Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
139 tokens/sec
GPT-4o
47 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Attacking the Loop: Adversarial Attacks on Graph-based Loop Closure Detection (2312.06991v1)

Published 12 Dec 2023 in cs.CV and cs.RO

Abstract: With the advancement in robotics, it is becoming increasingly common for large factories and warehouses to incorporate visual SLAM (vSLAM) enabled automated robots that operate closely next to humans. This makes any adversarial attacks on vSLAM components potentially detrimental to humans working alongside them. Loop Closure Detection (LCD) is a crucial component in vSLAM that minimizes the accumulation of drift in mapping, since even a small drift can accumulate into a significant drift over time. A prior work by Kim et al., SymbioLCD2, unified visual features and semantic objects into a single graph structure for finding loop closure candidates. While this provided a performance improvement over visual feature-based LCD, it also created a single point of vulnerability for potential graph-based adversarial attacks. Unlike previously reported visual-patch based attacks, small graph perturbations are far more challenging to detect, making them a more significant threat. In this paper, we present Adversarial-LCD, a novel black-box evasion attack framework that employs an eigencentrality-based perturbation method and an SVM-RBF surrogate model with a Weisfeiler-Lehman feature extractor for attacking graph-based LCD. Our evaluation shows that the attack performance of Adversarial-LCD with the SVM-RBF surrogate model was superior to that of other machine learning surrogate algorithms, including SVM-linear, SVM-polynomial, and Bayesian classifier, demonstrating the effectiveness of our attack framework. Furthermore, we show that our eigencentrality-based perturbation method outperforms other algorithms, such as Random-walk and Shortest-path, highlighting the efficiency of Adversarial-LCD's perturbation selection method.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (24)
  1. DynaSLAM: Tracking, Mapping and Inpainting in Dynamic Scenes. IEEE Robotics and Automation Letters, 3:4076 – 4083.
  2. GraphAttacker: A General Multi-Task Graph Attack Framework. IEEE Transactions on Network Science and Engineering, 9(2):577–595.
  3. Adversarial Attack on Graph Structured Data. In International Conference on Machine Learning, volume 80, pages 1115–1124.
  4. Demsar, J. (2006). Statistical Comparisons of Classifiers over Multiple Data Sets. Journal of Machine Learning Research, 7:1–30.
  5. Inductive Representation Learning on Large Graphs. In Advances in Neural Information Processing Systems, pages 1025 – 1035.
  6. Adversarial Attacks on Gaussian Process Bandits. In International Conference on Machine Learning, volume 162, pages 8304–8329.
  7. Herbold, S. (2020). Autorank: A Python package for automated ranking of classifiers. Journal of Open Source Software, 5(48):2173.
  8. Perceptual Aliasing++: Adversarial Attack for Visual SLAM Front-End and Back-End. IEEE Robotics and Automation Letters, 7(2):4670–4677.
  9. A Review and Evaluations of Shortest Path Algorithms. International Journal of Scientific & Technology Research, 2:99–104.
  10. SymbioLCD: Ensemble-Based Loop Closure Detection using CNN-Extracted Objects and Visual Bag-of-Words. In IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), pages 5425–5432.
  11. Closing the Loop: Graph Networks to Unify Semantic Objects and Visual Features for Multi-object Scenes. In IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), pages 4352–4358.
  12. Graph Matching Networks for Learning the Similarity of Graph Structured Objects. In International Conference on Machine Learning, pages 3835–3845.
  13. ORB-SLAM2: an Open-Source SLAM System for Monocular, Stereo and RGB-D Cameras. IEEE Transactions on Robotics, 33:1255–1262.
  14. Rockafellar, R. T. (1993). Lagrange Multipliers and Optimality. Society for Industrial and Applied Mathematics Review, 35(2):183–238.
  15. RESLAM: A real-time robust edge-based SLAM system. In International Conference on Robotics and Automation, pages 154–160.
  16. Weisfeiler-Lehman Graph Kernels. Journal of Machine Learning Research, 12(77):2539–2561.
  17. GraKeL: A Graph Kernel Library in Python. Journal of Machine Learning Research, 21(54):1–5.
  18. A Benchmark for the Evaluation of RGB-D SLAM Systems. In International Conference on Intelligent Robot Systems.
  19. Graph Attention Networks. International Conference on Learning Representations.
  20. Adversarial Attacks on Graph Classification via Bayesian Optimisation. Advances in Neural Information Processing Systems, 34.
  21. Eigenvector perturbations of complex networks. Statistical Mechanics and its Applications, 408:106–118.
  22. Projective Ranking: A Transferable Evasion Attack Method on Graph Neural Networks. In International Conference on Information and Knowledge Management, pages 3617–3621.
  23. An End-to-End Deep Learning Architecture for Graph Classification. In Association for the Advancement of Artificial Intelligence, pages 4438–4445.
  24. Defending against Whitebox Adversarial Attacks via Randomized Discretization. In International Conference on Artificial Intelligence and Statistics, volume 89, pages 684–693.

Summary

We haven't generated a summary for this paper yet.