{"title":"物联网中场景文本识别的后门攻击","authors":"Qiuhua Wang;Yi Hu;Xiyuan Jia;Guohua Wu;Yizhi Ren;Gaoning Pan;Yanyu Cheng","doi":"10.1109/JIOT.2025.3586440","DOIUrl":null,"url":null,"abstract":"Recent researches have shown that nonsequential tasks based on deep neural networks (DNNs), such as image classification and object detection, are vulnerable to backdoor attacks, leading to incorrect model predictions. As a crucial task in computer vision, scene text recognition (STR) is widely used in Internet of Things (IoT) fields, such as intelligent transportation system and intelligent surveillance. Given its importance, ensuring the security and accuracy of STR models is critical. However, there are currently no studies on STR backdoor attacks. In this article, we make the first attempt to validate backdoor threats on STR models by using a patch-based attack method. Our experimental results confirm that STR models can be successfully compromised with attack success rate (ASR) of over 80% on most datasets. However, we also reveal a critical flaw: the patch-based attack lacks robustness due to the specific preprocessing in STR models [such as resizing and thin-plate spline (TPS) rectification], which distort or eliminate the backdoor triggers. To address this, we further propose BadSTR, a novel backdoor attack method that uses semantic text sequences as triggers. Extensive experiments on eight benchmark datasets show that our proposed BadSTR achieves ASR of over 90% for most model-dataset combinations with significantly improved robustness.","PeriodicalId":54347,"journal":{"name":"IEEE Internet of Things Journal","volume":"12 18","pages":"38526-38539"},"PeriodicalIF":8.9000,"publicationDate":"2025-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"BadSTR: Backdoor Attack on Scene Text Recognition in IoT\",\"authors\":\"Qiuhua Wang;Yi Hu;Xiyuan Jia;Guohua Wu;Yizhi Ren;Gaoning Pan;Yanyu Cheng\",\"doi\":\"10.1109/JIOT.2025.3586440\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recent researches have shown that nonsequential tasks based on deep neural networks (DNNs), such as image classification and object detection, are vulnerable to backdoor attacks, leading to incorrect model predictions. As a crucial task in computer vision, scene text recognition (STR) is widely used in Internet of Things (IoT) fields, such as intelligent transportation system and intelligent surveillance. Given its importance, ensuring the security and accuracy of STR models is critical. However, there are currently no studies on STR backdoor attacks. In this article, we make the first attempt to validate backdoor threats on STR models by using a patch-based attack method. Our experimental results confirm that STR models can be successfully compromised with attack success rate (ASR) of over 80% on most datasets. However, we also reveal a critical flaw: the patch-based attack lacks robustness due to the specific preprocessing in STR models [such as resizing and thin-plate spline (TPS) rectification], which distort or eliminate the backdoor triggers. To address this, we further propose BadSTR, a novel backdoor attack method that uses semantic text sequences as triggers. Extensive experiments on eight benchmark datasets show that our proposed BadSTR achieves ASR of over 90% for most model-dataset combinations with significantly improved robustness.\",\"PeriodicalId\":54347,\"journal\":{\"name\":\"IEEE Internet of Things Journal\",\"volume\":\"12 18\",\"pages\":\"38526-38539\"},\"PeriodicalIF\":8.9000,\"publicationDate\":\"2025-07-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Internet of Things Journal\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/11072170/\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Internet of Things Journal","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/11072170/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
BadSTR: Backdoor Attack on Scene Text Recognition in IoT
Recent researches have shown that nonsequential tasks based on deep neural networks (DNNs), such as image classification and object detection, are vulnerable to backdoor attacks, leading to incorrect model predictions. As a crucial task in computer vision, scene text recognition (STR) is widely used in Internet of Things (IoT) fields, such as intelligent transportation system and intelligent surveillance. Given its importance, ensuring the security and accuracy of STR models is critical. However, there are currently no studies on STR backdoor attacks. In this article, we make the first attempt to validate backdoor threats on STR models by using a patch-based attack method. Our experimental results confirm that STR models can be successfully compromised with attack success rate (ASR) of over 80% on most datasets. However, we also reveal a critical flaw: the patch-based attack lacks robustness due to the specific preprocessing in STR models [such as resizing and thin-plate spline (TPS) rectification], which distort or eliminate the backdoor triggers. To address this, we further propose BadSTR, a novel backdoor attack method that uses semantic text sequences as triggers. Extensive experiments on eight benchmark datasets show that our proposed BadSTR achieves ASR of over 90% for most model-dataset combinations with significantly improved robustness.
期刊介绍:
The EEE Internet of Things (IoT) Journal publishes articles and review articles covering various aspects of IoT, including IoT system architecture, IoT enabling technologies, IoT communication and networking protocols such as network coding, and IoT services and applications. Topics encompass IoT's impacts on sensor technologies, big data management, and future internet design for applications like smart cities and smart homes. Fields of interest include IoT architecture such as things-centric, data-centric, service-oriented IoT architecture; IoT enabling technologies and systematic integration such as sensor technologies, big sensor data management, and future Internet design for IoT; IoT services, applications, and test-beds such as IoT service middleware, IoT application programming interface (API), IoT application design, and IoT trials/experiments; IoT standardization activities and technology development in different standard development organizations (SDO) such as IEEE, IETF, ITU, 3GPP, ETSI, etc.