Deep learning models have been shown to be vulnerable to recent backdoor attacks. A backdoored model behaves normally for inputs containing no attacker-secretly-chosen trigger and maliciously for inputs with the trigger. To date, backdoor attacks and countermeasures mainly focus on image classification tasks. And most of them are implemented in the digital world with digital triggers. Besides the classification tasks, object detection systems are also considered as one of the basic foundations of computer vision tasks. However, there is no investigation and understanding of the backdoor vulnerability of the object detector, even in the digital world with digital triggers. For the first time, this work demonstrates that existing object detectors are inherently susceptible to physical backdoor attacks. We use a natural T-shirt bought from a market as a trigger to enable the cloaking effect--the person bounding-box disappears in front of the object detector. We show that such a backdoor can be implanted from two exploitable attack scenarios into the object detector, which is outsourced or fine-tuned through a pretrained model. We have extensively evaluated three popular object detection algorithms: anchor-based Yolo-V3, Yolo-V4, and anchor-free CenterNet. Building upon 19 videos shot in real-world scenes, we confirm that the backdoor attack is robust against various factors: movement, distance, angle, non-rigid deformation, and lighting. Specifically, the attack success rate (ASR) in most videos is 100% or close to it, while the clean data accuracy of the backdoored model is the same as its clean counterpart. The latter implies that it is infeasible to detect the backdoor behavior merely through a validation set. The averaged ASR still remains sufficiently high to be 78% in the transfer learning attack scenarios evaluated on CenterNet. See the demo video on https://youtu.be/Q3HOF4OobbY.
翻译:深层学习模型被证明容易受最近的幕后攻击。 一种幕后式模型通常对不含攻击者秘密选择触发器的投入进行正常操作, 恶意地使用触发器进行输入。 迄今, 幕后攻击和反措施主要侧重于图像分类任务。 大多数是在数字世界中实施的。 除了分类任务, 物体探测系统也被视为计算机视觉任务的基本基础之一 。 然而, 对物体探测器的后门脆弱性没有调查和理解, 即使在数字世界中, 也存在数字触发器 。 这项工作首次表明, 现有的物体探测器天生容易受到物理幕后攻击 。 我们使用从市场购买的天然T恤衫作为触发器, 使隐蔽效应- 被捆绑的人体在物体探测器面前消失。 我们显示, 这种后门可以从两种可开发的攻击情景植入到天体探测器, 并且通过预先训练的模型将它外包或微调。 我们广泛评价了三种受欢迎的物体探测算法: 关闭的轨道模型: 关闭轨道模型- V3 ; 最精确的视频显示, 我们的远程变现为不连续的图像 。