research-article
Open Access

Protecting Autonomous Cars from Phantom Attacks

Authors Info & Claims
Published:23 March 2023Publication History
Skip Abstract Section

Abstract

Enabling object detectors to better distinguish between real and fake objects in semi-autonomous and fully autonomous vehicles.

References

  1. Anker. 2019. Nebula Capsule; https://amzn.to/3XWDrgY.Google ScholarGoogle Scholar
  2. Arcos-Garcia, A., Alvarez-Garcia, J.A., and Soria-Morillo, L.M. Evaluation of deep neural networks for traffic sign detection systems. Neurocomputing 316 (2018), 332--344; http://bit.ly/3J8klQZ.Google ScholarGoogle ScholarCross RefCross Ref
  3. Bertozzi, M. and Broggi, A. GOLD: A parallel real-time stereo vision system for generic obstacle and lane detection. IEEE Transactions on Image Processing 7, 1 (1998), 62--81.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Brown, T.B. et al. Adversarial patch (2017); arXiv preprint arXiv:1712.09665.Google ScholarGoogle Scholar
  5. Carlini, N. and Wagner, D. Towards evaluating the robustness of neural networks. In 2017 IEEE Symp. on Security and Privacy, 39--57.Google ScholarGoogle Scholar
  6. Chen, P-Y. et al. EAD: Elastic-net attacks to deep neural networks via adversarial examples (2017); arXiv preprint arXiv:1709.04114.Google ScholarGoogle Scholar
  7. Chen, S-T., Cornelius, C., Martin, J., and Chau, D.H.P. Shapeshifter: Robust physical adversarial attack on Faster R-CNN object detector. In Joint European Conf. on Machine Learning and Knowledge Discovery in Databases, Springer (2018), 52--68.Google ScholarGoogle Scholar
  8. Dai, J., He, K., Li, Y., and Sun, J. R-FCN: Object detection via region-based fully convolutional networks. In Advances in Neural Information Processing Systems (2016), 379--387.Google ScholarGoogle Scholar
  9. De La Escalera, A., Moreno, L.E., Salichs, M.A., and Armingol, J.M. Road traffic sign detection and classification. IEEE Transactions on Industrial Electronics 44, 6 (1997), 848--859.Google ScholarGoogle ScholarCross RefCross Ref
  10. Eykholt, K. et al. Robust physical-world attacks on deep learning visual classification. In 2018 IEEE/CVF Conf. on Computer Vision and Pattern Recognition, 1625--1634; http://bit.ly/3WC075l.Google ScholarGoogle Scholar
  11. Farnebäck, G. Two-frame motion estimation based on polynomial expansion. In Scandinavian Conf. on Image Analysis, Springer (2003), 363--370.Google ScholarGoogle ScholarCross RefCross Ref
  12. Fayyad, J., Jaradat, M.A., Gruyer, D., and Najjaran, H. Deep learning sensor fusion for autonomous vehicle perception and localization: A review. Sensors 20, 15 (2020), 4220.Google ScholarGoogle ScholarCross RefCross Ref
  13. García-Martín, E. et al. Estimation of energy consumption in machine learning. J. Parallel and Distributed Computing 134 (2019), 75--88; https://bit.ly/3WFS8UL.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Goodfellow, I.J., Shlens, J., and Szegedy, C. Explaining and harnessing adversarial examples. (2014); arXiv preprint arXiv:1412.6572.Google ScholarGoogle Scholar
  15. He, K., Zhang, X., Ren, S., and Sun, J. Delving deep into rectifiers: Surpassing human-level performance on imagenet classification. In Proceedings of the IEEE Intern. Conf. on Computer Vision (2015), 1026--1034.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Howard, A.G. et al. Mobilenets: Efficient convolutional neural networks for mobile vision applications (2017); arXiv preprint arXiv:1704.04861.Google ScholarGoogle Scholar
  17. Huang, J. et al. Speed/accuracy trade-offs for modern convolutional object detectors. In Proceedings of the IEEE Conf. on Computer Vision and Pattern Recognition (2017), 7310--7311.Google ScholarGoogle Scholar
  18. Hwang, J-N. and Hu, Y-H. Handbook of Neural Network Signal Processing, CRC Press (2001).Google ScholarGoogle Scholar
  19. Ioffe, S. and Szegedy, C. Batch normalization: Accelerating deep network training by reducing internal covariate shift (2015); arXiv preprint arXiv:1502.03167.Google ScholarGoogle Scholar
  20. Jang, U., Wu, X., and Jha, S. Objective metrics and gradient descent algorithms for adversarial examples in machine learning. In Proceedings of the 33rd Annual Computer Security Applications Conf. (2017), 262--277.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Kurakin, A., Goodfellow, I., and Bengio, S. Adversarial examples in the physical world. (2016); arXiv preprint arXiv:1607.02533.Google ScholarGoogle Scholar
  22. Lee, T.B. Men hack electronic billboard, play porn on it. Ars Technica (October 1, 2019); http://bit.ly/3wvLoy4.Google ScholarGoogle Scholar
  23. Li, D., et al. Evaluating the energy efficiency of deep convolutional neural networks on CPUs and GPUs. In 2016 IEEE Intern. Confs. on Big Data and Cloud Computing; Social Computing and Networking; Sustainable Computing; and Communications. 477--484.Google ScholarGoogle Scholar
  24. Liu, W. et al. High-level semantic feature detection: A new perspective for pedestrian detection. In Proceedings of the IEEE/CVF Conf. on Computer Vision and Pattern Recognition (2019), 5187--5196.Google ScholarGoogle Scholar
  25. Moosavi-Dezfooli, S-M., Fawzi, A., Fawzi, O., and Frossard, P. Universal adversarial perturbations. In Proceedings of the IEEE Conf. on Computer Vision and Pattern Recognition (2017), 1765--1773.Google ScholarGoogle ScholarCross RefCross Ref
