Javascript must be enabled to continue!
Frequency Domain Backdoor Attacks for Visual Object Tracking
View through CrossRef
Visual object tracking(VOT)is a key topic in computer vision tasks. It serves as an essential component of various advanced problems in the field, such as motion analysis, event detection, and activity understanding. VOT finds extensive applications, including human-computer interaction in video, video surveillance, and autonomous driving. Due to the rapid development of deep neural networks(DNNs), VOT has achieved unprecedented progress. However, the lack of interpretability in DNNs has introduced certain security risks, notably backdoor attacks. A neural network backdoor attack involves an attacker injecting hidden backdoors into the network, making the compromised model behave normally with regular inputs but produce predetermined outputs when specific conditions set by the attacker are met. Existing triggers for VOT backdoor attacks are poorly concealed. We leverage the sensitivity of DNNs to small perturbations to generate pixel-level indistinguishable perturbations in the frequency domain, thus proposing an invisible backdoor attack. This method ensures both effectiveness and concealment. Additionally, we employ a differential evolution(DE) algorithm to optimize trigger generation, thereby reducing the attacker's required capabilities. We have validated the effectiveness of the attack across various datasets and models.
Title: Frequency Domain Backdoor Attacks for Visual Object Tracking
Description:
Visual object tracking(VOT)is a key topic in computer vision tasks.
It serves as an essential component of various advanced problems in the field, such as motion analysis, event detection, and activity understanding.
VOT finds extensive applications, including human-computer interaction in video, video surveillance, and autonomous driving.
Due to the rapid development of deep neural networks(DNNs), VOT has achieved unprecedented progress.
However, the lack of interpretability in DNNs has introduced certain security risks, notably backdoor attacks.
A neural network backdoor attack involves an attacker injecting hidden backdoors into the network, making the compromised model behave normally with regular inputs but produce predetermined outputs when specific conditions set by the attacker are met.
Existing triggers for VOT backdoor attacks are poorly concealed.
We leverage the sensitivity of DNNs to small perturbations to generate pixel-level indistinguishable perturbations in the frequency domain, thus proposing an invisible backdoor attack.
This method ensures both effectiveness and concealment.
Additionally, we employ a differential evolution(DE) algorithm to optimize trigger generation, thereby reducing the attacker's required capabilities.
We have validated the effectiveness of the attack across various datasets and models.
Related Results
IBD: An Interpretable Backdoor-Detection Method via Multivariate Interactions
IBD: An Interpretable Backdoor-Detection Method via Multivariate Interactions
Recent work has shown that deep neural networks are vulnerable to backdoor attacks. In comparison with the success of backdoor-attack methods, existing backdoor-defense methods fac...
Deteksi dan Mitigasi Serangan Backdoor Menggunakan Python Watchdog
Deteksi dan Mitigasi Serangan Backdoor Menggunakan Python Watchdog
The number of cyber attacks is increasing. This happens thoroughly, both at the international and national levels. Technology, techniques, and methods of carrying out cyber attacks...
Sub-Band Backdoor Attack in Remote Sensing Imagery
Sub-Band Backdoor Attack in Remote Sensing Imagery
Remote sensing datasets usually have a wide range of spatial and spectral resolutions. They provide unique advantages in surveillance systems, and many government organizations use...
A Stealthy Backdoor Attack for Code Models
A Stealthy Backdoor Attack for Code Models
Abstract
Recent studies have shown that code models are susceptible to backdoor attacks. When injected with a backdoor, the victim code model can function normally on benig...
Financial Performance Analysis of Backdoor Listed Companies
Financial Performance Analysis of Backdoor Listed Companies
IPO listing threshold requirements are high, many enterprises have chosen to backdoor listing due to the restrictions of objective factors. In order to study the impact of backdoor...
Deception-Based Security Framework for IoT: An Empirical Study
Deception-Based Security Framework for IoT: An Empirical Study
<p><b>A large number of Internet of Things (IoT) devices in use has provided a vast attack surface. The security in IoT devices is a significant challenge considering c...
Contour Tracking
Contour Tracking
Abstract
Object tracking is a fundamental problem in computer vision. It is generally required as a preprocessing step that is used to perform motion‐based object recogni...
Depth-aware salient object segmentation
Depth-aware salient object segmentation
Object segmentation is an important task which is widely employed in many computer vision applications such as object detection, tracking, recognition, and ret...

