Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Search-and-Attack: Temporally Sparse Adversarial Perturbations on Videos

Full metadata record
DC Field Value Language
dc.contributor.authorHeo, Hwan-
dc.contributor.authorKo, Dohwan-
dc.contributor.authorLee, Jaewon-
dc.contributor.authorHong, Youngjoon-
dc.contributor.authorKim, Hyunwoo J.-
dc.date.accessioned2022-03-12T04:40:50Z-
dc.date.available2022-03-12T04:40:50Z-
dc.date.created2022-01-20-
dc.date.issued2021-
dc.identifier.issn2169-3536-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/138679-
dc.description.abstractModern neural networks are known to be vulnerable to adversarial attacks in various domains. Although most attack methods usually densely change the input values, recent works have shown that deep neural networks (DNNs) are also vulnerable to sparse perturbations. Spatially sparse attacks on images or frames of a video are proven effective but the temporally sparse perturbations on videos have been less explored. In this paper, we present a novel framework to generate a temporally sparse adversarial attack, called Search-and-Attack scheme, on videos. The Search-and-Attack scheme first retrieves the most vulnerable frames and then attacks only those frames. Since identifying the most vulnerable set of frames involves an expensive combinatorial optimization problem, we introduce alternative definitions or surrogate objective functions: Magnitude of the Gradients (MoG) and Frame-wise Robustness Intensity (FRI). Combining them with iterative search schemes, extensive experiments on three public benchmark datasets (UCF, HMDB, and Kinetics) show that the proposed method achieves comparable performance to state-of-the-art dense attack methods.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC-
dc.titleSearch-and-Attack: Temporally Sparse Adversarial Perturbations on Videos-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, Hyunwoo J.-
dc.identifier.doi10.1109/ACCESS.2021.3124050-
dc.identifier.scopusid2-s2.0-85118542355-
dc.identifier.wosid000714709300001-
dc.identifier.bibliographicCitationIEEE ACCESS, v.9, pp.146938 - 146947-
dc.relation.isPartOfIEEE ACCESS-
dc.citation.titleIEEE ACCESS-
dc.citation.volume9-
dc.citation.startPage146938-
dc.citation.endPage146947-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordAuthorPerturbation methods-
dc.subject.keywordAuthorSearch problems-
dc.subject.keywordAuthorLinear programming-
dc.subject.keywordAuthorThree-dimensional displays-
dc.subject.keywordAuthorSolid modeling-
dc.subject.keywordAuthorNeural networks-
dc.subject.keywordAuthorConvolution-
dc.subject.keywordAuthorAction recognition-
dc.subject.keywordAuthorvideo classification-
dc.subject.keywordAuthoradversarial attack-
dc.subject.keywordAuthorsparse adversarial attack-
dc.subject.keywordAuthorsafe AI-
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE