Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3274895.3274904acmconferencesArticle/Chapter ViewAbstractPublication PagesgisConference Proceedingsconference-collections
poster

Adversarial examples in remote sensing

Published: 06 November 2018 Publication History
  • Get Citation Alerts
  • Abstract

    This paper considers attacks against machine learning algorithms used in remote sensing applications. The remote sensing domain presents a suite of challenges that are not fully addressed by current research focused on natural image data. In this paper we present a new study of adversarial examples in the context of satellite image classification problems. Using a recently curated data set and associated classifier, we provide a preliminary analysis of adversarial examples in settings where the targeted classifier is permitted multiple observations of the same location over time. While our experiments to date are purely digital, our problem setup incorporates a number of practical considerations that an attacker would need to take into account when mounting physical attacks.

    References

    [1]
    Anish Athalye and Nicholas Carlini. 2018. On the Robustness of the CVPR 2018 White-Box Adversarial Example Defenses. arXivpreprint arXiv:1804.03286 (2018).
    [2]
    Anish Athalye, Nicholas Carlini, and David Wagner. 2018. Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples. arXiv preprint arXiv:1802.00420 (2018).
    [3]
    Anish Athalye and Ilya Sutskever. 2017. Synthesizing robust adversarial examples. arXiv preprint arXiv:1707.07397 (2017).
    [4]
    Tom B Brown, Dandelion Mané, Aurko Roy, Martín Abadi, and Justin Gilmer. 2017. Adversarial patch. arXiv preprint arXiv:1712.09665 (2017).
    [5]
    Nicholas Carlini and David Wagner. 2017. Adversarial examples are not easily detected: Bypassing ten detection methods. In Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security. ACM, 3-14.
    [6]
    Shang-Tse Chen, Cory Cornelius, Jason Martin, and Duen Horng Chau. 2018. Robust Physical Adversarial Attack on Faster R-CNN Object Detector. arXiv preprint arXiv:1804.05810 (2018).
    [7]
    Gordon Christie, Neil Fendley, James Wilson, and Ryan Mukherjee. 2017. Functional Map of the World. arXiv preprint arXiv:1711.07846 (2017).
    [8]
    Wojciech Czaja, Neil Fendley, Michael Pekala, Christopher Ratto, and I-Jeng Wang. 2018. Adversarial Examples in Remote Sensing. arXiv:1805.10997 (2018).
    [9]
    DigitalGlobe. 2013. IKONOS: Data Sheet. (2013). https://dg-cms-uploads-production.s3.amazonaws.com/uploads/document/file/96/DG_IKONOS_DS.pdf {Online; accessed 11-May-2018}.
    [10]
    Ivan Evtimov, Kevin Eykholt, Earlence Fernandes, Tadayoshi Kohno, Bo Li, Atul Prakash, Amir Rahmati, and Dawn Song. 2017. Robust Physical-World Attacks on Deep Learning Models. arXiv preprint arXiv:1707.08945 1 (2017).
    [11]
    Fartash Faghri, Ian Goodfellow, Justin Gilmer, Luke Metz, Maithra Raghu, and Sam Schoenholz. 2018. Adversarial Spheres. (2018).
    [12]
    Alhussein Fawzi, Seyed-Mohsen Moosavi-Dezfooli, and Pascal Frossard. 2016. Robustness of classifiers: from adversarial to random noise. In Advances in Neural Information Processing Systems. 1632-1640.
    [13]
    Alhussein Fawzi, Seyed-Mohsen Moosavi-Dezfooli, and Pascal Frossard. 2017. The Robustness of Deep Networks: A Geometrical Perspective. IEEE Signal Processing Magazine 34, 6 (2017), 50-62.
    [14]
    Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014).
    [15]
    Alexey Kurakin, Ian Goodfellow, and Samy Bengio. 2016. Adversarial examples in the physical world. arXiv preprint arXiv:1607.02533 (2016).
    [16]
    Jiajun Lu, Hussein Sibai, Evan Fabry, and David Forsyth. 2017. No need to worry about adversarial examples in object detection in autonomous vehicles. arXiv preprint arXiv:1707.03501 (2017).
    [17]
    Volodymyr Mnih and Geoffrey E Hinton. 2010. Learning to detect roads in high-resolution aerial images. In European Conference on Computer Vision. Springer.
    [18]
    Nicolas Papernot, Patrick McDaniel, Ian Goodfellow, Somesh Jha, Z Berkay Celik, and Ananthram Swami. 2016. Practical black-box attacks against deep learning systems using adversarial examples. arXiv preprint (2016).
    [19]
    Nicolas Papernot, Patrick McDaniel, Somesh Jha, Matt Fredrikson, Z Berkay Celik, and Ananthram Swami. 2016. The limitations of deep learning in adversarial settings. In Security and Privacy (EuroS&P), 2016 IEEE European Symposium on. IEEE, 372-387.
    [20]
    Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2013. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013).