  26. Moosavi-Dezfooli, S-M., Fawzi, A., and Frossard, P. Deepfool: A simple and accurate method to fool deep neural networks. In Proceedings of the IEEE Conf. on Computer Vision and Pattern Recognition (2016), 2574--2582.Google ScholarGoogle ScholarCross RefCross Ref
  27. Morgulis, N., Kreines, A., Mendelowitz, S., and Weisglass, Y. Fooling a real car with adversarial traffic signs (2019); arXiv preprint arXiv:1907.00374.Google ScholarGoogle Scholar
  28. Nassi, B., Shams, J., Netanel, R.B., and Elovici, Y. bAdvertisement: Attacking advanced driver-assistance systems using print advertisements (2022); http://bit.ly/3YaCdPe.Google ScholarGoogle Scholar
  29. Nguyen, A., Yosinski, J., and Clune, J. Deep neural networks are easily fooled: High confidence predictions for unrecognizable images. In Proceedings of the IEEE Conf. on Computer Vision and Pattern Recognition (2015), 427--436.Google ScholarGoogle ScholarCross RefCross Ref
  30. Papernot, P. et al. The limitations of deep learning in adversarial settings. In 2016 IEEE European Symp. on Security and Privacy, 372--387.Google ScholarGoogle Scholar
  31. Ren, S., He, K., Girshick, R., and Sun, J. Faster R-CNN: Towards real-time object detection with region proposal networks. In IEEE Transactions on Pattern Analysis and Machine Intelligence 39, 6 (June 2017), 1137--1149.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Sitawarin, C. et al. Darts: Deceiving autonomous cars with toxic signs (2018); arXiv preprint arXiv:1802.06430.Google ScholarGoogle Scholar
  33. Song, D. et al. Physical adversarial examples for object detectors. USENIX Workshop on Offensive Technologies (2018).Google ScholarGoogle Scholar
  34. Strubell, E., Ganesh, A., and McCallum, A. Energy and policy considerations for deep learning in NLP (2019); arXiv preprint arXiv:1906.02243.Google ScholarGoogle Scholar
  35. Security tutorials: Hacking digital billboards; http://bit.ly/3HpuIx9.Google ScholarGoogle Scholar
  36. Wallace, R.S. et al. First results in robot road-following. In Proceedings of the 9th Intern. Joint Conf. on Artificial Intelligence 2, (August 1985), 1089--1095.Google ScholarGoogle Scholar
  37. Wilson, Z. Why Ben Fordham's face is confusing cars in Sydney traffic. Radio Today (September 30, 2020); http://bit.ly/3JA0YAE.Google ScholarGoogle Scholar
  38. Xu, K. et al. Adversarial T-shirt! Evading person detectors in a physical world (2019); http://bit.ly/3YekxSX.Google ScholarGoogle Scholar
  39. Zhao, L. and Thorpe, C.E. Stereo- and neural network-based pedestrian detection. IEEE Transactions on Intelligent Transportation Systems 1, 3 (2000), 148--154.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Zhao, Y. et al. Seeing isn't believing: Towards more robust adversarial attack against real world object detectors. In Proceedings of the 2019 ACM SIGSAC Conf. on Computer and Communications Security, 1989--2004 Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Protecting Autonomous Cars from Phantom Attacks

                              Comments

                              Login options

                              Check if you have access through your login credentials or your institution to get full access on this article.

                              Sign in

                              Full Access

                              • Published in

                                cover image Communications of the ACM
                                Communications of the ACM  Volume 66, Issue 4
                                April 2023
                                94 pages
                                ISSN:0001-0782
                                EISSN:1557-7317
                                DOI:10.1145/3589208
                                • Editor:
                                • James Larus
                                Issue’s Table of Contents

                                Copyright © 2023 ACM

                                Publisher

                                Association for Computing Machinery

                                New York, NY, United States

                                Publication History

                                • Published: 23 March 2023

                                Permissions

                                Request permissions about this article.

                                Request Permissions

                                Check for updates

                                Qualifiers

                                • research-article
                              • Article Metrics

                                • Downloads (Last 12 months)2,305
                                • Downloads (Last 6 weeks)2,305

                                Other Metrics

                              PDF Format

                              View or Download as a PDF file.

                              PDF

                              eReader

                              View online with eReader.

                              eReader

                              HTML Format

                              View this article in HTML Format .

                              View HTML Format
                              About Cookies On This Site

                              We use cookies to ensure that we give you the best experience on our website.

                              Learn more

                              Got it!