학술논문

Fooling Aerial Detectors by Background Attack via Dual-Adversarial-Induced Error Identification
Document Type
Periodical
Source
IEEE Transactions on Geoscience and Remote Sensing IEEE Trans. Geosci. Remote Sensing Geoscience and Remote Sensing, IEEE Transactions on. 62:1-16 2024
Subject
Geoscience
Signal Processing and Analysis
Detectors
Perturbation methods
Face recognition
Closed box
Training
Task analysis
Robustness
Aerial detection
background attack
dual adversarial induction
false negatives (FNs)
false positives (FPs)
Language
ISSN
0196-2892
1558-0644
Abstract
Recent developments in adversarial attack have witnessed the success of background attack against object detectors. However, most existing methods attack detectors by luring targets into background. Therefore, an innovative background attack framework via dual-adversarial-induced error identification (BADEI) is proposed to attack detectors by deceiving background as targets, as well as deceiving targets as background, where the attack performance can be greatly enhanced by these two kinds of induced error identification. Specifically, a mechanism that generates the adversarial background is proposed to result in dual error detection, where the background can conceal the specified targets and cause the misclassification of the adversarial pattern in the background as a specific category. Moreover, an unoccluded training strategy (UTS) that leverages the target mask of an image is introduced to strategically place adaptive adversarial background beneath the targets while optimizing and updating the pixel values of the background outside the target region, which can enhance attack effectiveness for adversarial background, significantly degrade the targets’ average accuracy, and enhance the robustness of background. Finally, a dual deceptive loss function (D2LF) is carefully formulated to generate false negatives (FNs) and false positives (FPs) to achieve untargeted attacks for hiding objects as well as targeted attacks for erroneously recognizing objects. Extensive experiments and comparative analysis of various victim network models on two datasets (including the dataset for object detection in aerial images (DOTA) and RSOD dataset) confirm that the proposed framework exhibits superior performance over the state-of-the-art methods in both digital and physical scenarios.