[go: up one dir, main page]

Siddiqui et al., 2021 - Google Patents

A novel lightweight defense method against adversarial patches-based attacks on automated vehicle make and model recognition systems

Siddiqui et al., 2021

Document ID
15888937990315673532
Author
Siddiqui A
Boukerche A
Publication year
Publication venue
Journal of Network and Systems Management

External Links

Snippet

In smart cities, connected and automated surveillance systems play an essential role in ensuring safety and security of life, property, critical infrastructures and cyber-physical systems. The recent trend of such surveillance systems has been to embrace the use of …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/20Image acquisition
    • G06K9/32Aligning or centering of the image pick-up or image-field
    • G06K9/3233Determination of region of interest
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • G06K9/4671Extracting features based on salient regional features, e.g. Scale Invariant Feature Transform [SIFT] keypoints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00624Recognising scenes, i.e. recognition of a whole field of perception; recognising scene-specific objects
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30781Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F17/30784Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre
    • G06F17/30799Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre using low-level visual features of the video content
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/20Special algorithmic details

Similar Documents

Publication Publication Date Title
Wang et al. Towards a physical-world adversarial patch for blinding object detection models
Zhu et al. Adversarial attacks against lidar semantic segmentation in autonomous driving
CN111461089B (en) Face detection method, and training method and device of face detection model
Ren et al. Adversarial examples: attacks and defenses in the physical world
WO2019218824A1 (en) Method for acquiring motion track and device thereof, storage medium, and terminal
CN113822328B (en) Image classification method for defending against sample attack, terminal device and storage medium
CN113066002B (en) Method for generating adversarial samples, method, device and equipment for training neural network
Parmar et al. Deeprange: deep‐learning‐based object detection and ranging in autonomous driving
Liu et al. Protecting privacy in shared photos via adversarial examples based stealth
EP3376438B1 (en) A system and method for detecting change using ontology based saliency
Siddiqui et al. A novel lightweight defense method against adversarial patches-based attacks on automated vehicle make and model recognition systems
JP2023543015A (en) Video detection methods, devices, electronic devices and storage media
Li et al. Adversarial attacks in computer vision: a survey
Wei et al. Visually adversarial attacks and defenses in the physical world: A survey
Touil et al. Learning spatially correlation filters based on convolutional features via PSO algorithm and two combined color spaces for visual tracking
CN116844207A (en) Multi-scale dynamic convolution face anti-counterfeiting method, system, equipment and medium
Lu et al. Time-aware and task-transferable adversarial attack for perception of autonomous vehicles
Palle et al. Automated image and video object detection based on hybrid heuristic-based U-net segmentation and faster region-convolutional neural network-enabled learning
Nguyen et al. A Survey and Evaluation of Adversarial Attacks in Object Detection
Wang et al. Adversarial examples in the physical world: A survey
Al-Abboodi et al. A Novel Technique for Facial Recognition Based on the GSO‐CNN Deep Learning Algorithm
Kaur et al. Improved facial biometric authentication using MobileNetV2
Qin et al. Adversarial attack for object detectors under complex conditions
CN109643390B (en) Method, system and program product for object detection using spiking neural networks
Lin et al. Out-of-bounding-box triggers: A stealthy approach to cheat object detectors