Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 1/2023

04-11-2022

Practical black-box adversarial attack on open-set recognition: Towards robust autonomous driving

Authors: Yanfei Wang, Kai Zhang, Kejie Lu, Yun Xiong, Mi Wen

Published in: Peer-to-Peer Networking and Applications | Issue 1/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

As an important method of image classification, Open-Set Recognition (OSR) has been gradually deployed in autonomous driving systems (ADSs) for detecting the surrounding environment with unknown objects. To date, many researchers have demonstrated that the existing OSR classifiers are heavily threatened by adversarial input images. Nevertheless, most existing attack approaches are based on white-box attacks, assuming that information of the target OSR model is known by the attackers. Hence, these attack models cannot effectively attack ADSs that keep models and data confidential. To facilitate the design of future generations of robust OSR classifiers for safer ADSs, we introduce a practical black-box adversarial attack. First, we simulate a real-world open-set environment by reasonable dataset division. Second, we train a substitute model, in which, to improve the transferability of the adversarial data, we combine dynamic convolution into the substitute model. Finally, we use the substitute model to generate adversarial data to attack the target model. To the best of the authors' knowledge, the proposed attack model is the first to utilize dynamic convolution to improve the transferability of adversarial data. To evaluate the proposed attack model, we conduct extensive experiments on four publicly available datasets. The numerical results show that, compared to the white-box attack approaches, the proposed black-box attack approach has a similar attack capability. Specifically, using the German Traffic Sign Recognition Benchmark dataset, our model can decrease the classification accuracy of known classes from 99.8% to 9.81% and can decrease the AUC of detecting unknown classes from 97.7% to 48.8%.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Badue C, Guidolini R, Carneiro RV, Azevedo P, Cardoso VB, Forechi A, Jesus L, Berriel R, Paixao TM, Mutz F, de Paula Veronese L, Oliveira-Santos T, De Souza AF (2021) Self-driving cars: A survey. Expert Syst Appl 165:113816CrossRef Badue C, Guidolini R, Carneiro RV, Azevedo P, Cardoso VB, Forechi A, Jesus L, Berriel R, Paixao TM, Mutz F, de Paula Veronese L, Oliveira-Santos T, De Souza AF (2021) Self-driving cars: A survey. Expert Syst Appl 165:113816CrossRef
2.
go back to reference Deng Y, Zhang T, Lou G, Zheng X, Jin J, Han QL (2021) Deep learning-based autonomous driving systems: A survey of attacks and defenses. IEEE Trans Ind Inf Deng Y, Zhang T, Lou G, Zheng X, Jin J, Han QL (2021) Deep learning-based autonomous driving systems: A survey of attacks and defenses. IEEE Trans Ind Inf
3.
go back to reference Tabernik D, Skocaj D (2020) Deep learning for large-scale traffic-sign detection and recognition. IEEE Trans Intell Transp Syst 21:1427–1440CrossRef Tabernik D, Skocaj D (2020) Deep learning for large-scale traffic-sign detection and recognition. IEEE Trans Intell Transp Syst 21:1427–1440CrossRef
4.
go back to reference Vitas D, Tomic M, Burul M (2020) Traffic light detection in autonomous driving systems. IEEE Consum Electron Mag 9:90–96CrossRef Vitas D, Tomic M, Burul M (2020) Traffic light detection in autonomous driving systems. IEEE Consum Electron Mag 9:90–96CrossRef
5.
go back to reference Scheirer WJ, De Rezende A, Rocha AS, Boult TE (2013) Toward open set recognition. IEEE Trans Pattern Anal Mach Intell 35:1757–1772CrossRef Scheirer WJ, De Rezende A, Rocha AS, Boult TE (2013) Toward open set recognition. IEEE Trans Pattern Anal Mach Intell 35:1757–1772CrossRef
6.
go back to reference Li F, Li X, Luo J, Fan S, Zhang H (2021) Open-set intersection intention prediction for autonomous driving Li F, Li X, Luo J, Fan S, Zhang H (2021) Open-set intersection intention prediction for autonomous driving
7.
go back to reference Roitberg A, Ma C, Haurilet M, Stiefelhagen R (2020) Open set driver activity recognition. IEEE Intell Veh Symp 1048–1053 Roitberg A, Ma C, Haurilet M, Stiefelhagen R (2020) Open set driver activity recognition. IEEE Intell Veh Symp 1048–1053
8.
go back to reference Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R (2013) Intriguing properties of neural networks. 2nd International Conference on Learning Representations, ICLR 2014 - Conference Track Proceedings Szegedy C, Zaremba W, Sutskever I, Bruna J, Erhan D, Goodfellow I, Fergus R (2013) Intriguing properties of neural networks. 2nd International Conference on Learning Representations, ICLR 2014 - Conference Track Proceedings
9.
go back to reference Bendale A, Boult TE (2016) Towards open set deep networks. Proc IEEE Comput Soc Conf Comput Vis Pattern Recognit 1563–1572 Bendale A, Boult TE (2016) Towards open set deep networks. Proc IEEE Comput Soc Conf Comput Vis Pattern Recognit 1563–1572
11.
go back to reference Shao R, Perera P, Yuen PC, Patel VM (2020) Open-set adversarial defense. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 12362 LNCS:682–698 Shao R, Perera P, Yuen PC, Patel VM (2020) Open-set adversarial defense. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 12362 LNCS:682–698
12.
go back to reference Xue M, He C, Wang J, Liu W (2021) Backdoors hidden in facial features: a novel invisible backdoor attack against face recognition systems. Peer Peer Netw Appl 14(3):1458–1474CrossRef Xue M, He C, Wang J, Liu W (2021) Backdoors hidden in facial features: a novel invisible backdoor attack against face recognition systems. Peer Peer Netw Appl 14(3):1458–1474CrossRef
13.
go back to reference Li H, Xu X, Zhang X, Yang S, Li B (2020) Qeba: Query-efficient boundary-based blackbox attack. Proc IEEE Comput Soc Conf Comput Vis Pattern Recognit 1218–1227 Li H, Xu X, Zhang X, Yang S, Li B (2020) Qeba: Query-efficient boundary-based blackbox attack. Proc IEEE Comput Soc Conf Comput Vis Pattern Recognit 1218–1227
14.
go back to reference Chen Y, Dai X, Liu M, Chen D, Yuan L, Liu Z (2020) Dynamic convolution: Attention over convolution kernels. Proc IEEE Comput Soc Conf Comput Vis Pattern Recognit 11027–11036 Chen Y, Dai X, Liu M, Chen D, Yuan L, Liu Z (2020) Dynamic convolution: Attention over convolution kernels. Proc IEEE Comput Soc Conf Comput Vis Pattern Recognit 11027–11036
15.
go back to reference Sonata I, Heryadi Y, Lukas L, Wibowo A (1869) Autonomous car using cnn deep learning algorithm. J Phys: Conf Ser 012071(4):2021 Sonata I, Heryadi Y, Lukas L, Wibowo A (1869) Autonomous car using cnn deep learning algorithm. J Phys: Conf Ser 012071(4):2021
16.
go back to reference Babiker MA, Elawad MA, Ahmed AH (2019) Convolutional neural network for a self-driving car in a virtual environment. Proceedings of the International Conference on Computer, Control, Electrical, and Electronics Engineering 2019, ICCCEEE 2019 Babiker MA, Elawad MA, Ahmed AH (2019) Convolutional neural network for a self-driving car in a virtual environment. Proceedings of the International Conference on Computer, Control, Electrical, and Electronics Engineering 2019, ICCCEEE 2019
17.
go back to reference Zeiler MD, Fergus R (2014) Visualizing and understanding convolutional networks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8689 LNCS:818–833 Zeiler MD, Fergus R (2014) Visualizing and understanding convolutional networks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8689 LNCS:818–833
18.
go back to reference Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. 3rd International Conference on Learning Representations, ICLR 2015 - Conference Track Proceedings Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. 3rd International Conference on Learning Representations, ICLR 2015 - Conference Track Proceedings
19.
go back to reference He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In Proceedings of the IEEE Conf Comput Vis Pattern Recognit 770–778 He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In Proceedings of the IEEE Conf Comput Vis Pattern Recognit 770–778
20.
go back to reference Abdul Aleem Kadar (2013) Single-sided deafness (ssd). Encyclopedia of Otolaryngology, Head and Neck Surgery, pp 2420–2420 Abdul Aleem Kadar (2013) Single-sided deafness (ssd). Encyclopedia of Otolaryngology, Head and Neck Surgery, pp 2420–2420
21.
go back to reference Cai Y, Luan T, Gao H, Wang H, Chen L, Li Y, Sotelo MA, Li Z (2021) Yolov4–5d: An effective and efficient object detector for autonomous driving. IEEE Trans Instrum Meas 70 Cai Y, Luan T, Gao H, Wang H, Chen L, Li Y, Sotelo MA, Li Z (2021) Yolov4–5d: An effective and efficient object detector for autonomous driving. IEEE Trans Instrum Meas 70
22.
