克隆对象检测器

Arne Aarts, Wil Michiels, Peter Roelse
{"title":"克隆对象检测器","authors":"Arne Aarts, Wil Michiels, Peter Roelse","doi":"10.1109/ICCE-Berlin56473.2022.9937123","DOIUrl":null,"url":null,"abstract":"Object detectors based on neural networks are deployed in various consumer electronics products to predict different types of object and their location in images. This paper presents a cloning attack on object detectors, using problem domain samples and oracle access to a trained object detector. As in known cloning attacks on image classifiers, the presented attack uses the oracle access to label the samples. The resulting set of labeled samples, referred to as the surrogate dataset, is then used to train the clone detector. Compared to image classifiers, the surrogate dataset created by an object detector can contain more types of error. The paper describes a way to assess the quality of the surrogate dataset. The cloning attack was implemented, and experiments were conducted with a CenterNet and a RetinaNet object detector, and the Oxford-IIIT Pet, Tsinghua-Tencent 100K, and WIDER FACE datasets. The results show that object detectors can be cloned successfully, even if the quality of the surrogate dataset is relatively low. However, in case of a low-quality surrogate dataset, the quality of the clone detector was only high if it used the same architecture as the target detector.","PeriodicalId":138931,"journal":{"name":"2022 IEEE 12th International Conference on Consumer Electronics (ICCE-Berlin)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cloning Object Detectors\",\"authors\":\"Arne Aarts, Wil Michiels, Peter Roelse\",\"doi\":\"10.1109/ICCE-Berlin56473.2022.9937123\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Object detectors based on neural networks are deployed in various consumer electronics products to predict different types of object and their location in images. This paper presents a cloning attack on object detectors, using problem domain samples and oracle access to a trained object detector. As in known cloning attacks on image classifiers, the presented attack uses the oracle access to label the samples. The resulting set of labeled samples, referred to as the surrogate dataset, is then used to train the clone detector. Compared to image classifiers, the surrogate dataset created by an object detector can contain more types of error. The paper describes a way to assess the quality of the surrogate dataset. The cloning attack was implemented, and experiments were conducted with a CenterNet and a RetinaNet object detector, and the Oxford-IIIT Pet, Tsinghua-Tencent 100K, and WIDER FACE datasets. The results show that object detectors can be cloned successfully, even if the quality of the surrogate dataset is relatively low. However, in case of a low-quality surrogate dataset, the quality of the clone detector was only high if it used the same architecture as the target detector.\",\"PeriodicalId\":138931,\"journal\":{\"name\":\"2022 IEEE 12th International Conference on Consumer Electronics (ICCE-Berlin)\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-09-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE 12th International Conference on Consumer Electronics (ICCE-Berlin)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCE-Berlin56473.2022.9937123\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 12th International Conference on Consumer Electronics (ICCE-Berlin)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCE-Berlin56473.2022.9937123","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

基于神经网络的目标检测器被部署在各种消费电子产品中,用于预测不同类型的物体及其在图像中的位置。本文提出了一种针对对象检测器的克隆攻击,使用问题域样本和oracle访问训练过的对象检测器。与已知的针对图像分类器的克隆攻击一样,本文提出的攻击使用oracle访问来标记样本。所得到的标记样本集,称为代理数据集,然后用于训练克隆检测器。与图像分类器相比,由对象检测器创建的代理数据集可以包含更多类型的错误。本文描述了一种评估代理数据集质量的方法。利用CenterNet和RetinaNet目标检测器,Oxford-IIIT Pet、Tsinghua-Tencent 100K和WIDER FACE数据集进行克隆攻击实验。结果表明,即使代理数据集的质量相对较低,也可以成功克隆目标检测器。然而,在低质量代理数据集的情况下,只有当克隆检测器使用与目标检测器相同的架构时,克隆检测器的质量才高。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Cloning Object Detectors
Object detectors based on neural networks are deployed in various consumer electronics products to predict different types of object and their location in images. This paper presents a cloning attack on object detectors, using problem domain samples and oracle access to a trained object detector. As in known cloning attacks on image classifiers, the presented attack uses the oracle access to label the samples. The resulting set of labeled samples, referred to as the surrogate dataset, is then used to train the clone detector. Compared to image classifiers, the surrogate dataset created by an object detector can contain more types of error. The paper describes a way to assess the quality of the surrogate dataset. The cloning attack was implemented, and experiments were conducted with a CenterNet and a RetinaNet object detector, and the Oxford-IIIT Pet, Tsinghua-Tencent 100K, and WIDER FACE datasets. The results show that object detectors can be cloned successfully, even if the quality of the surrogate dataset is relatively low. However, in case of a low-quality surrogate dataset, the quality of the clone detector was only high if it used the same architecture as the target detector.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信