Adversarial examples with transferred camouflage style for object detection

7Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Most of existing adversarial examples attacking methods for object detection models aim at generating subtle perturbation which is invisible to human vision. However, some perturbations with stronger intensity are equally effective and can even make the objects in adversarial examples more invisible. In this paper, an attack model based on the Generative Adversarial Network and style transfer method is designed to craft and add perturbation with camouflage style to the object area in the image. Experiments on PASCAL VOC 2012 dataset demonstrated that Adversarial examples generated from our model can attack both proposal-based detectors and regression-based object detection models effectively, and reduce the visual saliency of the objects.

Cite

CITATION STYLE

APA

Deng, X., Fang, Z., Zheng, Y., Wang, Y., Huang, J., Wang, X., & Cao, T. (2021). Adversarial examples with transferred camouflage style for object detection. In Journal of Physics: Conference Series (Vol. 1738). IOP Publishing Ltd. https://doi.org/10.1088/1742-6596/1738/1/012130

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free