Journal on Communications ›› 2023, Vol. 44 ›› Issue (11): 260-277.doi: 10.11959/j.issn.1000-436x.2023223

• Comprehensive Review • Previous Articles    

Survey on adversarial attacks and defenses for object detection

Xinxin WANG1,2, Jing CHEN1,2,3, Kun HE1,2, Zijun ZHANG1,2, Ruiying DU1,2,4, Qiao LI1,2, Jisi SHE1,2   

  1. 1 School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China
    2 Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education, Wuhan University, Wuhan 430072, China
    3 Rizhao Institute of Information Technology, Wuhan University, Rizhao 276800, China
    4 Collaborative Innovation Center of Geospatial Technology, Wuhan 430079, China
  • Revised:2023-08-06 Online:2023-11-01 Published:2023-11-01
  • Supported by:
    The National Key Research and Development Program of China(2022YFB3102100);The Fundamental Research Funds for the Central Universities(2042022kf1195);The National Natural Science Foundation of China(62076187);The National Natural Science Foundation of China(62172303);The Key Research and Development Program of Hubei Province(2022BAA039);The Key Research and Development Program of Shandong Province(2022CXPT055)

Abstract:

In response to recent developments in adversarial attacks and defenses for object detection, relevant terms and concepts associated with object detection and adversarial learning were first introduced.Subsequently, according to the evolution process of the methods, a comprehensive retrospective analysis was conducted on the research achievements in the realm of adversarial attacks and defense methods for object detection.Particularly, attack methods and defense strategies were categorized based on the attacker knowledge and the deep learning lifecycle.Furthermore, an in-depth analysis and discussion of the characteristics and relationships among different approaches were provided.Lastly, considering the strengths and limitations of existing research, the imminent challenges and directions were summarized for further exploration in adversarial attack and defense of object detection.

Key words: object detection, adversarial attacks, adversarial defenses, robustness, transferability

CLC Number: 

No Suggested Reading articles found!