Journal on Communications ›› 2021, Vol. 42 ›› Issue (11): 242-254.doi: 10.11959/j.issn.1000-436x.2021208
• Correspondences • Previous Articles
Xu CHENG1,2,3, Yingying WANG1,2, Nianjie ZHANG1, Zhangjie FU1,2, Beijing CHEN1,2, Guoying ZHAO3
Revised:
2021-09-26
Online:
2021-11-01
Published:
2021-11-01
Supported by:
CLC Number:
Xu CHENG, Yingying WANG, Nianjie ZHANG, Zhangjie FU, Beijing CHEN, Guoying ZHAO. Multi-level loss object tracking adversarial attack method based on spatial perception[J]. Journal on Communications, 2021, 42(11): 242-254.
[1] | BOLME D S , BEVERIDGE J R , DRAPER B A ,et al. Visual object tracking using adaptive correlation filters[C]// Proceedings of 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. Piscataway:IEEE Press, 2010: 2544-2550. |
[2] | HENRIQUES J F , CASEIRO R , MARTINS P ,et al. High-speed tracking with kernelized correlation filters[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2015,37(3): 583-596. |
[3] | DANELLJAN M , H?GER G , SHAHBAZ K F ,et al. Accurate scale estimation for robust visual tracking[C]// Proceedings of Proceedings of the British Machine Vision Conference 2014.[S.n.:s.l.], 2014: 1-11. |
[4] | LI Y , ZHU J K , HOI S C H . Reliable patch trackers:robust visual tracking by exploiting reliable patches[C]// Proceedings of 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). Piscataway:IEEE Press, 2015: 353-361. |
[5] | DANELLJAN M , H?GER G , KHAN F S ,et al. Learning spatially regularized correlation filters for visual tracking[C]// Proceedings of 2015 IEEE International Conference on Computer Vision (ICCV). Piscataway:IEEE Press, 2015: 4310-4318. |
[6] | DANELLJAN M , ROBINSON A , SHAHBAZ K ,et al. Beyond correlation filters:learning continuous convolution operators for visual tracking[C]// Proceedings of the European Conference on Computer Vision. Berlin:Springer, 2016: 472-488. |
[7] | WANG N , YEUNG D Y . Learning a deep compact image representation for visual tracking[C]// Proceedings of the Annual Conference on Neural Information Processing Systems. New York:Curran Associates, 2013: 809-817. |
[8] | HONG S , YOU T , KWAK S ,et al. Online tracking by learning discriminative saliency map with convolutional neural network[C]// Proceedings of the International Conference on Machine Learning. New York:ACM Press, 2015: 597-606. |
[9] | WANG L J , OUYANG W L , WANG X G ,et al. Visual tracking with fully convolutional networks[C]// Proceedings of 2015 IEEE International Conference on Computer Vision (ICCV). Piscataway:IEEE Press, 2015: 3119-3127. |
[10] | MA C , HUANG J B , YANG X K ,et al. Hierarchical convolutional features for visual tracking[C]// Proceedings of 2015 IEEE International Conference on Computer Vision (ICCV). Piscataway:IEEE Press, 2015: 3074-3082. |
[11] | SONG Y B , MA C , WU X H ,et al. VITAL:Visual tracking via adversarial learning[C]// Proceedings of 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition. Piscataway:IEEE Press, 2018: 8990-8999. |
[12] | NAM H , HAN B . Learning multi-domain convolutional neural networks for visual tracking[C]// Proceedings of 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). Piscataway:IEEE Press, 2016: 4293-4302. |
[13] | BERTINETTO L , VALMADRE J , HENRIQUES J F ,et al. Fully-convolutional Siamese networks for object tracking[C]// Proceedings of the European Conference on Computer Vision. Berlin:Springer, 2016: 850-865. |
[14] | LI B , YAN J J , WU W ,et al. High performance visual tracking with Siamese region proposal network[C]// Proceedings of 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition. Piscataway:IEEE Press, 2018: 8971-8980. |
[15] | LI B , WU W , WANG Q ,et al. SiamRPN++:evolution of Siamese visual tracking with very deep networks[C]// Proceedings of 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). Piscataway:IEEE Press, 2019: 4282-4291. |
[16] | ZHU Z , WANG Q , LI B ,et al. Distractor-aware Siamese networks for visual object tracking[C]// Proceedings of the European Conference on Computer Vision. Berlin:Springer, 2018: 101-117. |
[17] | VOIGTLAENDER P , LUITEN J , TORR P H S ,et al. Siam R-CNN:visual tracking by Re-detection[C]// Proceedings of 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). Piscataway:IEEE Press, 2020: 6577-6587. |
[18] | GOODFELLOW I J , SHLENS J , SZEGEDY C . Explaining and harnessing adversarial examples[C]// Proceedings of the third International Conference on Learning Representations. Piscataway:IEEE Press, 2015: 1-11. |
[19] | SEYED M , MOOSAVI D , ALHUSSEIN F ,et al. Deepfool:a simple and accurate method to fool deep neural networks[C]// Proceedings of 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). Piscataway:IEEE Press, 2016: 2574-2582. |
[20] | XIE C H , WANG J Y , ZHANG Z S ,et al. Adversarial examples for semantic segmentation and object detection[C]// Proceedings of 2017 IEEE International Conference on Computer Vision (ICCV). Piscataway:IEEE Press, 2017: 1369-1378. |
[21] | MADRY A , MAKELOV A , SCHMIDT L ,et al. Towards deep learning models resistant to adversarial attacks[C]// Proceedings of the Sixth International Conference on Learning Representations. Piscataway:IEEE Press, 2018: 1-28. |
[22] | ALEXEY K , IAN G , SAMY B . Adversarial machine learning at scale[J]. arXiv Preprint,arXiv:1611.01236, 2016. |
[23] | 司念文, 张文林, 屈丹 ,等. 基于对抗补丁的可泛化的 Grad-CAM攻击方法[J]. 通信学报, 2021,42(3): 23-35. |
SI N W , ZHANG W L , QU D ,et al. Generalized Grad-CAM attacking method based on adversarial patch[J]. Journal on Communications, 2021,42(3): 23-35. | |
[24] | SU J W , VARGAS D V , SAKURAI K . One pixel attack for fooling deep neural networks[J]. IEEE Transactions on Evolutionary Computation, 2019,23(5): 828-841. |
[25] | ZHONG Y Y , DENG W H . Towards transferable adversarial attack against deep face recognition[J]. IEEE Transactions on Information Forensics and Security, 2021,16: 1452-1466. |
[26] | CHEN X S , YAN X Y , ZHENG F ,et al. One-shot adversarial attacks on visual tracking with dual attention[C]// Proceedings of 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). Piscataway:IEEE Press, 2020: 10176-10185. |
[27] | JIA S , MA C , SONG Y B ,et al. Robust tracking against adversarial attacks[C]// Proceedings of the European Conference on Computer Vision. Berlin:Springer, 2020: 69-84. |
[28] | XIAO C W , LI B , ZHU J Y ,et al. Generating adversarial examples with adversarial networks[C]// Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence.[S.l.:s.n.], 2018: 835-857. |
[29] | WEI X X , LIANG S Y , CHEN N ,et al. Transferable adversarial attacks for image and video object detection[C]// Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence.[S.l.:s.n.], 2019: 1-8. |
[30] | JANDIAL S , MANGLA P , VARSHNEY S ,et al. AdvGAN++:harnessing latent layers for adversary generation[C]// Proceedings of 2019 IEEE/CVF International Conference on Computer Vision Workshop (ICCVW). Piscataway:IEEE Press, 2019: 2045-2048. |
[31] | DEB D , ZHANG J B , JAIN A K . AdvFaces:adversarial face synthesis[C]// Proceedings of 2020 IEEE International Joint Conference on Biometrics (IJCB). Piscataway:IEEE Press, 2020: 1-10. |
[32] | BALUJA S , FISCHER I . Adversarial transformation networks:learning to generate adversarial examples[J]. arXiv Preprint,arXiv:1703.09387, 2017. |
[33] | YAN B , WANG D , LU H C ,et al. Cooling-shrinking attack:blinding the tracker with imperceptible noises[C]// Proceedings of 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). Piscataway:IEEE Press, 2020: 990-999. |
[34] | SHARIF M , BHAGAVATULA S , BAUER L ,et al. A general framework for adversarial examples with objectives[J]. ACM Transactions on Privacy and Security, 2019,22(3): 1-30. |
[35] | CARLINI N , WAGNER D . Towards evaluating the robustness of neural networks[C]// Proceedings of 2017 IEEE Symposium on Security and Privacy (SP). Piscataway:IEEE Press, 2017: 39-57. |
[36] | MOOSAVI-DEZFOOLI S M , FAWZI A , FAWZI O ,et al. Universal adversarial perturbations[C]// Proceedings of 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). Piscataway:IEEE Press, 2017: 1765-1773. |
[37] | DIN S U , AKHTAR N , YOUNIS S ,et al. Steganographic universal adversarial perturbations[J]. Pattern Recognition Letters, 2020,135: 146-152. |
[38] | WU Y , LIM J , YANG M H . Object tracking benchmark[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2015,37(9): 1834-1848. |
[39] | FAN H , LIN L T , YANG F ,et al. LaSOT:a high-quality benchmark for large-scale single object tracking[C]// Proceedings of 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). Piscataway:IEEE Press, 2019: 5374-5383. |
[40] | LI P X , CHEN B Y , OUYANG W L ,et al. GradNet:gradient-guided network for visual object tracking[C]// Proceedings of 2019 IEEE/CVF International Conference on Computer Vision (ICCV). Piscataway:IEEE Press, 2019: 6162-6171. |
[41] | GUO Q , XIE X F , JUEFEI-XU F ,et al. SPARK:spatial-aware online incremental attack against visual tracking[C]// Proceedings of the Conference on European Conference on Computer Vision. Berlin:Springer, 2020: 202-219. |
[42] | LIANG S Y , WEI X X , YAO S Y ,et al. Efficient adversarial attacks for visual object tracking[C]// Proceedings of the Conference on European Conference on Computer Vision. Berlin:Springer, 2020: 34-50. |
[1] | Yiteng WU, Wei LIU, Hongtao YU. Label flipping adversarial attack on graph neural network [J]. Journal on Communications, 2021, 42(9): 65-74. |
[2] | Xiaoyuan YANG, Xinliang BI, Jia LIU, Siyuan HUANG. High-capacity image steganography algorithm combining image encryption and deep learning [J]. Journal on Communications, 2021, 42(9): 96-105. |
[3] | Zhili ZHOU, Meimin WANG, Gaobo YANG, Jianyu ZHU, Xingming SUN. Generative steganography method based on auto-generation of contours [J]. Journal on Communications, 2021, 42(9): 144-154. |
[4] | Changyin SUN, Liyan LIU, Fan JIANG, Jing JIANG. DNN-based Sub-6 GHz assisted millimeter wave network power allocation algorithm [J]. Journal on Communications, 2021, 42(9): 184-193. |
[5] | Li’na DU, Li ZHUO, Shuo YANG, Jiafeng LI, Jing ZHANG. Survey on reinforcement learning based adaptive bit rate algorithm for mobile video streaming services [J]. Journal on Communications, 2021, 42(9): 205-217. |
[6] | Jie LAI, Xiaodan WANG, Qian XIANG, Yafei SONG, Wen QUAN. Review on autoencoder and its application [J]. Journal on Communications, 2021, 42(9): 218-230. |
[7] | Yuan HUANG, Yigang HE, Yuting WU, Tongtong CHENG, Yongbo SUI, Shuguang NING. Deep learning for compressed sensing based sparse channel estimation in FDD massive MIMO systems [J]. Journal on Communications, 2021, 42(8): 61-69. |
[8] | Zhiwang CHEN, Zhongxin ZHANG, Juan SONG, Haipeng LEI, Yong PENG. Tracking algorithm of Siamese network based on online target classification and adaptive template update [J]. Journal on Communications, 2021, 42(8): 151-163. |
[9] | Futai ZOU, Yue TAN, Lin WANG, Yongkang JIANG. Botnet detection based on generative adversarial network [J]. Journal on Communications, 2021, 42(7): 95-106. |
[10] | Zhe WANG, Taoshen LI, Lina GE, Guifen ZHANG, Min WU. Optimal energy-efficiency beamforming design for SWIPT-enabled sink in sensor cloud based on deep learning [J]. Journal on Communications, 2021, 42(7): 176-188. |
[11] | Hongbin ZHANG, Yan YIN, Dongmei ZHAO, Bin LIU. Network security situational awareness model based on threat intelligence [J]. Journal on Communications, 2021, 42(6): 182-194. |
[12] | Tengfei ZHANG, Shunzheng YU. Research prospects of user information detection from encrypted traffic of mobile devices [J]. Journal on Communications, 2021, 42(2): 154-167. |
[13] | Qixu LIU, Junnan WANG, Jie YIN, Yanhui CHEN, Jiaxi LIU. Application of adversarial machine learning in network intrusion detection [J]. Journal on Communications, 2021, 42(11): 1-12. |
[14] | Jiawei QIN, Hua ZHANG, Hanbing YAN, Nengqiang HE, Tengfei TU. Research on context-aware Android application vulnerability detection [J]. Journal on Communications, 2021, 42(11): 13-27. |
[15] | Xuena REN, Dongming ZHANG, Xiuguo BAO, Bing LI. Semantic guidance attention network for occluded person re-identification [J]. Journal on Communications, 2021, 42(10): 106-116. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|