Filters








682 Hits in 7.3 sec

Appending Adversarial Frames for Universal Video Attack [article]

Zhikai Chen, Lingxi Xie, Shanmin Pang, Yong He, Qi Tian
2019 arXiv   pre-print
This paper presents a novel idea of video-based attack, which appends a few dummy frames (e.g., containing the texts of 'thanks for watching') to a video clip and then adds adversarial perturbations only  ...  We perform experiments on two popular datasets with six state-of-the-art video classification models, and demonstrate the effectiveness of our approach in the scenario of universal video attacks.  ...  Adversarial Video with Appending Adversarial Frames Original Video with Appending Frames While adversarial attack and defense have been covered in a wide range of vision tasks on still images, the same  ... 
arXiv:1912.04538v1 fatcat:j7rhlsao3zarzombc2fkvzkyeq

Adversarial Framing for Image and Video Classification

Michał Zajac, Konrad Zołna, Negar Rostamzadeh, Pedro O. Pinheiro
2019 PROCEEDINGS OF THE THIRTIETH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND THE TWENTY-EIGHTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE  
In this paper, we propose a method that keeps the image unchanged and only adds an adversarial framing on the border of the image.  ...  We show empirically that our method is able to successfully attack state-of-theart methods on both image and video classification problems.  ...  Michał Zając is cofinanced by National Centre for Research and Development as a part of EU supported Smart Growth Operational Programme 2014-2020 (POIR.01.01.01-00-0392/17-00).  ... 
doi:10.1609/aaai.v33i01.330110077 fatcat:hho5ethmjfcs7lobvu2rykikpq

Adversarial Framing for Image and Video Classification [article]

Konrad Zolna and Michal Zajac and Negar Rostamzadeh and Pedro O. Pinheiro
2019 arXiv   pre-print
In this paper, we propose a method that keeps the image unchanged and only adds an adversarial framing on the border of the image.  ...  We show empirically that our method is able to successfully attack state-of-the-art methods on both image and video classification problems.  ...  We modified the repository provided by (Zolna, Geras, and Cho 2019) to implement our method (see github.com/kondiz/casme for their code).  ... 
arXiv:1812.04599v3 fatcat:fkktnjhatrccvd6iocbxd4jltm

Weighted Average Precision: Adversarial Example Detection in the Visual Perception of Autonomous Vehicles [article]

Yilan Li, Senem Velipasalar
2020 arXiv   pre-print
In this paper, we firstly propose a novel distance metric for practical autonomous driving object detection outputs.  ...  Recent works have shown that neural networks are vulnerable to carefully crafted adversarial examples (AE).  ...  It has been recognized as the most effective attacks against DNNs, and in Madry et al. [23] , it has been shown that a C&W attack is a universal adversary among all first-order attack methods.  ... 
arXiv:2002.03751v2 fatcat:2ovzphkp3rdpfl7ruvw4upqqku

Minimalistic Attacks: How Little it Takes to Fool a Deep Reinforcement Learning Policy [article]

Xinghua Qu, Zhu Sun, Yew-Soon Ong, Abhishek Gupta, Pengfei Wei
2020 arXiv   pre-print
RL policy; (2) fractional-state adversary: where only several pixels are perturbed, with the extreme case being a single-pixel adversary; and (3) tactically-chanced attack: where only significant frames  ...  deceived by perturbation to only 1% frames.  ...  .: AISG-RP-2018-004] and the Data Science and Artificial Intelligence Research Center (DSAIR) at Nanyang Technological University.  ... 
arXiv:1911.03849v5 fatcat:niryp6ec7rdo3mhbk7o2hrdwpm

The Untold Secrets of Operational Wi-Fi Calling Services: Vulnerabilities, Attacks, and Countermeasures [article]

Tian Xie, Guan-Hua Tu, Bangjie Yin, Chi-Yu Li, Chunyi Peng, Mi Zhang, Hui Liu, Xiaoming Liu
2018 arXiv   pre-print
By exploiting the vulnerabilities, together with several state-of-the-art computer visual recognition technologies, we devise two proof-of-concept attacks: user privacy leakage and telephony harassment  ...  THDoS attack can be significant in practice. Most of U.S. universities have deployed campus Wi-Fi networks. However, our studies show that the campus Wi-Fi is the best attack surface for adversaries.  ...  For each training video, assume that the person bounding box for each frame is known and an HOG descriptor can be extracted for the corresponding bounding box.  ... 
arXiv:1811.11274v2 fatcat:rup3ctb6xjbjrkzm4jukjyxeiq

Advances in adversarial attacks and defenses in computer vision: A survey [article]

Naveed Akhtar, Ajmal Mian, Navid Kardan, Mubarak Shah
2021 arXiv   pre-print
However, it is now known that DL is vulnerable to adversarial attacks that can manipulate its predictions by introducing visually imperceptible perturbations in images and videos.  ...  In [2], we reviewed the contributions made by the computer vision community in adversarial attacks on deep learning (and their defenses) until the advent of year 2018.  ...  A one-shot adversarial attack is proposed in [32] for single object tracking where inserting a patch in the first frame of the video results in losing the target in the subsequent frames.  ... 
arXiv:2108.00401v2 fatcat:23gw74oj6bblnpbpeacpg3hq5y

Adversarial Attacks against Face Recognition: A Comprehensive Study

Fatemeh Vakhshiteh, Ahmad Nickabadi, Raghavendra Ramachandra
2021 IEEE Access  
In this article, we present a comprehensive survey on adversarial attacks against FR systems and elaborate on the competence of new countermeasures against them.  ...  For more information, see https://creativecommons.org/licenses/by/4.0/ This article has been accepted for publication in a future issue of this journal, but has not been fully edited.  ...  A typical FR system's ultimate goal is to identify or verify a person from a digital image or a video frame.  ... 
doi:10.1109/access.2021.3092646 fatcat:7cj5z57wxvcbvjmckifkobraoq

SurFi: Detecting Surveillance Camera Looping Attacks with Wi-Fi Channel State Information (Extended Version) [article]

Nitya Lakshmanan, Inkyu Bang, Min Suk Kang, Jun Han, Jong Taek Lee
2019 arXiv   pre-print
However, recent surveillance camera looping attacks demonstrate new security threats - adversaries can replay a seemingly benign video feed of a place of interest while trespassing or stealing valuables  ...  SurFi processes and correlates the live video feeds and the Wi-Fi CSI signals to detect any mismatches that would identify the presence of the surveillance camera looping attacks.  ...  Refer to Section 2 for the recent work on video camera looping attacks. Wireless Sensing.  ... 
arXiv:1904.01350v1 fatcat:5jwaw2aq5jfbdfvjmnhcnasfba

Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey [article]

Naveed Akhtar, Ajmal Mian
2018 arXiv   pre-print
To emphasize that adversarial attacks are possible in practical conditions, we separately review the contributions that evaluate adversarial attacks in the real-world scenarios.  ...  We review the works that design adversarial attacks, analyze the existence of such attacks and propose defenses against them.  ...  Details on this work and example videos of the adversarial attacks can be found on the following URL: http://yclin.me/adversarial attack RL/. In another work, Huang et al.  ... 
arXiv:1801.00553v3 fatcat:xfk7togp5bhxvbxtwox3sckqq4

A Survey on Adversarial Attacks for Malware Analysis [article]

Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam
2022 arXiv   pre-print
Work will provide a taxonomy of adversarial evasion attacks on the basis of attack domain and adversarial generation techniques.  ...  Increasing dependency on data has paved the blueprint for ever-high incentives to camouflage machine learning models.  ...  Inability of byte appending strategies for appending bytes in files, greater than maximum size lead authors to use slack attacks.  ... 
arXiv:2111.08223v2 fatcat:fiw3pgunsvb2vo7uv72mp6b65a

Detecting and Preventing Machine-to-Machine Hijacking Attacks in Cellular Networks

Ioannis Broustis, Ganapathy S. Sundaram, Harish Viswanathan
2012 Bell Labs technical journal  
In this paper, we demonstrate how hijacking attacks apply to contemporary networks, and provide a solution for mitigating them.  ...  As a result, M2M infrastructures are attractive targets to attackers. For instance, hackers may use a water meter to browse the web over a mobile network.  ...  Acknowledgements We would like to thank David Rossetti from Alcatel-Lucent for his valuable help and comments on our work.  ... 
doi:10.1002/bltj.21527 fatcat:sqchmo36z5dgxmh5m36onw6zfi

Deep adversarial attack on target detection systems [article]

Uche M. Osahor, Nasser M. Nasrabadi
2021 arXiv   pre-print
However,prior research confirms that even state of the art classifier models are susceptible to adversarial attacks.  ...  Deep Convolutional Neural Network (DCNN) classifiers have proven to be successful tools for computer vision applications.  ...  The small changes also called perturbations are the major premise for adversarial images, these perturbations could be designed to create adversarial examples for each image in a dataset or a universal  ... 
arXiv:2108.05948v2 fatcat:kw6j32b52nbbtp2xzzeoeswoai

Adversarial Attacks against Face Recognition: A Comprehensive Study [article]

Fatemeh Vakhshiteh, Ahmad Nickabadi, Raghavendra Ramachandra
2021 arXiv   pre-print
In this article, we present a comprehensive survey on adversarial attacks against FR systems and elaborate on the competence of new countermeasures against them.  ...  Face recognition (FR) systems have demonstrated outstanding verification performance, suggesting suitability for real-world applications ranging from photo tagging in social media to automated border control  ...  The goal of a typical FR system is to identify or verify a person from a digital image or a video frame taken from a video source.  ... 
arXiv:2007.11709v3 fatcat:jfhcxj6hp5esvcclf2dsehfad4

SAMS: A Seamless and Authorized Multimedia Streaming framework for WMSN-based IoMT

Mian Ahmad Jan, Muhammad Usman, Xiangjian He, Ateeq Ur Rehman
2018 IEEE Internet of Things Journal  
An Internet of Multimedia Things (IoMT) architecture aims to provide a support for real-time multimedia applications by using wireless multimedia sensor nodes that are deployed for long-term usage.  ...  This waiting may result in an excessive packet loss and end-to-end delay for multimedia traffic. To address these issues, a channel allocation approach is proposed for inter-cluster communication.  ...  ., 10 video frames per GoP, and are processed as consecutive samples. After six GoPs (i.e., 60 samples), buffer threshold for each node reaches.  ... 
doi:10.1109/jiot.2018.2848284 fatcat:o7hzcjmznzbm5e434q2dfbvn7u
« Previous Showing results 1 — 15 out of 682 results