Siddiqui et al., 2021 - Google Patents
A novel lightweight defense method against adversarial patches-based attacks on automated vehicle make and model recognition systemsSiddiqui et al., 2021
- Document ID
- 15888937990315673532
- Author
- Siddiqui A
- Boukerche A
- Publication year
- Publication venue
- Journal of Network and Systems Management
External Links
Snippet
In smart cities, connected and automated surveillance systems play an essential role in ensuring safety and security of life, property, critical infrastructures and cyber-physical systems. The recent trend of such surveillance systems has been to embrace the use of …
- 230000001603 reducing 0 abstract description 48
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/20—Image acquisition
- G06K9/32—Aligning or centering of the image pick-up or image-field
- G06K9/3233—Determination of region of interest
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
- G06K9/4671—Extracting features based on salient regional features, e.g. Scale Invariant Feature Transform [SIFT] keypoints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00624—Recognising scenes, i.e. recognition of a whole field of perception; recognising scene-specific objects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30781—Information retrieval; Database structures therefor; File system structures therefor of video data
- G06F17/30784—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre
- G06F17/30799—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre using low-level visual features of the video content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2207/00—Indexing scheme for image analysis or image enhancement
- G06T2207/20—Special algorithmic details
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wang et al. | Towards a physical-world adversarial patch for blinding object detection models | |
Zhu et al. | Adversarial attacks against lidar semantic segmentation in autonomous driving | |
CN111461089B (en) | Face detection method, and training method and device of face detection model | |
Ren et al. | Adversarial examples: attacks and defenses in the physical world | |
WO2019218824A1 (en) | Method for acquiring motion track and device thereof, storage medium, and terminal | |
CN113822328B (en) | Image classification method for defending against sample attack, terminal device and storage medium | |
CN113066002B (en) | Method for generating adversarial samples, method, device and equipment for training neural network | |
Parmar et al. | Deeprange: deep‐learning‐based object detection and ranging in autonomous driving | |
Liu et al. | Protecting privacy in shared photos via adversarial examples based stealth | |
EP3376438B1 (en) | A system and method for detecting change using ontology based saliency | |
Siddiqui et al. | A novel lightweight defense method against adversarial patches-based attacks on automated vehicle make and model recognition systems | |
JP2023543015A (en) | Video detection methods, devices, electronic devices and storage media | |
Li et al. | Adversarial attacks in computer vision: a survey | |
Wei et al. | Visually adversarial attacks and defenses in the physical world: A survey | |
Touil et al. | Learning spatially correlation filters based on convolutional features via PSO algorithm and two combined color spaces for visual tracking | |
CN116844207A (en) | Multi-scale dynamic convolution face anti-counterfeiting method, system, equipment and medium | |
Lu et al. | Time-aware and task-transferable adversarial attack for perception of autonomous vehicles | |
Palle et al. | Automated image and video object detection based on hybrid heuristic-based U-net segmentation and faster region-convolutional neural network-enabled learning | |
Nguyen et al. | A Survey and Evaluation of Adversarial Attacks in Object Detection | |
Wang et al. | Adversarial examples in the physical world: A survey | |
Al-Abboodi et al. | A Novel Technique for Facial Recognition Based on the GSO‐CNN Deep Learning Algorithm | |
Kaur et al. | Improved facial biometric authentication using MobileNetV2 | |
Qin et al. | Adversarial attack for object detectors under complex conditions | |
CN109643390B (en) | Method, system and program product for object detection using spiking neural networks | |
Lin et al. | Out-of-bounding-box triggers: A stealthy approach to cheat object detectors |