{"title":"SAR对抗实例的实证研究","authors":"Zhiwei Zhang, Xunzhang Gao, Shuowei Liu, Yujia Diao","doi":"10.1109/TrustCom56396.2022.00157","DOIUrl":null,"url":null,"abstract":"Adversarial attack and adversarial detection have become a hot issue in the field of deep learning based image forensics. However, current researches mainly focus on optical images. Synthetic aperture radar (SAR) images are quite different from the optical images in both imaging mechanism and data structure. This paper aims to study adversarial attack and adversarial detection for SAR images. Firstly, we analyze the distribution characteristics of SAR adversarial examples (AEs) in both output space and feature space by simply transferring optical attacks. In order to match the digital perturbation with the scattering energy of target, we then propose a generation method of SAR AEs with regional constraint. Experiments show that the proposed method decreases the attack performance of four classic adversarial attacks but leads to difficult detection. Finally, we point out an open issue that decreasing the perturbation scale leads to the degradation of adversarial detection against both optical AEs and SAR AEs.","PeriodicalId":276379,"journal":{"name":"2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An Empirical Study Towards SAR Adversarial Examples\",\"authors\":\"Zhiwei Zhang, Xunzhang Gao, Shuowei Liu, Yujia Diao\",\"doi\":\"10.1109/TrustCom56396.2022.00157\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Adversarial attack and adversarial detection have become a hot issue in the field of deep learning based image forensics. However, current researches mainly focus on optical images. Synthetic aperture radar (SAR) images are quite different from the optical images in both imaging mechanism and data structure. This paper aims to study adversarial attack and adversarial detection for SAR images. Firstly, we analyze the distribution characteristics of SAR adversarial examples (AEs) in both output space and feature space by simply transferring optical attacks. In order to match the digital perturbation with the scattering energy of target, we then propose a generation method of SAR AEs with regional constraint. Experiments show that the proposed method decreases the attack performance of four classic adversarial attacks but leads to difficult detection. Finally, we point out an open issue that decreasing the perturbation scale leads to the degradation of adversarial detection against both optical AEs and SAR AEs.\",\"PeriodicalId\":276379,\"journal\":{\"name\":\"2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)\",\"volume\":\"14 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/TrustCom56396.2022.00157\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TrustCom56396.2022.00157","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Empirical Study Towards SAR Adversarial Examples
Adversarial attack and adversarial detection have become a hot issue in the field of deep learning based image forensics. However, current researches mainly focus on optical images. Synthetic aperture radar (SAR) images are quite different from the optical images in both imaging mechanism and data structure. This paper aims to study adversarial attack and adversarial detection for SAR images. Firstly, we analyze the distribution characteristics of SAR adversarial examples (AEs) in both output space and feature space by simply transferring optical attacks. In order to match the digital perturbation with the scattering energy of target, we then propose a generation method of SAR AEs with regional constraint. Experiments show that the proposed method decreases the attack performance of four classic adversarial attacks but leads to difficult detection. Finally, we point out an open issue that decreasing the perturbation scale leads to the degradation of adversarial detection against both optical AEs and SAR AEs.