Movatterモバイル変換


[0]ホーム

URL:


CN112884802A - A Generative Adversarial Attack Method - Google Patents

A Generative Adversarial Attack Method
Download PDF

Info

Publication number
CN112884802A
CN112884802ACN202110204784.XACN202110204784ACN112884802ACN 112884802 ACN112884802 ACN 112884802ACN 202110204784 ACN202110204784 ACN 202110204784ACN 112884802 ACN112884802 ACN 112884802A
Authority
CN
China
Prior art keywords
template
similarity
distribution
point
tracking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110204784.XA
Other languages
Chinese (zh)
Other versions
CN112884802B (en
Inventor
王正奕
廖勇
成日冉
周惠
蔡木目心
王旭鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of ChinafiledCriticalUniversity of Electronic Science and Technology of China
Priority to CN202110204784.XApriorityCriticalpatent/CN112884802B/en
Publication of CN112884802ApublicationCriticalpatent/CN112884802A/en
Application grantedgrantedCritical
Publication of CN112884802BpublicationCriticalpatent/CN112884802B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Landscapes

Abstract

The invention discloses a method for resisting attack based on generation, which comprises the following steps: calculating similarity encoding data of a tracking template and a seed point set of a search area, and fusing the features extracted from the tracking template and the similarity encoding data to obtain enhanced features; inputting the added features into a binomial distribution coding layer, wherein the binomial distribution coding layer learns a Bernoulli distribution for each point to describe the filtering state of the point; the antagonistic template was obtained by distillation using the filtration state. The invention adopts the similarity coding mode and the similarity coding and tracking template fusion mode to extract the characteristics, and has the advantages that: the counterattack method can quickly calculate the potential similarity between the template and the search area, effectively encode the countersample, and filter the generated countersample through the points, so that a data hole which is easy to generate when the real world acquires 3D data is simulated, and the counterattack method has the characteristic of being difficult to perceive.

