Towards generic and controllable attacks against object detection

G Li, Y Xu, J Ding, GS Xia - IEEE Transactions on Geoscience …, 2024 - ieeexplore.ieee.org
Existing adversarial attacks against Object Detectors (ODs) have two inherent limitations.
Firstly, ODs have complex meta-structure designs, hence most advanced attacks for ODs …

Adversarial patch-based false positive creation attacks against aerial imagery object detectors

G Tang, W Yao, T Jiang, Y Zhao, J Sun - Neurocomputing, 2024 - Elsevier
Although adversarial attacks have revealed weaknesses in Deep Neural Networks (DNNs)-
based aerial detectors, they present a new paradigm for concealing vulnerable assets from …

Task-Specific Importance-Awareness Matters: On Targeted Attacks against Object Detection

X Sun, G Cheng, H Li, H Peng… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Targeted Attacks on Object Detection (TAOD) aim to deceive the victim detector into
recognizing a specific instance as the predefined target category while minimizing the …

A Region-Adaptive Local Perturbation-Based Method for Generating Adversarial Examples in Synthetic Aperture Radar Object Detection

J Duan, L Qiu, G He, L Zhao, Z Zhang, H Li - Remote Sensing, 2024 - mdpi.com
In synthetic aperture radar (SAR) imaging, intelligent object detection methods are facing
significant challenges in terms of model robustness and application security, which are …

[HTML][HTML] Gradient-guided hierarchical feature attack for object detector

Y Wang, Y Zheng, L Chen, Z Yang, J Wu… - Journal of King Saud …, 2024 - Elsevier
Deep neural networks (DNNs) are vulnerable to adversarial attacks, which can cause
security risks in computer information systems. Feature disruption attacks, as a typical form …

GLOW: Global Layout Aware Attacks on Object Detection

J Bao, B Liu, K Ren, J Yu - … of the IEEE/CVF Conference on …, 2024 - openaccess.thecvf.com
Adversarial attacks aim to perturb images such that a predictor outputs incorrect results. Due
to the limited research in structured attacks imposing consistency checks on natural multi …

Research and Application of the Median Filtering Method in Enhancing the Imperceptibility of Perturbations in Adversarial Examples

Y He, Y Dong, H Sun - Electronics, 2024 - mdpi.com
In the field of object detection, the adversarial attack method based on generative
adversarial network efficiently generates adversarial examples, thereby significantly …

A low-frequency adversarial attack method for object detection using generative model

L Yuan, J Sun, X Li, Z Pan, S Liu - Multimedia Tools and Applications, 2024 - Springer
Object detection is widely employed in security-critical scenarios. With the rapid
development of deep learning, deep learning-based object detection methods have …

Conditional Random Field based Adversarial Attack against SAR Target Detection

J Zhou, B Peng, J Xie, B Peng, L Liu… - IEEE Geoscience and …, 2024 - ieeexplore.ieee.org
The existence of adversarial examples causes serious security risks when deep neural
networks are applied to synthetic aperture radar (SAR) target detection. In SAR image …

A Survey and Evaluation of Adversarial Attacks for Object Detection

KNT Nguyen, W Zhang, K Lu, Y Wu, X Zheng… - arXiv preprint arXiv …, 2024 - arxiv.org
Deep learning models excel in various computer vision tasks but are susceptible to
adversarial examples-subtle perturbations in input data that lead to incorrect predictions …