go back to reference Redmon J, Divvala S, Girshick R, Farhadi A (2016) You only look once: Unified, real-time object detection. Proc IEEE Comput Soc Conf Comput Vis Pattern Recognit 779–788 Redmon J, Divvala S, Girshick R, Farhadi A (2016) You only look once: Unified, real-time object detection. Proc IEEE Comput Soc Conf Comput Vis Pattern Recognit 779–788
23.
go back to reference Fujiyoshi H, Hirakawa T, Yamashita T (2019) Deep learning-based image recognition for autonomous driving. IATSS Res 43:244–252CrossRef Fujiyoshi H, Hirakawa T, Yamashita T (2019) Deep learning-based image recognition for autonomous driving. IATSS Res 43:244–252CrossRef
24.
go back to reference Goodfellow IJ, Shlens J, Szegedy C (2014) Explaining and harnessing adversarial examples. 3rd International Conference on Learning Representations, ICLR 2015 Conference Track Proceedings Goodfellow IJ, Shlens J, Szegedy C (2014) Explaining and harnessing adversarial examples. 3rd International Conference on Learning Representations, ICLR 2015 Conference Track Proceedings
25.
26.
go back to reference Moosavi-Dezfooli SM, Fawzi A, Frossard P (2016) Deepfool: A simple and accurate method to fool deep neural networks. Proc IEEE Comput Soc Conf Comput Vis Pattern Recognit 2574–2582 Moosavi-Dezfooli SM, Fawzi A, Frossard P (2016) Deepfool: A simple and accurate method to fool deep neural networks. Proc IEEE Comput Soc Conf Comput Vis Pattern Recognit 2574–2582
27.
go back to reference Papernot N, Mcdaniel P, Jha S, Fredrikson M, Celik ZB, Swami A (2016) The limitations of deep learning in adversarial settings. Proceedings 2016 IEEE European Symposium on Security and Privacy, EURO S and P 2016, pages 372–387 Papernot N, Mcdaniel P, Jha S, Fredrikson M, Celik ZB, Swami A (2016) The limitations of deep learning in adversarial settings. Proceedings 2016 IEEE European Symposium on Security and Privacy, EURO S and P 2016, pages 372–387
28.
go back to reference Madry A, Makelov A, Schmidt L, Tsipras D, Vladu A (2017) Towards deep learning models resistant to adversarial attacks. 6th International Conference on Learning Representations, ICLR 2018 - Conference Track Proceedings Madry A, Makelov A, Schmidt L, Tsipras D, Vladu A (2017) Towards deep learning models resistant to adversarial attacks. 6th International Conference on Learning Representations, ICLR 2018 - Conference Track Proceedings
29.
go back to reference Carlini N, Wagner D (2017) Towards evaluating the robustness of neural networks. Proc IEEE Symp Secur Privacy 39–57 Carlini N, Wagner D (2017) Towards evaluating the robustness of neural networks. Proc IEEE Symp Secur Privacy 39–57
30.
go back to reference Papernot N, McDaniel P, Goodfellow I, Jha S, Celik ZB, Swami A (2017) Practical black-box attacks against machine learning. Proc 2017 ACM Asia Conf Comput Commun Secur Papernot N, McDaniel P, Goodfellow I, Jha S, Celik ZB, Swami A (2017) Practical black-box attacks against machine learning. Proc 2017 ACM Asia Conf Comput Commun Secur
31.
go back to reference Chen PY, Zhang H, Sharma Y, Yi J, Hsieh CJ (2017) Zoo: Zeroth order optimization based black-box attacks to deep neural networks without training substitute models. Proc ACM Workshop Artif Intell Secur Chen PY, Zhang H, Sharma Y, Yi J, Hsieh CJ (2017) Zoo: Zeroth order optimization based black-box attacks to deep neural networks without training substitute models. Proc ACM Workshop Artif Intell Secur
32.
go back to reference Brendel W, Rauber J, Bethge M (2017) Decision-based adversarial attacks: Reliable attacks against black-box machine learning models. 6th International Conference on Learning Representations, ICLR 2018 - Conference Track Proceedings Brendel W, Rauber J, Bethge M (2017) Decision-based adversarial attacks: Reliable attacks against black-box machine learning models. 6th International Conference on Learning Representations, ICLR 2018 - Conference Track Proceedings
33.
go back to reference Ilyas A, Engstrom L, Madry A (2018) Prior convictions: Black-box adversarial attacks with bandits and priors. 7th International Conference on Learning Representations, ICLR 2019 Ilyas A, Engstrom L, Madry A (2018) Prior convictions: Black-box adversarial attacks with bandits and priors. 7th International Conference on Learning Representations, ICLR 2019
34.
go back to reference Tu CC, Ting P, Chen PY, Liu S, Zhang H, Yi J, Hsieh CJ, Cheng SM (2019) Autozoom: Autoencoder-based zeroth order optimization method for attacking black-box neural networks. Proc AAAI Conf Artif Intell 33:742–749 Tu CC, Ting P, Chen PY, Liu S, Zhang H, Yi J, Hsieh CJ, Cheng SM (2019) Autozoom: Autoencoder-based zeroth order optimization method for attacking black-box neural networks. Proc AAAI Conf Artif Intell 33:742–749
35.
go back to reference Mahmood K, Nguyen PH, Nguyen LM, Nguyen T, van Dijk M (2019) Buzz: Buffer zones for defending adversarial examples in image classification Mahmood K, Nguyen PH, Nguyen LM, Nguyen T, van Dijk M (2019) Buzz: Buffer zones for defending adversarial examples in image classification
36.
go back to reference Liu Y, Moosavi-Dezfooli SM, Frossard Pascal (2019) A geometry-inspired decision-based attack. Proc IEEE Int Conf Comput Vis 4889–4897 Liu Y, Moosavi-Dezfooli SM, Frossard Pascal (2019) A geometry-inspired decision-based attack. Proc IEEE Int Conf Comput Vis 4889–4897
37.
go back to reference Andriushchenko M, Croce F, Flammarion N, Hein M (2020) Square attack: A query-efficient black-box adversarial attack via random search. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 12368 LNCS:484–501 Andriushchenko M, Croce F, Flammarion N, Hein M (2020) Square attack: A query-efficient black-box adversarial attack via random search. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 12368 LNCS:484–501
38.
go back to reference Zhou M, Wu J, Liu Y, Liu S, Zhu C (2020) Dast: Data-free substitute training for adversarial attacks. Proc IEEE Computer Soc Conf Comput Vis Pattern Recognit 231–240 Zhou M, Wu J, Liu Y, Liu S, Zhu C (2020) Dast: Data-free substitute training for adversarial attacks. Proc IEEE Computer Soc Conf Comput Vis Pattern Recognit 231–240
39.
go back to reference Li M, Deng C, Li T, Yan J, Gao X, Huang H (2020) Towards transferable targeted attack. Proc IEEE Comput Soc Conf Comput Vis Pattern Recognit 638–646 Li M, Deng C, Li T, Yan J, Gao X, Huang H (2020) Towards transferable targeted attack. Proc IEEE Comput Soc Conf Comput Vis Pattern Recognit 638–646
40.
go back to reference Feng Y, Wu B, Fan Y, Liu L, Li Z, Xia ST (2022) Boosting black-box attack with partially transferred conditional adversarial distribution. Proc IEEE/CVF Conf Comput Vis Pattern Recognit 15095–15104 Feng Y, Wu B, Fan Y, Liu L, Li Z, Xia ST (2022) Boosting black-box attack with partially transferred conditional adversarial distribution. Proc IEEE/CVF Conf Comput Vis Pattern Recognit 15095–15104
41.
go back to reference Huang Z, Zhang T (2019) Black-box adversarial attack with transferable model-based embedding. ICLR2020 Huang Z, Zhang T (2019) Black-box adversarial attack with transferable model-based embedding. ICLR2020
42.
go back to reference Zhang J, Lou Y, Wang J, Wu K, Lu K, Jia X (2021) Evaluating adversarial attacks on driving safety in vision-based autonomous vehicles. IEEE Internet Things J Zhang J, Lou Y, Wang J, Wu K, Lu K, Jia X (2021) Evaluating adversarial attacks on driving safety in vision-based autonomous vehicles. IEEE Internet Things J
43.
go back to reference Zhang J, Zhang Y, Lu K, Wang J, Wu K, Jia X, Liu B (2021) Detecting and identifying optical signal attacks on autonomous driving systems. IEEE Internet Things J 8:1140–1153CrossRef Zhang J, Zhang Y, Lu K, Wang J, Wu K, Jia X, Liu B (2021) Detecting and identifying optical signal attacks on autonomous driving systems. IEEE Internet Things J 8:1140–1153CrossRef
44.
go back to reference Garg S, Mehrotra D, Pandey HM, Pandey S (2021) Accessible review of internet of vehicle models for intelligent transportation and research gaps for potential future directions. Peer Peer Network Appl 1–28 Garg S, Mehrotra D, Pandey HM, Pandey S (2021) Accessible review of internet of vehicle models for intelligent transportation and research gaps for potential future directions. Peer Peer Network Appl 1–28
45.
go back to reference Neal L, Olson M, Fern X, Wong WK, Li F (2018) Open set learning with counterfactual images. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 11210 LNCS:620–635 Neal L, Olson M, Fern X, Wong WK, Li F (2018) Open set learning with counterfactual images. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 11210 LNCS:620–635
Metadata
Title
Practical black-box adversarial attack on open-set recognition: Towards robust autonomous driving
Authors
Yanfei Wang
Kai Zhang
Kejie Lu
Yun Xiong
Mi Wen
Publication date
04-11-2022
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 1/2023
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-022-01390-9

Other articles of this Issue 1/2023

Peer-to-Peer Networking and Applications 1/2023 Go to the issue

Premium Partner