Description

Anti-attack method based on generation
Technical Field
The invention relates to the field of target tracking counterattack, in particular to a generation-based counterattack method.
Background
Despite the considerable research efforts already in autonomous driving and intelligent surveillance systems, the task of 3D object tracking is of considerable interest. Although there have been many breakthrough developments in the field of 3D object tracking, the research on its dependency is not much compared to 2D object tracking. Existing studies have shown that depth models are vulnerable to carefully generated challenge samples that are aggressive. Since 3D object tracking plays a very important role in many security-oriented areas, it is highly desirable to evaluate the robustness of 3D tracking models.
The main object of fighting attacks against 3D models in the early days is the classifier. Since this attack is attached to the point cloud of the victim, the method of attack is mainly divided into point perturbation and point drop. The counterattack of point perturbation is typically performed by moving the points locally under the constraint of regularization by L2 to generate the countersamples. These methods generate sample-level attacks, but they are inherently a time-consuming optimization problem and therefore cannot be applied to some scenes with real-time requirements. Some attack methods based on the generation network are gradually proposed, such as an attack method which confuses the classifier through label guidance, and an attack method which focuses on attack transferability. On the other hand, the method simulates the occlusion condition of the point cloud data acquired by the 3D sensor or the inherent defect of the point cloud data to generate a countersample by point discarding, and the method is also effective in attacking the depth model. The method of finding salient points by calculating the degree of contribution of each point in the point cloud is largely applied to combat attacks. The depth neural network can be effectively deceived by counting the robustness of each point in the depth model and generating the significant occlusion by using an iterative method.
There are also studies on 3D target detection to combat attacks. The first attack on radar target detection is an attack that combines optimization methods with global sampling. In addition, a unified attack method can confuse a 3D target detection algorithm, and has advantages in the aspect of physical cognition in an automatic driving scene. In addition, the radar point cloud shielding attack method based on observation can also cause the instability of the 3D target detector.
In the prior art, the method of directly calculating the point contribution to perform point filtering is usually based on an optimization method, which is time-consuming. In addition, point filtering is realized by adopting a differentiable form to fit Bernoulli distribution, and if a Sigmoid function is used for describing a missing point state, the missing point state is insufficiently distributed between 0 and 1, most of the missing point state is between the two states, and the missing point cannot be well described.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provide a generation-based anti-attack method.
The purpose of the invention is realized by the following technical scheme: a method for countering attacks based on generation, comprising the steps of:
calculating similarity encoding data of a tracking template and a seed point set of a search area, and fusing the features extracted from the tracking template and the similarity encoding data to obtain enhanced features;
inputting the added features into a binomial distribution coding layer, wherein the binomial distribution coding layer learns a Bernoulli distribution for each point to describe the filtering state of the point; the antagonistic template was obtained by distillation using the filtration state.
Further, the calculating the similarity encoding data of the tracking template and the seed point set of the search area includes:
respectively extracting a first seed point set of a tracking template and a second seed point set of a search area by utilizing a downsampling mode;
and taking the cosine distances of the first seed point set and the second seed point set obtained by calculation as potential similarity coding data.
Further, the cosine distance is convolved and symmetrical to be used as potential similarity encoding data.
Further, the fusing the features extracted from the tracking template and the similarity encoding data to obtain enhanced features includes:
the first seed point set is up-sampled to obtain potential features of the tracking template;
and splicing and fusing the potential features and the similarity coding data which are repeatedly calculated for many times to obtain enhanced features.
Further, the method further comprises:
using the potential similarity encoding data as the feature loss LfeatTo distinguish the tracking template from the search space in a potential feature space:
Figure BDA0002949928250000021
where Sim' represents the potential similarity encoding data of the tracking template and the search space, d2The dimension of the similarity code is represented, and i represents the serial number of the point.
Further, the two-term distribution coding layer learns a bernoulli distribution for each point to describe the filtering state of the point, and comprises:
and carrying out point filtering by using the stretched binary contrast distribution, wherein the interval range of the binary contrast distribution is (gamma, zeta) interval, gamma is less than 0, and zeta is more than 1, and attaching the filtering state to each point of the tracking template.
Further, the inputting of the added feature to the point filtering implemented by using the stretched binary contract distribution and attaching the filtering status to each point of the tracking template includes:
given aA random variable s follows a binary coherent distribution phi in the (0, 1) interval and may be represented by qs(s | φ) as the probability density, Q, of the distributions(s | φ) as its cumulative probability; the binary sphere distribution phi is represented by the parameter phi ═ (log alpha, beta), where log alpha represents position and beta represents temperature; the binary constellation distribution is re-parameterized by a random variable U-U (0, 1) that follows a uniform distribution, and is expressed as:
s=Sigmoid((log u-log(1-u)+logα)/β)
