亲爱的研友该休息了!由于当前在线用户较少,发布求助请尽量完整地填写文献信息,科研通机器人24小时在线,伴您度过漫漫科研夜!身体可是革命的本钱,早点休息,好梦!

Backdoor Attacks with Wavelet Embedding: Revealing and enhancing the insights of vulnerabilities in visual object detection models on transformers within digital twin systems

后门 小波 计算机科学 人工智能 嵌入 计算机视觉 计算机安全 数字水印 图像(数学)
作者
Meili Shen,Ruwei Huang
出处
期刊:Advanced Engineering Informatics [Elsevier]
卷期号:60: 102355-102355 被引量:3
标识
DOI:10.1016/j.aei.2024.102355
摘要

Given the pervasive use of deep learning models across various domains, ensuring model security has emerged as a critical concern. This paper examines backdoor attacks, a form of security threat that compromises model output by poisoning the training data. Our investigation specifically addresses backdoor attacks on object detection models, vital for security-sensitive applications like autonomous driving and smart city systems. Consequently, such attacks on object detection models could pose significant risks to human life and property. Consequently, backdoor attacks on object detection could pose serious threats to human life and property. To elucidate this security risk, we propose and experimentally evaluate five backdoor attack methods for object detection models. The key findings are: (1) Unnecessary Object Generation: a globally embedded trigger creating false objects in the target class; (2) Partial Misclassification: a trigger causing specific class misclassification; (3) Global Misclassification: a trigger reclassifying all objects into the target class; (4) Specific Object Vanishing: a trigger causing non-detection of certain objects; (5) Object Position Shifting: a trigger causing bounding box shifts for a specific class. To assess attack effectiveness, we introduced the Attack Success Rate (ASR), which can surpass 1 in object detection tasks, thus providing a more accurate reflection of the attack impact. Experimental outcomes indicate that the ASR values of these varied backdoor attacks frequently approach or surpass 1, demonstrating our method's capacity to impact multiple objects simultaneously. Additionally, to augment trigger stealth, we introduce Backdoor Attack with Wavelet Embedding (BAWE), which discreetly embeds triggers as image watermarks in training data. This embedding method yields more natural triggers with enhanced stealth. Highly stealthy triggers are less detectable, significantly increasing the likelihood of attack success and efficacy. We have developed a Transformer-based network architecture, diverging from traditional neural network frameworks. Our experiments across various object detection datasets highlight the susceptibility of these models and the high success rate of our approaches. This vulnerability poses significant risks to digital twin systems utilizing object detection technology. Our methodology not only enhances trigger stealth but also suits dense predictive tasks and circumvents current neural network backdoor attack detection methods. The experimental findings expose key challenges in the security of object detection models, particularly when integrated with digital twins, offering new avenues for backdoor attack research and foundational insights for devising defense strategies against these attacks.
最长约 10秒,即可获得该文献文件

科研通智能强力驱动
Strongly Powered by AbleSci AI
更新
PDF的下载单位、IP信息已删除 (2025-6-4)

科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
建议保存本图,每天支付宝扫一扫(相册选取)领红包
实时播报
11122发布了新的文献求助10
2秒前
3秒前
美丽的寻绿完成签到,获得积分10
4秒前
4秒前
yo一天完成签到 ,获得积分10
6秒前
13秒前
dorothy发布了新的文献求助200
13秒前
27秒前
30秒前
34秒前
小艾完成签到 ,获得积分10
37秒前
xwwx完成签到 ,获得积分10
39秒前
39秒前
39秒前
42秒前
44秒前
微风正好发布了新的文献求助10
44秒前
tdtk发布了新的文献求助10
45秒前
something发布了新的文献求助10
45秒前
小马甲应助tend采纳,获得10
50秒前
cy完成签到 ,获得积分10
54秒前
Lalala发布了新的文献求助20
54秒前
高级牛马完成签到 ,获得积分10
55秒前
JamesPei应助tdtk采纳,获得10
56秒前
wop111应助科研通管家采纳,获得20
58秒前
爆米花应助科研通管家采纳,获得10
58秒前
浮游应助科研通管家采纳,获得10
58秒前
浮游应助科研通管家采纳,获得10
58秒前
科研通AI6应助科研通管家采纳,获得10
58秒前
小二郎应助科研通管家采纳,获得10
58秒前
浮浮世世应助科研通管家采纳,获得30
58秒前
1分钟前
lixiniverson完成签到 ,获得积分0
1分钟前
天天快乐应助炙热的渊思采纳,获得10
1分钟前
1分钟前
1分钟前
1分钟前
w。发布了新的文献求助10
1分钟前
1分钟前
1分钟前
高分求助中
(应助此贴封号)【重要!!请各用户(尤其是新用户)详细阅读】【科研通的精品贴汇总】 10000
List of 1,091 Public Pension Profiles by Region 1041
Mentoring for Wellbeing in Schools 1000
Binary Alloy Phase Diagrams, 2nd Edition 600
Atlas of Liver Pathology: A Pattern-Based Approach 500
A Technologist’s Guide to Performing Sleep Studies 500
EEG in Childhood Epilepsy: Initial Presentation & Long-Term Follow-Up 500
热门求助领域 (近24小时)
化学 材料科学 医学 生物 工程类 有机化学 生物化学 物理 纳米技术 计算机科学 内科学 化学工程 复合材料 物理化学 基因 遗传学 催化作用 冶金 量子力学 光电子学
热门帖子
关注 科研通微信公众号,转发送积分 5493801
求助须知:如何正确求助?哪些是违规求助? 4591808
关于积分的说明 14434688
捐赠科研通 4524200
什么是DOI,文献DOI怎么找? 2478731
邀请新用户注册赠送积分活动 1463717
关于科研通互助平台的介绍 1436490