{"id":18,"date":"2023-12-12T21:28:39","date_gmt":"2023-12-12T21:28:39","guid":{"rendered":"https:\/\/sites.tntech.edu\/lcasl\/?page_id=18"},"modified":"2023-12-13T17:41:27","modified_gmt":"2023-12-13T17:41:27","slug":"cyber-attack-to-machine-learning-model","status":"publish","type":"page","link":"https:\/\/sites.tntech.edu\/lcasl\/cyber-attack-to-machine-learning-model\/","title":{"rendered":"Cyber Attack to Machine Learning Model"},"content":{"rendered":"\n<div style=\"height:var(--wp--preset--spacing--50)\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group alignwide has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<h3 class=\"wp-block-heading alignwide has-xx-large-font-size\" style=\"line-height:1.2\">Learning When to Use Adaptive Adversarial Image Perturbations Against Autonomous Vehicles<\/h3>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-global-padding is-layout-constrained wp-container-core-group-is-layout-0747478d wp-block-group-is-layout-constrained\" style=\"padding-top:var(--wp--preset--spacing--50);padding-right:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50);padding-left:var(--wp--preset--spacing--50)\">\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-ff4b9c61 wp-block-columns-is-layout-flex\" style=\"margin-top:0;margin-bottom:0\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>The deep neural network (DNN) models for object detection using camera images are widely adopted in autonomous vehicles. However, DNN models are shown to be susceptible to adversarial image perturbations. In the existing methods of generating the adversarial image perturbations, optimizations take each incoming image frame as the decision variable to generate an image perturbation. Therefore, given a new image, the typically computationally expensive optimization needs to start over as there is no learning between the independent optimizations. Very few approaches have been developed for attacking online image streams while considering the underlying physical dynamics of autonomous vehicles, their mission, and the environment. We propose a multi-level stochastic optimization framework that monitors an attacker&#8217;s capability of generating adversarial perturbations. Based on this capability level, a binary decision attack\/not attack is introduced to enhance the effectiveness of the attacker. We evaluate our proposed multi-level image attack framework using simulations for vision-guided autonomous vehicles and actual tests with a small indoor drone in an office environment. The results show our method&#8217;s capability to generate the image attack in real-time while monitoring when the attacker is proficient, given state estimates.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\">Choosing when to use the adversarial image perturbation.<\/h3>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"379\" src=\"https:\/\/sites.tntech.edu\/lcasl\/wp-content\/uploads\/sites\/163\/2023\/12\/fig1_right_attack_previous_work_with_sampling_rev4-1-1024x379.png\" alt=\"\" class=\"wp-image-23\" style=\"width:1272px;height:auto\" srcset=\"https:\/\/sites.tntech.edu\/lcasl\/wp-content\/uploads\/sites\/163\/2023\/12\/fig1_right_attack_previous_work_with_sampling_rev4-1-1024x379.png 1024w, https:\/\/sites.tntech.edu\/lcasl\/wp-content\/uploads\/sites\/163\/2023\/12\/fig1_right_attack_previous_work_with_sampling_rev4-1-300x111.png 300w, https:\/\/sites.tntech.edu\/lcasl\/wp-content\/uploads\/sites\/163\/2023\/12\/fig1_right_attack_previous_work_with_sampling_rev4-1-768x284.png 768w, https:\/\/sites.tntech.edu\/lcasl\/wp-content\/uploads\/sites\/163\/2023\/12\/fig1_right_attack_previous_work_with_sampling_rev4-1-1536x568.png 1536w, https:\/\/sites.tntech.edu\/lcasl\/wp-content\/uploads\/sites\/163\/2023\/12\/fig1_right_attack_previous_work_with_sampling_rev4-1.png 1760w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-video\"><video height=\"576\" style=\"aspect-ratio: 720 \/ 576;\" width=\"720\" controls src=\"https:\/\/sites.tntech.edu\/lcasl\/wp-content\/uploads\/sites\/163\/2023\/12\/Iros-Submission-0301-Final_MP4_Check.mp4\"><\/video><\/figure>\n\n\n\n<p><strong>Relevant Paper:<\/strong><\/p>\n\n\n\n<p>Yoon, Hyung-Jin, Hamidreza Jafarnejadsani, and Petros Voulgaris. &#8220;Learning When to Use Adaptive Adversarial Image Perturbations against Autonomous Vehicles.&#8221;&nbsp;<em>IEEE Robotics and Automation Letters<\/em>&nbsp;(2023).<\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Learning When to Use Adaptive Adversarial Image Perturbations Against Autonomous Vehicles The deep neural network (DNN) models for object detection using camera images are widely adopted in autonomous vehicles. However, DNN models are shown to be susceptible to adversarial image perturbations. In the existing methods of generating the adversarial image perturbations, optimizations take each incoming [&hellip;]<\/p>\n","protected":false},"author":184,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-18","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/sites.tntech.edu\/lcasl\/wp-json\/wp\/v2\/pages\/18","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.tntech.edu\/lcasl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.tntech.edu\/lcasl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.tntech.edu\/lcasl\/wp-json\/wp\/v2\/users\/184"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.tntech.edu\/lcasl\/wp-json\/wp\/v2\/comments?post=18"}],"version-history":[{"count":8,"href":"https:\/\/sites.tntech.edu\/lcasl\/wp-json\/wp\/v2\/pages\/18\/revisions"}],"predecessor-version":[{"id":74,"href":"https:\/\/sites.tntech.edu\/lcasl\/wp-json\/wp\/v2\/pages\/18\/revisions\/74"}],"wp:attachment":[{"href":"https:\/\/sites.tntech.edu\/lcasl\/wp-json\/wp\/v2\/media?parent=18"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}