stretching the binary secret distribution to a (gamma, zeta) interval, wherein gamma is less than 0 and zeta is more than 1, and then cutting the binary secret distribution by using hard-sigmoid to obtain a hard-secret distribution:
Figure BDA0002949928250000031
Figure BDA0002949928250000032
wherein z represents a filtration state, zi∈{0,1};
The obtaining of the antagonistic template by using the filtration state distillation comprises the following steps:
filtration state ziThe 0 spots were filtered out by a filter, generating the antagonistic template.
Further, the method further comprises:
by means of L0Regularization as a filtering loss function; where the L0 regularization is defined as the cumulative probability that the hard-con crete distribution is at greater than zero:
Figure BDA0002949928250000033
further, the method further comprises:
generating a plurality of proposals by using the adversity template and corresponding probability scores thereof as candidate regions of the target position; the proposal with the highest probability score will be selected as the final prediction.
Further, the method further comprises:
using a localization loss function LlocSimultaneously decreasing the score of all proposals aggregated into a group is defined as:
Figure BDA0002949928250000034
in the formula, R represents the proposals sorted by score, and p, q, and R each represent a range of subscripts of the proposals aggregated into a group.
Further, the method further comprises:
using L2 distance as perceptual loss function LpercThe changes used to constrain the data are defined as:
Figure BDA0002949928250000035
in the formula (I), the compound is shown in the specification,
Figure BDA0002949928250000036
representing the antagonistic template, PtmpA tracking template is represented that is,
Figure BDA0002949928250000037
points representing antagonistic templates, xiRepresenting points of the tracking template.
The invention has the beneficial effects that:
(1) in an exemplary embodiment of the present invention, the feature extraction is performed by using a similarity coding method and a similarity coding and tracking template fusion method, which have the following advantages: advantages of the similarity coding approach: the template and the search space can be distinguished in the feature space, and the template and the search space are further distinguished in the abstract space; the similarity coding and tracking template fusion mode has the advantages that: embedding the similarity codes as potential features into a tracking template, and enhancing the features of the tracking template; thirdly, point filtering is realized by adopting a differentiable form to fit a bernoulli distribution (namely, the bernoulli distribution for learning the discarding probability of each point is used for describing the filtering state of the point), and the method has the advantages that: the neural network can be used for learning in a gradient descent method, and the Bernoulli distribution is adopted, so that the simulation of point filtering is more appropriate. By adding the similarity coding as an enhanced feature into the learning of the neural network, the potential feature space can be better excavated.
(2) In another exemplary embodiment of the present invention, the similarity calculation repeated M times is implemented and fused, and the effect is that: features of the template can be enhanced and differences in feature space between the template and the search area mined.
(3) In yet another exemplary embodiment of the present invention, for the similarity data, due to the permutation invariance of the point cloud, a symmetric function is further used, ensuring the output of the same similarity under different point sequences.
(4) In yet another exemplary embodiment of the present invention, various losses are used to improve the different effects.
Drawings
Fig. 1 is a flow chart of a method provided in an exemplary embodiment of the invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the accompanying drawings, and it should be understood that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present application. The word "if," as used herein, may be interpreted as "when or" responsive to a determination, "depending on the context.
In addition, the technical features involved in the different embodiments of the present invention described below may be combined with each other as long as they do not conflict with each other.
The background of the present exemplary embodiment is explained first: it is known to store a video sequence comprising N frames in the form of a point cloud
Figure BDA0002949928250000041
3D object tracking aims at locating a tracking template P in successive framestmp. Note that the template P is trackedtmpIs from the first frame s1Obtained from (i) Ptmp∈s1
In the prior art, the 3D tracker can generate a search region P in the current frame by expanding the range of the prediction result in the previous frameaeaAnd in the search area PaeaSome proposals and the probability scores corresponding to them are generated as candidates for the target location.
In the present exemplary embodiment, in the counterattack of the 3D target tracking, the 3D tracker needs to be disturbed, so that it predicts the result of the deviation from the real target position.
Thus: tracing template PtmpSearch region P representing a tracking target specified in the first frameareaIndicating the expanded area of the prediction result of the previous frame.
Referring to fig. 1, fig. 1 shows a method for resisting attacks based on generation, disclosed in an exemplary embodiment of the present application, including the following steps:
s11: feature extraction: calculating similarity encoding data of a tracking template and a seed point set of a search area, and fusing the features extracted from the tracking template and the similarity encoding data to obtain enhanced features;
s13: and (3) resisting distillation: inputting the added features into a binomial distribution coding layer, wherein the binomial distribution coding layer learns a Bernoulli distribution for each point to describe the filtering state of the point; the antagonistic template was obtained by distillation using the filtration state.
Specifically, in this exemplary embodiment, the proposed generation-based counter attack method flow is for a 3D tracker, as shown in fig. 1:
