| CARVIEW |
Select Language
HTTP/2 200
last-modified: Tue, 09 Apr 2019 00:13:12 GMT
cache-control: max-age=3600
content-type: text/html; charset=utf-8
content-security-policy: frame-ancestors 'none'
x-frame-options: SAMEORIGIN
x-cloud-trace-context: 1cc23a37008383c695e29d55f9f866e2
server: Google Frontend
via: 1.1 google, 1.1 varnish, 1.1 varnish
accept-ranges: bytes
age: 830661
date: Thu, 01 Jan 2026 01:40:37 GMT
x-served-by: cache-lga21935-LGA, cache-bom-vanm7210063-BOM
x-cache: HIT, HIT
x-timer: S1767231637.849777,VS0,VE199
content-length: 48617
[1711.07183] Adversarial Attacks Beyond the Image Space
Skip to main content
[v1] Mon, 20 Nov 2017 08:05:24 UTC (1,616 KB)
[v2] Tue, 21 Nov 2017 01:56:50 UTC (1,616 KB)
[v3] Fri, 7 Sep 2018 03:20:11 UTC (1,996 KB)
[v4] Mon, 10 Sep 2018 14:46:21 UTC (1,996 KB)
[v5] Sat, 24 Nov 2018 18:39:59 UTC (2,264 KB)
[v6] Sat, 6 Apr 2019 19:46:43 UTC (2,388 KB)
We gratefully acknowledge support from the Simons Foundation, member institutions, and all contributors.
Donate
Computer Science > Computer Vision and Pattern Recognition
arXiv:1711.07183 (cs)
[Submitted on 20 Nov 2017 (v1), last revised 6 Apr 2019 (this version, v6)]
Title:Adversarial Attacks Beyond the Image Space
Authors:Xiaohui Zeng, Chenxi Liu, Yu-Siang Wang, Weichao Qiu, Lingxi Xie, Yu-Wing Tai, Chi Keung Tang, Alan L. Yuille
View a PDF of the paper titled Adversarial Attacks Beyond the Image Space, by Xiaohui Zeng and 7 other authors
View PDF
Abstract:Generating adversarial examples is an intriguing problem and an important way of understanding the working mechanism of deep neural networks. Most existing approaches generated perturbations in the image space, i.e., each pixel can be modified independently. However, in this paper we pay special attention to the subset of adversarial examples that correspond to meaningful changes in 3D physical properties (like rotation and translation, illumination condition, etc.). These adversaries arguably pose a more serious concern, as they demonstrate the possibility of causing neural network failure by easy perturbations of real-world 3D objects and scenes.
In the contexts of object classification and visual question answering, we augment state-of-the-art deep neural networks that receive 2D input images with a rendering module (either differentiable or not) in front, so that a 3D scene (in the physical space) is rendered into a 2D image (in the image space), and then mapped to a prediction (in the output space). The adversarial perturbations can now go beyond the image space, and have clear meanings in the 3D physical world. Though image-space adversaries can be interpreted as per-pixel albedo change, we verify that they cannot be well explained along these physically meaningful dimensions, which often have a non-local effect. But it is still possible to successfully attack beyond the image space on the physical space, though this is more difficult than image-space attacks, reflected in lower success rates and heavier perturbations required.
| Comments: | To appear in CVPR 2019 as oral |
| Subjects: | Computer Vision and Pattern Recognition (cs.CV) |
| Cite as: | arXiv:1711.07183 [cs.CV] |
| (or arXiv:1711.07183v6 [cs.CV] for this version) | |
| https://doi.org/10.48550/arXiv.1711.07183
arXiv-issued DOI via DataCite
|
Submission history
From: Chenxi Liu [view email][v1] Mon, 20 Nov 2017 08:05:24 UTC (1,616 KB)
[v2] Tue, 21 Nov 2017 01:56:50 UTC (1,616 KB)
[v3] Fri, 7 Sep 2018 03:20:11 UTC (1,996 KB)
[v4] Mon, 10 Sep 2018 14:46:21 UTC (1,996 KB)
[v5] Sat, 24 Nov 2018 18:39:59 UTC (2,264 KB)
[v6] Sat, 6 Apr 2019 19:46:43 UTC (2,388 KB)
Full-text links:
Access Paper:
- View PDF
- TeX Source
View a PDF of the paper titled Adversarial Attacks Beyond the Image Space, by Xiaohui Zeng and 7 other authors
References & Citations
export BibTeX citation
Loading...
Bibliographic and Citation Tools
Bibliographic Explorer (What is the Explorer?)
Connected Papers (What is Connected Papers?)
Litmaps (What is Litmaps?)
scite Smart Citations (What are Smart Citations?)
Code, Data and Media Associated with this Article
alphaXiv (What is alphaXiv?)
CatalyzeX Code Finder for Papers (What is CatalyzeX?)
DagsHub (What is DagsHub?)
Gotit.pub (What is GotitPub?)
Hugging Face (What is Huggingface?)
Papers with Code (What is Papers with Code?)
ScienceCast (What is ScienceCast?)
Demos
Recommenders and Search Tools
Influence Flower (What are Influence Flowers?)
CORE Recommender (What is CORE?)
arXivLabs: experimental projects with community collaborators
arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.
Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.
Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs.