Your browser doesn't support javascript.
loading
Blinding and blurring the multi-object tracker with adversarial perturbations.
Pang, Haibo; Ma, Rongqi; Su, Jie; Liu, Chengming; Gao, Yufei; Jin, Qun.
Affiliation
  • Pang H; School of Cyber Science and Engineering, Zhengzhou University, Zhengzhou City, 450003, China. Electronic address: hbpang@zzu.edu.cn.
  • Ma R; School of Cyber Science and Engineering, Zhengzhou University, Zhengzhou City, 450003, China. Electronic address: rongmiq@gmail.com.
  • Su J; School of Cyber Science and Engineering, Zhengzhou University, Zhengzhou City, 450003, China. Electronic address: sujie@gs.zzu.edu.cn.
  • Liu C; School of Cyber Science and Engineering, Zhengzhou University, Zhengzhou City, 450003, China. Electronic address: cmliu@zzu.edu.cn.
  • Gao Y; School of Cyber Science and Engineering, Zhengzhou University, Zhengzhou City, 450003, China. Electronic address: yfgao@zzu.edu.cn.
  • Jin Q; Waseda University, Tokorozawa, 359-1192, Japan. Electronic address: jin@waseda.jp.
Neural Netw ; 176: 106331, 2024 Aug.
Article in En | MEDLINE | ID: mdl-38701599
ABSTRACT
Adversarial attack reveals a potential imperfection in deep models that they are susceptible to being tricked by imperceptible perturbations added to images. Recent deep multi-object trackers combine the functionalities of detection and association, rendering attacks on either the detector or the association component an effective means of deception. Existing attacks focus on increasing the frequency of ID switching, which greatly damages tracking stability, but is not enough to make the tracker completely ineffective. To fully explore the potential of adversarial attacks, we propose Blind-Blur Attack (BBA), a novel attack method based on spatio-temporal motion information to fool multi-object trackers. Specifically, a simple but efficient perturbation generator is trained with the blind-blur loss, simultaneously making the target invisible to the tracker and letting the background be regarded as moving targets. We take TraDeS as our main research tracker, and verify our attack method on other excellent algorithms (i.e., CenterTrack, FairMOT, and ByteTrack) on MOT-Challenge benchmark datasets (i.e., MOT16, MOT17, and MOT20). BBA attack reduced the MOTA of TraDeS and ByteTrack from 69.1 and 80.3 to -238.1 and -357.0, respectively, indicating that it is an efficient method with a high degrees of transferability.
Subject(s)
Key words

Full text: 1 Collection: 01-internacional Database: MEDLINE Main subject: Algorithms Limits: Humans Language: En Journal: Neural Netw Journal subject: NEUROLOGIA Year: 2024 Document type: Article

Full text: 1 Collection: 01-internacional Database: MEDLINE Main subject: Algorithms Limits: Humans Language: En Journal: Neural Netw Journal subject: NEUROLOGIA Year: 2024 Document type: Article
...