in step S11, a known inclusion M1Tracking template P of pointstmpAnd comprises M2Search region P of dotsareaTracing the template PtmpAnd search space PareaIs encoded into a description of the template features, i.e. similarity encoding data Sim' with dimension M1×(d1+d2) Wherein d is1Representing the number of features of the point after upsampling, d2Representing the number of dimensions of similarity coding; the template P will then be trackedtmpExtracted features
Figure BDA0002949928250000051
Fusing with similarity-encoded data Sim' to obtain enhanced features
Figure BDA0002949928250000052
Then in step S13, a binomial distribution coding layer is used to learn the primary effort distribution of each point drop probability for describing the filtering state of the point, thereby distilling an antagonistic template
Figure BDA0002949928250000053
Wherein, adopt the mode of similarity code and carry out the feature extraction with the mode of similarity code and the integration of tracking template, its advantage lies in respectively: (1) the advantages of the approach of similarity coding: the difference between the template and the search area in the feature space can be mined, and the template and the search area are coded; (2) the advantage of the way of fusing the similarity encoding with the tracking template: and taking the coded similarity as the characteristics of a search area of the potential space and the template, and performing characteristic enhancement on the template. Before the method is used, the original model accuracy can be reduced by 6.5% by the attack method, and after the method is adopted, the model accuracy can be reduced by 22.9%.
While point filtering is realized by fitting a bernoulli distribution in a differentiable form (i.e. a bernoulli distribution for learning the discarding probability of each point is used for describing the filtering state of the point), the advantages are that: the discrete filtering states can be described using a method that can be graded down to achieve the filtering operation.
Preferably, in an exemplary embodiment, the calculating the similarity encoding data of the tracking template and the seed point set of the search area includes:
s31: respectively extracting a first seed point set of a tracking template and a second seed point set of a search area by utilizing a downsampling mode;
s33: and taking the cosine distances of the first seed point set and the second seed point set obtained by calculation as potential similarity coding data.
Specifically, in step S31 of the exemplary embodiment, the downsampling manner may be implemented by PointNet + + (i.e., the backbone network in fig. 1), and the template P istmpAnd search region PareaAre respectively down-sampled to obtain S by a farthest point sampling algorithm1And S2A plurality of f epsilon R with multi-scale characteristicsnRespectively forming a first set of seed points Stmp(S1X n) and a second set of seed points sarea(S2×n)。
In step S33, for better feature extraction, a seed point set S is designed for calculationtmpAnd SareaCosine distance of
Figure BDA0002949928250000061
As a branch of the potential similarity data Sim'. The encoded potential similarity can effectively fuse the templates PtmpAnd search space Parea
Preferably, in an exemplary embodiment, the cosine distance is convolved and symmetric as the potential similarity encoding data.
It should be noted that, due to the invariance of point cloud replacement, a symmetric function is further used to ensure that the output with the same similarity is obtained under different point sequences
Figure BDA0002949928250000062
Preferably, in an exemplary embodiment, the fusing the features extracted from the tracking template and the similarity encoding data to obtain enhanced features includes:
s51: the first seed point set is up-sampled to obtain potential features of the tracking template;
s53: and splicing and fusing the potential features and the similarity coding data which are repeatedly calculated for many times to obtain enhanced features.
Specifically, in step S51, a first set of sub-points StmpIs up-sampled into
Figure BDA0002949928250000063
To generate potential features for each point in the original track template.
And in step S53, the potential feature P is obtainedtmpSplicing with the similarity repeated for M times can obtain the enhanced characteristics
Figure BDA0002949928250000064
It should be noted that repeating the similarity operation M times is realized by copying, so that the similarity is used as a feature of a point and spliced into a feature of each point.
Preferably, in an exemplary embodiment, the method further comprises:
will have potential similarityEncoding data as a characteristic loss LfeatTo distinguish the tracking template from the search space in a potential feature space:
Figure BDA0002949928250000071
where Sim' represents the potential similarity encoding data of the tracking template and the search space, d2Denotes the dimension of the similarity code, i denotes the index of the dimension.
I.e. taking the mean value of the similarity codes as the loss LfeatBy reducing this loss, the similarity between the search space and the target in the feature space can be reduced, and the two can be distinguished in the feature space.
Preferably, in an exemplary embodiment, the two-term distribution coding layer learns a bernoulli distribution for each point to describe a filtering state of the point, and the method includes:
and carrying out point filtering by using the stretched binary contrast distribution, wherein the interval range of the binary contrast distribution is (gamma, zeta) interval, gamma is less than 0, and zeta is more than 1, and attaching the filtering state to each point of the tracking template.
Specifically, in the exemplary embodiment, the point filtering module learns the probabilities that the various points are filtered out. A binomial distribution coding layer implements point filtering by a point-scale filter, which learns a Bernoulli distribution for each point to describe the filtering state of the point. In particular, the filtering state z of the point scaleiE {0, 1} is appended to each point of the tracking template, and can be expressed as
Figure BDA0002949928250000072
Filtration state ziThose points that are 0 are filtered out by the filter, thereby generating the antagonistic template
Figure BDA0002949928250000073
But it is not insignificant due to the discontinuities in the bernoulli distribution. Thus, a Binary Concrete distribution is used, which is a P-Bo distributionA smooth simulation of the Knoop distribution, and it is continuously differentiable. Meanwhile, in order to ensure that the point filtering module can effectively filter points, the value of the point filtering module needs to be determined to be 0 or 1, so the binary constant distribution is extended to the (gamma, zeta) interval, wherein gamma is less than 0 and zeta is more than 1.
Preferably, in an exemplary embodiment, the inputting of the added feature to the point filtering with the stretched binary concrete distribution and attaching the filtering status to each point of the tracking template includes:
s71: the Binary Concrete distribution is a smooth simulation of the Bernoulli distribution, and it is continuously differentiable; given a random variable s, lying within the (0, 1) interval, following a binary coherent distribution, and may be represented by qs(s | φ) as the probability density, Q, of the distributions(s | φ) as its cumulative probability; the binary sphere distribution phi is represented by the parameter phi ═ (log alpha, beta), where log alpha represents position and beta represents temperature; the binary constellation distribution is re-parameterized by a random variable U-U (0, 1) that follows a uniform distribution, and is expressed as:
s=Sigmoid((log u-log(1-u)+logα)/β)
s73: in order to ensure that the point filtering module can effectively filter points, the value of the point filtering module needs to be determined as 0 or 1, the binary secret distribution is stretched to a (gamma, zeta) interval, wherein gamma is less than 0 and zeta is more than 1, and then the cut-off processing is carried out on the binary secret distribution by using hard-sigmoid to obtain the hard-secret distribution:
Figure BDA0002949928250000081
Figure BDA0002949928250000082
wherein z represents a filtration state, zi∈{0,1};
The obtaining of the antagonistic template by using the filtration state distillation comprises the following steps:
filtration state ziThe 0 spots are filtered out by a filter to generate an antagonistic template。
Preferably, in an exemplary embodiment, since L0Regularization does not result in a collapse of the filter state values, so it is used to penalize the binomial distribution encoding layer. Binomial distribution coding layer L0The regularization is constrained to minimize the number of points filtered out. Thus, the method further comprises:
by means of L0Regularization as a filtering loss function; where the L0 regularization is defined as the cumulative probability that the hard-con crete distribution is at greater than zero:
Figure BDA0002949928250000083
the cumulative probability greater than the zero point is "probability not equal to 0", that is, the probability that the filtering state is 1, and the number of points to be filtered is controlled by this probability.
More preferably, in an exemplary embodiment, as shown in fig. 1, the method further comprises:
generating a plurality of proposals by using the adversity template and corresponding probability scores thereof as candidate regions of the target position; the proposal with the highest probability score will be selected as the final prediction.
In addition, the search region P is searchedareaAnd antagonistic template PtmpThe method comprises the steps of inputting the data into a Victim depth Model (Vistim Deep Model) to obtain a plurality of proposals, and selecting the proposal with the highest score by the Victim depth Model to serve as a prediction result of a current frame so as to realize target tracking.
Preferably, in an exemplary embodiment, the tracker predicts some proposals and their corresponding probability scores, and the proposal with the highest probability score is selected as the final prediction result as the candidate region of the target position. However, the positions of other proposals with higher scores are closer to the real position, so that the prediction results of the proposals are more accurate. Thus using the localization loss function LlocThe proposal scores in the specified range can be accumulated to form a group,enabling it to simultaneously reduce the scores of all proposals aggregated into a group, thereby simultaneously reducing the scores of the better proposals, is defined as:
Figure BDA0002949928250000084
in the formula, R represents the proposals sorted by score, and p, q, and R each represent a range of subscripts of the proposals aggregated into a group.
Preferably, in an exemplary embodiment, the method further comprises:
for the attack effect not to be perceptible to the human eye, the L2 distance is used as a perception loss function LpecThe changes used to constrain the data are defined as:
Figure BDA0002949928250000091
in the formula (I), the compound is shown in the specification,
Figure BDA0002949928250000092
representing the antagonistic template, PtmpA tracking template is represented that is,
Figure BDA0002949928250000093
points representing antagonistic templates, xiRepresenting points of the tracking template.
Summarizing all of the exemplary embodiments, the target loss function can be expressed as:
L=Lfeat+a*Lloc+b*L0+c*Lperc
where a, b, c are hyper-parameters, used to balance the terms in the loss function.
Based on any one of the above exemplary embodiments, an exemplary embodiment of the present invention provides a storage medium having stored thereon computer instructions that, when executed, perform the steps of the method for countering an attack based on generation.
Based on any one of the above exemplary embodiments, an exemplary embodiment of the present invention provides a terminal, which includes a memory and a processor, where the memory stores computer instructions executable on the processor, and the processor executes the computer instructions to perform the steps of the anti-attack method based on generation.
Based on such understanding, the technical solutions of the present embodiments may be essentially implemented or make a contribution to the prior art, or may be implemented in the form of a software product stored in a storage medium and including several instructions for causing an apparatus to execute all or part of the steps of the methods according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
It is to be understood that the above-described embodiments are illustrative only and not restrictive of the broad invention, and that various other modifications and changes in light thereof will be suggested to persons skilled in the art based upon the above teachings. And are neither required nor exhaustive of all embodiments. And obvious variations or modifications of the invention may be made without departing from the spirit or scope of the invention.

Claims (10)

Translated fromChinese
1.一种基于生成的对抗攻击方法,其特征在于:包括以下步骤:1. a method of confrontation attack based on generation, is characterized in that: comprise the following steps:计算跟踪模板和搜索区域的种子点集的相似度编码数据,将从跟踪模板提取的特征和所述相似度编码数据进行融合得到增强特征;Calculate the similarity coding data of the tracking template and the seed point set of the search area, and fuse the features extracted from the tracking template and the similarity coding data to obtain enhanced features;将所述增加特征输入至二项分布编码层,所述二项分布编码层为每个点学习出一个伯努利分布用于描述点的过滤状态;利用过滤状态蒸馏得到对抗性模板。The added feature is input to the binomial distribution coding layer, and the binomial distribution coding layer learns a Bernoulli distribution for each point to describe the filter state of the point; the adversarial template is obtained by distillation of the filter state.2.根据权利要求1所述的一种基于生成的对抗攻击方法,其特征在于:所述计算跟踪模板和搜索区域的种子点集的相似度编码数据,包括:2. a kind of generation-based adversarial attack method according to claim 1, is characterized in that: the similarity coding data of the seed point set of described calculation tracking template and search area, comprises:利用下采样的方式分别提取跟踪模板的第一种子点集和搜索区域的第二种子点集;Extract the first seed point set of the tracking template and the second seed point set of the search area by means of downsampling;以计算得到的第一种子点集和第二种子点集的余弦距离,作为潜在相似度编码数据。The calculated cosine distance between the first seed point set and the second seed point set is used as the encoded data of potential similarity.3.根据权利要求2所述的一种基于生成的对抗攻击方法,其特征在于:所述将从跟踪模板提取的特征和所述相似度编码数据进行融合得到增强特征,包括:3. a kind of generation-based confrontation attack method according to claim 2, is characterized in that: described from the feature extracted from the tracking template and described similarity coding data are fused to obtain enhanced features, comprising:将第一种子点集进行上采样,得到跟踪模板的潜在特征;Upsampling the first seed point set to obtain the latent features of the tracking template;将所述潜在特征与重复了多次计算的相似度编码数据进行拼接融合,得到增强特征。The latent features are spliced and fused with similarity encoded data that has been repeatedly calculated to obtain enhanced features.4.根据权利要求2所述的一种基于生成的对抗攻击方法,其特征在于:所述方法还包括:4. A generation-based adversarial attack method according to claim 2, wherein the method further comprises:将潜在相似度编码数据作为特征损失Lfeat,以在一个潜在的特征空间中区分跟踪模板和搜索空间:The latent similarity encoded data is used as a feature loss Lfeat to distinguish the tracking template from the search space in a latent feature space:
Figure FDA0002949928240000011
Figure FDA0002949928240000011
式中,Sim′表示跟踪模板和搜索空间的潜在相似度编码数据,d2表示相似度编码的维度,i表示维度的下标。In the formula, Sim′ represents the latent similarity coding data of the tracking template and the search space, d2 represents the dimension of the similarity coding, and i represents the subscript of the dimension.5.根据权利要求1所述的一种基于生成的对抗攻击方法,其特征在于:所述二项分布编码层为每个点学习出一个伯努利分布用于描述点的过滤状态,包括:5. A kind of generation-based adversarial attack method according to claim 1, is characterized in that: described binomial distribution coding layer learns a Bernoulli distribution for each point to describe the filtering state of the point, including:利用拉伸过后的binary concrete分布实现点过滤并将过滤状态附在跟踪模板的每个点上,所述binary concrete分布的区间范围为(γ,ζ)区间,其中γ<0且ζ>1。The stretched binary concrete distribution is used to realize point filtering and attach the filtering state to each point of the tracking template. The interval range of the binary concrete distribution is the (γ, ζ) interval, where γ<0 and ζ>1.6.根据权利要求5所述的一种基于生成的对抗攻击方法,其特征在于:所述所述增加特征输入至利用拉伸过后的binary concrete分布实现点过滤,并将过滤状态附在跟踪模板的每个点上,包括:6 . The generation-based adversarial attack method according to claim 5 , wherein the added feature input is used to realize point filtering using the stretched binary concrete distribution, and the filtering state is attached to the tracking template. 7 . at each point, including:给定一个随机变量s服从binary concrete分布φ位于(0,1)区间内,且可以用qs(s|φ)作为该分布的概率密度,Qs(s|φ)作为其累积概率;所述binary concrete分布φ用参数φ=(logα,β(表示,其中logα表示位置,β表示温度;所述binary concrete分布用一个服从均匀分布的随机变量u~U(0,1)来重参数化,表示为:Given that a random variable s obeys a binary concrete distribution φ in the interval (0, 1), and can use qs (s|φ) as the probability density of the distribution, and Qs (s|φ) as its cumulative probability; The binary concrete distribution φ is represented by the parameter φ=(logα, β(, where logα represents the position and β represents the temperature; the binary concrete distribution is re-parameterized with a random variable u~U(0, 1) that obeys a uniform distribution. ,Expressed as:s=Sigmoid((logu-log(1-u)+logα)/β)s=Sigmoid((log-log(1-u)+logα)/β)将binary concrete分布拉伸至(γ,ζ)区间,其中γ<0且ζ>1,再使用hard-sigmoid对其进行截断处理得到hard-concrete分布:Stretch the binary concrete distribution to the (γ,ζ) interval, where γ<0 and ζ>1, and then use hard-sigmoid to truncate it to obtain the hard-concrete distribution:
Figure FDA0002949928240000021
Figure FDA0002949928240000021
Figure FDA0002949928240000022
Figure FDA0002949928240000022
式中,z表示过滤状态,zi∈{0,1};In the formula, z represents the filtering state,zi ∈ {0, 1};所述利用过滤状态蒸馏得到对抗性模板包括:The adversarial template obtained by the filtered state distillation includes:过滤状态zi=0的点被过滤器过滤掉,生成对抗性模板。Points with filtered statezi = 0 are filtered out by the filter, generating an adversarial template.
7.根据权利要求6所述的一种基于生成的对抗攻击方法,其特征在于:所述方法还包括:7. A generation-based adversarial attack method according to claim 6, characterized in that: the method further comprises:利用L0正则化,作为过滤损失函数;其中,L0正则化被定义为hard-concrete分布在大于零点的累积概率:UseL0 regularization as the filter loss function; where L0 regularization is defined as the cumulative probability of a hard-concrete distribution greater than zero:
Figure FDA0002949928240000023
Figure FDA0002949928240000023
8.根据权利要求1所述的一种基于生成的对抗攻击方法,其特征在于:所述方法还包括:8. A generation-based adversarial attack method according to claim 1, wherein the method further comprises:利用所述对抗性模板生成多个提案,和它们对应的概率得分,作为目标位置的候选区域;具有最高概率得分的提案会被选择作为最终的预测结果。Multiple proposals are generated using the adversarial template, and their corresponding probability scores are used as candidate regions for the target location; the proposal with the highest probability score will be selected as the final prediction result.9.根据权利要求8所述的一种基于生成的对抗攻击方法,其特征在于:所述方法还包括:9. A generation-based adversarial attack method according to claim 8, wherein the method further comprises:利用定位损失函数Lloc,同时降低被聚合成一个组的所有提案的得分,被定义为:Using the localization loss function Lloc , while reducing the score of all proposals aggregated into a group, is defined as:
Figure FDA0002949928240000024
Figure FDA0002949928240000024
式中,R表示按照得分排序后的提案,p、q、r分别表示被聚合成组的提案的下标范围。In the formula, R represents the proposals sorted by score, and p, q, and r represent the subscript ranges of the proposals aggregated into groups, respectively.
10.根据权利要求1所述的一种基于生成的对抗攻击方法,其特征在于:所述方法还包括:10. A generation-based adversarial attack method according to claim 1, wherein the method further comprises:利用L2距离作为感知损失函数Lperc,被用来约束数据的改变,被定义为:Using the L2 distance as the perceptual loss functionLperc , which is used to constrain the change of the data, is defined as:
Figure FDA0002949928240000025
Figure FDA0002949928240000025
式中,
Figure FDA0002949928240000026
表示对抗性模板,Ptmp表示跟踪模板,
Figure FDA0002949928240000027
表示对抗性模板的点,xi表示跟踪模板的点。
In the formula,
Figure FDA0002949928240000026
represents the adversarial template, Ptmp represents the tracking template,
Figure FDA0002949928240000027
are the points representing the adversarial template, and xi are the points that are tracking the template.
CN202110204784.XA2021-02-242021-02-24Attack resistance method based on generationActiveCN112884802B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202110204784.XACN112884802B (en)2021-02-242021-02-24Attack resistance method based on generation

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202110204784.XACN112884802B (en)2021-02-242021-02-24Attack resistance method based on generation

Publications (2)

Publication NumberPublication Date
CN112884802Atrue CN112884802A (en)2021-06-01
CN112884802B CN112884802B (en)2023-05-12

Family

ID=76054226

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202110204784.XAActiveCN112884802B (en)2021-02-242021-02-24Attack resistance method based on generation

Country Status (1)

CountryLink
CN (1)CN112884802B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN113610904A (en)*2021-07-192021-11-05广州大学Method, system, computer and medium for generating three-dimensional (3D) local point cloud countermeasure sample
CN113808165A (en)*2021-09-142021-12-17电子科技大学 Point perturbation adversarial attack method for 3D target tracking model
CN115115905A (en)*2022-06-132022-09-27苏州大学High-mobility image countermeasure sample generation method based on generation model
CN117540441A (en)*2024-01-102024-02-09北京国旺盛源智能终端科技有限公司Transaction data secure storage method for hall type cloud terminal

Citations (17)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN104794733A (en)*2014-01-202015-07-22株式会社理光Object tracking method and device
CN108510056A (en)*2017-02-272018-09-07顾泽苍A kind of method that ultra-deep confrontation learns online image recognition
CN109766830A (en)*2019-01-092019-05-17深圳市芯鹏智能信息有限公司A kind of ship seakeeping system and method based on artificial intelligence image procossing
WO2019245186A1 (en)*2018-06-192019-12-26삼성전자주식회사Electronic device and control method thereof
CN110647918A (en)*2019-08-262020-01-03浙江工业大学 Mimic Defense Method for Adversarial Attacks of Deep Learning Models
CN110969637A (en)*2019-12-022020-04-07深圳市唯特视科技有限公司Multi-threat target reconstruction and situation awareness method based on generation countermeasure network
CN110991299A (en)*2019-11-272020-04-10中新国际联合研究院 An Adversarial Sample Generation Method for Face Recognition System in Physical Domain
CN111080659A (en)*2019-12-192020-04-28哈尔滨工业大学Environmental semantic perception method based on visual information
CN111627044A (en)*2020-04-262020-09-04上海交通大学Target tracking attack and defense method based on deep network
WO2020181391A1 (en)*2019-03-142020-09-17Element Ai Inc.Articles for disrupting automated visual object tracking processes
CN111696136A (en)*2020-06-092020-09-22电子科技大学Target tracking method based on coding and decoding structure
US20200327680A1 (en)*2019-04-122020-10-15Beijing Moviebook Science and Technology Co., Ltd.Visual target tracking method and apparatus based on deep adversarial training
CN111860248A (en)*2020-07-082020-10-30上海蠡图信息科技有限公司Visual target tracking method based on twin gradual attention-guided fusion network
US20200380274A1 (en)*2019-06-032020-12-03Nvidia CorporationMulti-object tracking using correlation filters in video analytics applications
CN112150513A (en)*2020-09-272020-12-29中国人民解放军海军工程大学Target tracking algorithm based on sparse identification minimum spanning tree
CN112233147A (en)*2020-12-212021-01-15江苏移动信息系统集成有限公司Video moving target tracking method and device based on two-way twin network
CN112365582A (en)*2020-11-172021-02-12电子科技大学Countermeasure point cloud generation method, storage medium and terminal

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN104794733A (en)*2014-01-202015-07-22株式会社理光Object tracking method and device
CN108510056A (en)*2017-02-272018-09-07顾泽苍A kind of method that ultra-deep confrontation learns online image recognition
WO2019245186A1 (en)*2018-06-192019-12-26삼성전자주식회사Electronic device and control method thereof
CN109766830A (en)*2019-01-092019-05-17深圳市芯鹏智能信息有限公司A kind of ship seakeeping system and method based on artificial intelligence image procossing
WO2020181391A1 (en)*2019-03-142020-09-17Element Ai Inc.Articles for disrupting automated visual object tracking processes
US20200327680A1 (en)*2019-04-122020-10-15Beijing Moviebook Science and Technology Co., Ltd.Visual target tracking method and apparatus based on deep adversarial training
US20200380274A1 (en)*2019-06-032020-12-03Nvidia CorporationMulti-object tracking using correlation filters in video analytics applications
CN110647918A (en)*2019-08-262020-01-03浙江工业大学 Mimic Defense Method for Adversarial Attacks of Deep Learning Models
CN110991299A (en)*2019-11-272020-04-10中新国际联合研究院 An Adversarial Sample Generation Method for Face Recognition System in Physical Domain
CN110969637A (en)*2019-12-022020-04-07深圳市唯特视科技有限公司Multi-threat target reconstruction and situation awareness method based on generation countermeasure network
CN111080659A (en)*2019-12-192020-04-28哈尔滨工业大学Environmental semantic perception method based on visual information
CN111627044A (en)*2020-04-262020-09-04上海交通大学Target tracking attack and defense method based on deep network
CN111696136A (en)*2020-06-092020-09-22电子科技大学Target tracking method based on coding and decoding structure
CN111860248A (en)*2020-07-082020-10-30上海蠡图信息科技有限公司Visual target tracking method based on twin gradual attention-guided fusion network
CN112150513A (en)*2020-09-272020-12-29中国人民解放军海军工程大学Target tracking algorithm based on sparse identification minimum spanning tree
CN112365582A (en)*2020-11-172021-02-12电子科技大学Countermeasure point cloud generation method, storage medium and terminal
CN112233147A (en)*2020-12-212021-01-15江苏移动信息系统集成有限公司Video moving target tracking method and device based on two-way twin network

