Adversarial YOLO: Defense Human Detection Patch Attacks via Detecting Adversarial Patches

AI-generated keywords: Ad-YOLO Adversarial Patch Attacks Human Detection Systems YOLOv2 Inria-Patch

AI-generated Key Points

The license of the paper does not allow us to build upon its content and the key points are generated using the paper metadata rather than the full article.

  • Security of object detection systems is a major concern due to adversarial patch attacks
  • Existing defense mechanisms struggle to defend against attacks on human detection systems
  • Ad-YOLO is a new defense strategy specifically targeted at human detection attacks
  • Ad-YOLO is an efficient and effective plug-in component for the YOLO detection system
  • Ad-YOLO introduces a patch class into the YOLO architecture to detect both objects of interest and adversarial patches
  • Ad-YOLO outperforms YOLOv2 in white-box patch attacks, achieving 80.31% average precision (AP) for persons compared to 33.93% AP for YOLOv2
  • Ad-YOLO has only a slight drop of 0.70% mean average precision (mAP) on the VOC 2007 test set compared to YOLOv2
  • Ad-YOLO demonstrates excellent generalization ability compared to YOLOv2 in physical world attacks
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Nan Ji, YanFei Feng, Haidong Xie, Xueshuang Xiang, Naijin Liu

9 pages, 7 figures

Abstract: The security of object detection systems has attracted increasing attention, especially when facing adversarial patch attacks. Since patch attacks change the pixels in a restricted area on objects, they are easy to implement in the physical world, especially for attacking human detection systems. The existing defenses against patch attacks are mostly applied for image classification problems and have difficulty resisting human detection attacks. Towards this critical issue, we propose an efficient and effective plug-in defense component on the YOLO detection system, which we name Ad-YOLO. The main idea is to add a patch class on the YOLO architecture, which has a negligible inference increment. Thus, Ad-YOLO is expected to directly detect both the objects of interest and adversarial patches. To the best of our knowledge, our approach is the first defense strategy against human detection attacks. We investigate Ad-YOLO's performance on the YOLOv2 baseline. To improve the ability of Ad-YOLO to detect variety patches, we first use an adversarial training process to develop a patch dataset based on the Inria dataset, which we name Inria-Patch. Then, we train Ad-YOLO by a combination of Pascal VOC, Inria, and Inria-Patch datasets. With a slight drop of $0.70\%$ mAP on VOC 2007 test set, Ad-YOLO achieves $80.31\%$ AP of persons, which highly outperforms $33.93\%$ AP for YOLOv2 when facing white-box patch attacks. Furthermore, compared with YOLOv2, the results facing a physical-world attack are also included to demonstrate Ad-YOLO's excellent generalization ability.

Submitted to arXiv on 16 Mar. 2021

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

The license of the paper does not allow us to build upon its content and the AI assistant only knows about the paper metadata rather than the full article.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 2103.08860v1

This paper's license doesn't allow us to build upon its content and the summarizing process is here made with the paper's metadata rather than the article.

The security of object detection systems has become a major concern due to the rise of adversarial patch attacks. These attacks involve manipulating pixels in a specific area of an object, making them particularly effective against human detection systems. Existing defense mechanisms against patch attacks are primarily designed for image classification problems and struggle to defend against attacks on human detection systems. To address this issue, we propose a new defense strategy called Ad-YOLO, which is an efficient and effective plug-in component for the YOLO detection system. Ad-YOLO introduces a patch class into the YOLO architecture, allowing it to directly detect both objects of interest and adversarial patches with minimal impact on inference time. Our approach is the first defense strategy specifically targeted at human detection attacks. To evaluate the performance of Ad-YOLO, we conducted experiments using the YOLOv2 baseline. In order to improve Ad-YOLO's ability to detect various types of patches, we utilized an adversarial training process to create a patch dataset called Inria-Patch based on the Inria dataset. We then trained Ad-YOLO using a combination of Pascal VOC, Inria, and Inria-Patch datasets. The results demonstrate that Ad-YOLO outperforms YOLOv2 when facing white-box patch attacks, achieving an average precision (AP) of 80.31% for persons compared to 33.93% AP for YOLOv2 with only a slight drop of 0.70% mean average precision (mAP) on the VOC 2007 test set. Furthermore, we also evaluated Ad-YOLO's performance against physical world attacks to showcase its excellent generalization ability compared to YOLOv2. In conclusion, our proposed defense strategy - Ad-YOLO - effectively addresses the challenge posed by adversarial patch attacks in human detection systems by achieving superior performance compared to existing methods and demonstrating strong generalization capabilities.
Created on 25 Dec. 2023

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

The previous summary was created more than a year ago and can be re-run (if necessary) by clicking on the Run button below.

The license of this specific paper does not allow us to build upon its content and the summarizing tools will be run using the paper metadata rather than the full article. However, it still does a good job, and you can also try our tools on papers with more open licenses.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.