this area, bearing in mind the evolution of adversarial attacks and their impact on the future of ML technology.","PeriodicalId":240434,"journal":{"name":"Computer Science and Mathematical Modelling","volume":"29 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"When AI Fails to See: The Challenge of Adversarial Patches\",\"authors\":\"Michał Zimoń, Rafał Kasprzyk\",\"doi\":\"10.5604/01.3001.0054.0092\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Object detection, a key application of machine learning in image processing, has achieved significant success thanks to advances in deep learning (Girshick et al. 2014). In this paper, we focus on analysing the vulnerability of one of the leading object detection models, YOLOv5x (Redmon et al. 2016), to adversarial attacks using specially designed interference known as “adversarial patches” (Brown et al. 2017). These disturbances, while often visible, have the ability to confuse the model, which can have serious consequences in real world applications. We present a methodology for generating these interferences using various techniques and algorithms, and we analyse their effectiveness in various conditions. In addition, we discuss potential defences against these types of attacks and emphasise the importance of security research in the context of the growing popularity of ML technology (Papernot et al. 2016). Our results indicate the need for further research in this area, bearing in mind the evolution of adversarial attacks and their impact on the future of ML technology.\",\"PeriodicalId\":240434,\"journal\":{\"name\":\"Computer Science and Mathematical Modelling\",\"volume\":\"29 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-10-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Science and Mathematical Modelling\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5604/01.3001.0054.0092\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Science and Mathematical Modelling","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5604/01.3001.0054.0092","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
摘要
物体检测是机器学习在图像处理中的一项关键应用,由于深度学习的进步而取得了巨大成功(Girshick 等人,2014 年)。在本文中,我们将重点分析领先的物体检测模型之一 YOLOv5x(Redmon 等人,2016 年)在使用被称为 "对抗性补丁 "的特殊设计干扰(Brown 等人,2017 年)进行对抗性攻击时的脆弱性。这些干扰虽然通常是可见的,但却有能力混淆模型,从而在现实世界的应用中造成严重后果。我们介绍了一种利用各种技术和算法生成这些干扰的方法,并分析了它们在各种条件下的有效性。此外,我们还讨论了针对这些类型攻击的潜在防御措施,并强调了在 ML 技术日益普及的背景下开展安全研究的重要性(Papernot 等人,2016 年)。我们的研究结果表明,考虑到对抗性攻击的演变及其对未来 ML 技术的影响,有必要在这一领域开展进一步研究。
When AI Fails to See: The Challenge of Adversarial Patches
Object detection, a key application of machine learning in image processing, has achieved significant success thanks to advances in deep learning (Girshick et al. 2014). In this paper, we focus on analysing the vulnerability of one of the leading object detection models, YOLOv5x (Redmon et al. 2016), to adversarial attacks using specially designed interference known as “adversarial patches” (Brown et al. 2017). These disturbances, while often visible, have the ability to confuse the model, which can have serious consequences in real world applications. We present a methodology for generating these interferences using various techniques and algorithms, and we analyse their effectiveness in various conditions. In addition, we discuss potential defences against these types of attacks and emphasise the importance of security research in the context of the growing popularity of ML technology (Papernot et al. 2016). Our results indicate the need for further research in this area, bearing in mind the evolution of adversarial attacks and their impact on the future of ML technology.