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
HAOZHE QI等: "P2B: Point-to-Box Network for 3D Object Tracking in Point Clouds", 《2020 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR)》*
XIMING ZHANG等: "Robust Visual Tracking Based on Adversarial Fusion Networks", 《2018 37TH CHINESE CONTROL CONFERENCE》*
胡丹: "面向视觉跟踪的深度学习模型设计与优化研究", 《中国博士学位论文全文数据库 信息科技编辑》*
郭岑等: "空间感知残差网络的遥感图像超分辨率重建", 《测绘科学》*
陈会志: "基于深度卷积神经网络的目标跟踪算法研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》*

Cited By (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN113610904A (en)*2021-07-192021-11-05广州大学Method, system, computer and medium for generating three-dimensional (3D) local point cloud countermeasure sample
CN113610904B (en)*2021-07-192023-10-20广州大学3D local point cloud countermeasure sample generation method, system, computer and medium
CN113808165A (en)*2021-09-142021-12-17电子科技大学 Point perturbation adversarial attack method for 3D target tracking model
CN113808165B (en)*2021-09-142023-06-13电子科技大学 Point perturbation adversarial attack method for 3D target tracking model
CN115115905A (en)*2022-06-132022-09-27苏州大学High-mobility image countermeasure sample generation method based on generation model
CN117540441A (en)*2024-01-102024-02-09北京国旺盛源智能终端科技有限公司Transaction data secure storage method for hall type cloud terminal
CN117540441B (en)*2024-01-102024-03-19北京国旺盛源智能终端科技有限公司Transaction data secure storage method for hall type cloud terminal

Also Published As

Publication numberPublication date
CN112884802B (en)2023-05-12

Similar Documents

PublicationPublication DateTitle
Pi et al.Detection and semantic segmentation of disaster damage in UAV footage
CN112884802A (en) A Generative Adversarial Attack Method
CN112784954B (en)Method and device for determining neural network
CN112949647B (en)Three-dimensional scene description method and device, electronic equipment and storage medium
CN113704522B (en) Method and system for fast retrieval of target images based on artificial intelligence
CN108734210B (en) An object detection method based on cross-modal multi-scale feature fusion
CN114842411B (en) A group behavior recognition method based on complementary spatiotemporal information modeling
EP3690744B1 (en)Method for integrating driving images acquired from vehicles performing cooperative driving and driving image integrating device using same
Manssor et al.Real-time human detection in thermal infrared imaging at night using enhanced Tiny-yolov3 network
CN118097150B (en)Small sample camouflage target segmentation method
CN114627282B (en)Method, application method, equipment, device and medium for establishing target detection model
CN116402851A (en) A Method of Infrared Weak and Small Target Tracking in Complex Background
CN112990222A (en)Image boundary knowledge migration-based guided semantic segmentation method
CN114155165A (en)Image defogging method based on semi-supervision
CN109033321A (en)It is a kind of that image is with natural language feature extraction and the language based on keyword indicates image partition method
CN112395974B (en) A Target Confidence Correction Method Based on Inter-object Dependencies
WO2022199225A1 (en)Decoding method and apparatus, and computer-readable storage medium
CN118887665A (en) A method and device for semantic segmentation of open vocabulary based on three-dimensional Gaussian scene
CN115049919A (en)Attention regulation based remote sensing image semantic segmentation method and system
CN116912579A (en) Scene graph generation method based on multi-level attention mechanism
Patel et al.Deep learning-enabled road segmentation and edge-centerline extraction from high-resolution remote sensing images
CN118968183B (en)Fraud image identification method oriented to artificial intelligence ethics
Jafrasteh et al.Generative adversarial networks as a novel approach for tectonic fault and fracture extraction in high resolution satellite and airborne optical images
CN113554655B (en)Optical remote sensing image segmentation method and device based on multi-feature enhancement
Ragab et al.Synergizing Remora optimization algorithm and transfer learning for visual places recognition in intelligent transportation systems and consumer electronics

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp