DC Field | Value | Language |
---|---|---|
dc.contributor.author | Heo, Hwan | ko |
dc.contributor.author | Ko, Dohwan | ko |
dc.contributor.author | Lee, Jaewon | ko |
dc.contributor.author | Hong, Youngjoon | ko |
dc.contributor.author | Kim, Hyunwoo J. | ko |
dc.date.accessioned | 2023-08-03T01:00:51Z | - |
dc.date.available | 2023-08-03T01:00:51Z | - |
dc.date.created | 2023-08-03 | - |
dc.date.issued | 2021 | - |
dc.identifier.citation | IEEE ACCESS, v.9, pp.146938 - 146947 | - |
dc.identifier.issn | 2169-3536 | - |
dc.identifier.uri | http://hdl.handle.net/10203/311018 | - |
dc.description.abstract | Modern neural networks are known to be vulnerable to adversarial attacks in various domains. Although most attack methods usually densely change the input values, recent works have shown that deep neural networks (DNNs) are also vulnerable to sparse perturbations. Spatially sparse attacks on images or frames of a video are proven effective but the temporally sparse perturbations on videos have been less explored. In this paper, we present a novel framework to generate a temporally sparse adversarial attack, called Search-and-Attack scheme, on videos. The Search-and-Attack scheme first retrieves the most vulnerable frames and then attacks only those frames. Since identifying the most vulnerable set of frames involves an expensive combinatorial optimization problem, we introduce alternative definitions or surrogate objective functions: Magnitude of the Gradients (MoG) and Frame-wise Robustness Intensity (FRI). Combining them with iterative search schemes, extensive experiments on three public benchmark datasets (UCF, HMDB, and Kinetics) show that the proposed method achieves comparable performance to state-of-the-art dense attack methods. | - |
dc.language | English | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.title | Search-and-Attack: Temporally Sparse Adversarial Perturbations on Videos | - |
dc.type | Article | - |
dc.identifier.wosid | 000714709300001 | - |
dc.identifier.scopusid | 2-s2.0-85118542355 | - |
dc.type.rims | ART | - |
dc.citation.volume | 9 | - |
dc.citation.beginningpage | 146938 | - |
dc.citation.endingpage | 146947 | - |
dc.citation.publicationname | IEEE ACCESS | - |
dc.identifier.doi | 10.1109/ACCESS.2021.3124050 | - |
dc.contributor.localauthor | Hong, Youngjoon | - |
dc.contributor.nonIdAuthor | Heo, Hwan | - |
dc.contributor.nonIdAuthor | Ko, Dohwan | - |
dc.contributor.nonIdAuthor | Lee, Jaewon | - |
dc.contributor.nonIdAuthor | Kim, Hyunwoo J. | - |
dc.description.isOpenAccess | N | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | Perturbation methods | - |
dc.subject.keywordAuthor | Search problems | - |
dc.subject.keywordAuthor | Linear programming | - |
dc.subject.keywordAuthor | Three-dimensional displays | - |
dc.subject.keywordAuthor | Solid modeling | - |
dc.subject.keywordAuthor | Neural networks | - |
dc.subject.keywordAuthor | Convolution | - |
dc.subject.keywordAuthor | Action recognition | - |
dc.subject.keywordAuthor | video classification | - |
dc.subject.keywordAuthor | adversarial attack | - |
dc.subject.keywordAuthor | sparse adversarial attack | - |
dc.subject.keywordAuthor | safe AI | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.