Defending Video Recognition Model against Adversarial Perturbations via Defense Patterns

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 3
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorLee, Hong Jooko
dc.contributor.authorRo, Yong Manko
dc.date.accessioned2024-07-29T12:00:08Z-
dc.date.available2024-07-29T12:00:08Z-
dc.date.created2023-12-04-
dc.date.issued2024-07-
dc.identifier.citationIEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.21, pp.4110 - 4121-
dc.identifier.issn1545-5971-
dc.identifier.urihttp://hdl.handle.net/10203/321170-
dc.description.abstractDeep Neural Networks (DNNs) have been widely successful in various domains, but they are vulnerable to adversarial attacks. Recent studies have also demonstrated that video recognition models are susceptible to adversarial perturbations, but the existing defense strategies in the image domain do not transfer well to the video domain due to the lack of considering temporal development and require a high computational cost for training video recognition models. This paper, first, investigates the temporal vulnerability of video recognition models by quantifying the effect of temporal perturbations on the model's performance. Based on these investigations, we propose Defense Patterns (DPs) that can effectively protect video recognition models by adding them to the input video frames. The DPs are generated on top of a pre-trained model, eliminating the need for retraining or fine-tuning, which significantly reduces the computational cost. Experimental results on two benchmark datasets and various action recognition models demonstrate the effectiveness of the proposed method in enhancing the robustness of video recognition models.-
dc.languageEnglish-
dc.publisherIEEE COMPUTER SOC-
dc.titleDefending Video Recognition Model against Adversarial Perturbations via Defense Patterns-
dc.typeArticle-
dc.identifier.scopusid2-s2.0-85181565941-
dc.type.rimsART-
dc.citation.volume21-
dc.citation.beginningpage4110-
dc.citation.endingpage4121-
dc.citation.publicationnameIEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING-
dc.identifier.doi10.1109/TDSC.2023.3346064-
dc.contributor.localauthorRo, Yong Man-
dc.description.isOpenAccessN-
dc.subject.keywordAuthorAdaptation models-
dc.subject.keywordAuthorPerturbation methods-
dc.subject.keywordAuthorPredictive models-
dc.subject.keywordAuthorrobust video recognition-
dc.subject.keywordAuthorTraining-
dc.subject.keywordAuthorvideo adversarial defense-
dc.subject.keywordAuthorAnalytical models-
dc.subject.keywordAuthorComputational modeling-
dc.subject.keywordAuthorDefense patterns-
dc.subject.keywordAuthorPattern recognition-
Appears in Collection
EE-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0