    Cited By

    View all
    • (2024)Sub-Band Backdoor Attack in Remote Sensing ImageryAlgorithms10.3390/a1705018217:5(182)Online publication date: 28-Apr-2024
    • (2024)Semisupervised Cross-Domain Remote Sensing Scene Classification via Category-Level Feature Alignment NetworkIEEE Transactions on Geoscience and Remote Sensing10.1109/TGRS.2024.339298462(1-14)Online publication date: 2024
    • (2024)DGA: Direction-Guided Attack Against Optical Aerial Detection in Camera Shooting Direction-Agnostic ScenariosIEEE Transactions on Geoscience and Remote Sensing10.1109/TGRS.2024.338748662(1-22)Online publication date: 2024
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SIGSPATIAL '18: Proceedings of the 26th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
    November 2018
    655 pages
    ISBN:9781450358897
    DOI:10.1145/3274895
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 06 November 2018

    Check for updates

    Author Tags

    1. adversarial examples
    2. classification
    3. deep neural networks
    4. machine learning
    5. remote sensing

    Qualifiers

    • Poster

    Conference

    SIGSPATIAL '18
    Sponsor:

    Acceptance Rates

    SIGSPATIAL '18 Paper Acceptance Rate 30 of 150 submissions, 20%;
    Overall Acceptance Rate 220 of 1,116 submissions, 20%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)84
    • Downloads (Last 6 weeks)9
    Reflects downloads up to 26 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Sub-Band Backdoor Attack in Remote Sensing ImageryAlgorithms10.3390/a1705018217:5(182)Online publication date: 28-Apr-2024
    • (2024)Semisupervised Cross-Domain Remote Sensing Scene Classification via Category-Level Feature Alignment NetworkIEEE Transactions on Geoscience and Remote Sensing10.1109/TGRS.2024.339298462(1-14)Online publication date: 2024
    • (2024)DGA: Direction-Guided Attack Against Optical Aerial Detection in Camera Shooting Direction-Agnostic ScenariosIEEE Transactions on Geoscience and Remote Sensing10.1109/TGRS.2024.338748662(1-22)Online publication date: 2024
    • (2024)Fooling Aerial Detectors by Background Attack via Dual-Adversarial-Induced Error IdentificationIEEE Transactions on Geoscience and Remote Sensing10.1109/TGRS.2024.338653362(1-16)Online publication date: 2024
    • (2024) S 3 ANet: Spatial-Spectral Self-Attention Learning Network for Defending Against Adversarial Attacks in Hyperspectral Image Classification IEEE Transactions on Geoscience and Remote Sensing10.1109/TGRS.2024.3381824(1-1)Online publication date: 2024
    • (2024)Stealthy Adversarial Examples for Semantic Segmentation in Remote SensingIEEE Transactions on Geoscience and Remote Sensing10.1109/TGRS.2024.337700962(1-17)Online publication date: 2024
    • (2024)Generating Imperceptible and Cross-Resolution Remote Sensing Adversarial Examples Based on Implicit Neural RepresentationsIEEE Transactions on Geoscience and Remote Sensing10.1109/TGRS.2023.334937362(1-15)Online publication date: 2024
    • (2024)Generating Adversarial Examples Against Remote Sensing Scene Classification via Feature ApproximationIEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing10.1109/JSTARS.2024.339978017(10174-10187)Online publication date: 2024
    • (2024)IOPA-FracAT: Research on Improved One-pixel Adversarial Attack and Fractional Defense in Hyperspectral Image Classification2024 36th Chinese Control and Decision Conference (CCDC)10.1109/CCDC62350.2024.10588229(1527-1532)Online publication date: 25-May-2024
    • (2024)Adversarial Attacks Against Object Detection in Remote Sensing ImagesArtificial Intelligence Security and Privacy10.1007/978-981-99-9785-5_25(358-367)Online publication date: 4-Feb-2024
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media