Relevance attack on detectors

نویسندگان

چکیده

This paper focuses on high-transferable adversarial attacks detectors, which are hard to attack in a black-box manner, because of their multiple-output characteristics and the diversity across architectures. To pursue high transferability, one plausible way is find common property facilitates discovery weaknesses. We first suggest that relevance map from interpreters for detectors such property. Based it, we design Relevance Attack Detectors (RAD), achieves state-of-the-art exceeding existing results by above 20%. On MS COCO, detection mAPs all 8 architectures more than halved segmentation also significantly influenced. Given great transferability RAD, generate dataset object instance segmentation, i.e., Adversarial Objects COntext (AOCO), helps quickly evaluate improve robustness detectors.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enhanced Flush+Reload Attack on AES

In cloud computing, multiple users can share the same physical machine that can potentially leak secret information, in particular when the memory de-duplication is enabled. Flush+Reload attack is a cache-based attack that makes use of resource sharing. T-table implementation of AES is commonly used in the crypto libraries like OpenSSL. Several Flush+Reload attacks on T-table implementat...

متن کامل

On Accrual Failure Detectors

Traditionally, failure detectors have considered a binary model whereby a given process can be either trusted or suspected. This paper defines a family of failure detectors, called accrual failure detectors, that revisits this interaction model. Accrual failure detectors associate to each process a real value representing a suspicion level. An important advantage of accrual failure detectors ov...

متن کامل

Analysis of Ottoman Attack on Yemen: Reasons, Consequences and Results

The 10th century AH was very important for Muslim lands, including Yemen in the era of Taherian (858-945 AH), because during this time, Portugal as a colonist country, in order to have access to new maritime routes, to seize Muslim commercial centers, as well as monopoly of Indian medicine trade, was moving eastward, into Yemen. At the same time, the Ottoman Empire, which was one somehow the fl...

متن کامل

Query expansion based on relevance feedback and latent semantic analysis

Web search engines are one of the most popular tools on the Internet which are widely-used by expert and novice users. Constructing an adequate query which represents the best specification of users’ information need to the search engine is an important concern of web users. Query expansion is a way to reduce this concern and increase user satisfaction. In this paper, a new method of query expa...

متن کامل

Avicenna on the Angelological Relevance of Mystical Experience

Avicenna is a renowned peripatetic philosopher whose rationality continuously draws the attention of many scholars. In many of his works, he resorts to the hierarchy of intellects (angels) to explain the process of the emanation of the multiplicity from the One, as well as the emergence of beings. As these intellects are among the ontological causes of the human soul in the arc of descent, they...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Pattern Recognition

سال: 2022

ISSN: ['1873-5142', '0031-3203']

DOI: https://doi.org/10.1016/j.patcog.2021.108491