Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
97 tokens/sec
GPT-4o
53 tokens/sec
Gemini 2.5 Pro Pro
44 tokens/sec
o3 Pro
5 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

RAUCA: A Novel Physical Adversarial Attack on Vehicle Detectors via Robust and Accurate Camouflage Generation (2402.15853v2)

Published 24 Feb 2024 in cs.CV

Abstract: Adversarial camouflage is a widely used physical attack against vehicle detectors for its superiority in multi-view attack performance. One promising approach involves using differentiable neural renderers to facilitate adversarial camouflage optimization through gradient back-propagation. However, existing methods often struggle to capture environmental characteristics during the rendering process or produce adversarial textures that can precisely map to the target vehicle, resulting in suboptimal attack performance. Moreover, these approaches neglect diverse weather conditions, reducing the efficacy of generated camouflage across varying weather scenarios. To tackle these challenges, we propose a robust and accurate camouflage generation method, namely RAUCA. The core of RAUCA is a novel neural rendering component, Neural Renderer Plus (NRP), which can accurately project vehicle textures and render images with environmental characteristics such as lighting and weather. In addition, we integrate a multi-weather dataset for camouflage generation, leveraging the NRP to enhance the attack robustness. Experimental results on six popular object detectors show that RAUCA consistently outperforms existing methods in both simulation and real-world settings.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (25)
  1. Synthesizing robust adversarial examples. In International conference on machine learning, pp.  284–293. PMLR, 2018.
  2. Deep learning in computer vision: A critical review of emerging techniques and application scenarios. Machine Learning with Applications, 6:100134, 2021.
  3. MMDetection: Open MMLab Detection Toolbox and Benchmark. CoRR, abs/1906.07155, 2019. URL http://arxiv.org/abs/1906.07155.
  4. ShapeShifter: Robust Physical Adversarial Attack on Faster R-CNN Object Detector. In Berlingerio, M., Bonchi, F., Gärtner, T., Hurley, N., and Ifrim, G. (eds.), Machine Learning and Knowledge Discovery in Databases - European Conference, ECML PKDD 2018, Dublin, Ireland, September 10-14, 2018, Proceedings, Part I, volume 11051 of Lecture Notes in Computer Science, pp.  52–68. Springer, 2018. doi: 10.1007/978-3-030-10925-7_4. URL https://doi.org/10.1007/978-3-030-10925-7_4.
  5. CARLA: An open urban driving simulator. In Conference on robot learning, pp.  1–16. PMLR, 2017.
  6. The pascal visual object classes challenge: A retrospective. International journal of computer vision, 111:98–136, 2015.
  7. YOLOX: Exceeding YOLO Series in 2021. CoRR, abs/2107.08430, 2021. URL https://arxiv.org/abs/2107.08430.
  8. Neural 3d mesh renderer. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp.  3907–3916, 2018.
  9. Imagenet classification with deep convolutional neural networks. Advances in neural information processing systems, 25, 2012.
  10. Understanding deep image representations by inverting them. In IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2015, Boston, MA, USA, June 7-12, 2015, pp.  5188–5196. IEEE Computer Society, 2015. doi: 10.1109/CVPR.2015.7299155. URL https://doi.org/10.1109/CVPR.2015.7299155.
  11. Yolov3: An incremental improvement. arXiv preprint arXiv:1804.02767, 2018.
  12. Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks. IEEE Trans. Pattern Anal. Mach. Intell., 39(6):1137–1149, 2017. doi: 10.1109/TPAMI.2016.2577031. URL https://doi.org/10.1109/TPAMI.2016.2577031.
  13. Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition. In Weippl, E. R., Katzenbeisser, S., Kruegel, C., Myers, A. C., and Halevi, S. (eds.), Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016, pp.  1528–1540. ACM, 2016a. doi: 10.1145/2976749.2978392. URL https://doi.org/10.1145/2976749.2978392.
  14. Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition. In Weippl, E. R., Katzenbeisser, S., Kruegel, C., Myers, A. C., and Halevi, S. (eds.), Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016, pp.  1528–1540. ACM, 2016b. doi: 10.1145/2976749.2978392. URL https://doi.org/10.1145/2976749.2978392.
  15. Sparse r-cnn: End-to-end object detection with learnable proposals. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp.  14454–14463, 2021.
  16. DTA: Physical Camouflage Attacks Using Differentiable Transformation Network. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp.  15305–15314, June 2022.
  17. ACTIVE: Towards Highly Transferable 3D Physical Camouflage for Universal and Robust Vehicle Evasion. In Proceedings of the IEEE/CVF International Conference on Computer Vision (ICCV), pp.  4305–4314, October 2023.
  18. Intriguing properties of neural networks. In Bengio, Y. and LeCun, Y. (eds.), 2nd International Conference on Learning Representations, ICLR 2014, Banff, AB, Canada, April 14-16, 2014, Conference Track Proceedings, 2014. URL http://arxiv.org/abs/1312.6199.
  19. YOLOv7: Trainable bag-of-freebies sets new state-of-the-art for real-time object detectors. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp.  7464–7475, 2023.
  20. Fca: Learning a 3d full-coverage vehicle camouflage for multi-view physical adversarial attack. In Proceedings of the AAAI conference on artificial intelligence, volume 36, pp.  2414–2422, 2022.
  21. Dual attention suppression attack: Generate adversarial camouflage in physical world. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp.  8565–8574, 2021.
  22. Physical adversarial attack on vehicle detector in the carla simulator. arXiv preprint arXiv:2007.16118, 2020.
  23. Dynamic R-CNN: Towards high quality object detection via dynamic training. In Computer Vision–ECCV 2020: 16th European Conference, Glasgow, UK, August 23–28, 2020, Proceedings, Part XV 16, pp.  260–275. Springer, 2020.
  24. Camou: Learning a vehicle camouflage for physical adversarial attack on object detections in the wild. ICLR, 2019.
  25. Deformable DETR: Deformable Transformers for End-to-End Object Detection. In 9th International Conference on Learning Representations, ICLR 2021, Virtual Event, Austria, May 3-7, 2021. OpenReview.net, 2021. URL https://openreview.net/forum?id=gZ9hCDWe6ke.
User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (4)
  1. Jiawei Zhou (77 papers)
  2. Linye Lyu (5 papers)
  3. Daojing He (13 papers)
  4. Yu Li (378 papers)
Citations (5)

Summary

We haven't generated a summary for this paper yet.