Video action recognition adversarial attack method insensitive to sampling

An action recognition and sensitive technology, applied in neural learning methods, character and pattern recognition, instruments, etc., can solve problems such as affecting attack effect, failure, loss of video timing context features, etc.

Active Publication Date: 2020-10-20
UNIV OF ELECTRONIC SCI & TECH OF CHINA
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] (1) Separate attack processing is performed on video frames. The rich time-domain connection characteristics of video frames in videos are ignored. In video data sets with complex timing reasoning, this method of separately processing video frames will lose video timing. Context features, thereby affecting the attack effect;
[0011] (2), Only the sampl

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Video action recognition adversarial attack method insensitive to sampling
  • Video action recognition adversarial attack method insensitive to sampling
  • Video action recognition adversarial attack method insensitive to sampling

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0053] figure 1 It is a flow chart of the video action recognition confrontation attack method which is insensitive to sampling according to the present invention.

[0054] In this embodiment, as figure 1 As shown in the present invention, a sampling-insensitive video action recognition adversarial attack method includes the following steps:

[0055] S1, video sample set preprocessing

[0056] Manually divide the video sample set χ into the adversarial perturbation generation set χ 1 and the adversarial check set χ 2 , any video usually contains a large number of frames, and a few video frames are sampled to contain the patterns in the entire video, and the computational cost can be reduced. Therefore, the video needs to be sampled first, where the adversarial perturbation generation set is expressed as m 1 represents χ 1 The total number of video samples in the middle, the ith video sample X i ={x 1 ,x 2 ,…,x t ,...,x T}, x t Represents the t-th frame image, T is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a video action recognition adversarial attack method insensitive to sampling. The method comprises the steps of: manually dividing a video sample set chi into an adversarial disturbance generation set chi 1 and an adversarial check set chi 2; extracting an adversarial disturbance feature set V from the adversarial disturbance generation set chi 1; and then based on the adversarial disturbance feature set V and verification of the adversarial verification set chi 2, obtaining an optimal sampling insensitive adversarial disturbance R * through an iterative optimization mode, and finally adding the sampling insensitive adversarial disturbance R * into any video sample X to be tested and testing an attack effect.

Description

technical field [0001] The invention belongs to the technical field of adversarial attack and video action recognition, and more particularly relates to a video action recognition adversarial attack method that is insensitive to sampling. Background technique [0002] In recent years, video data has grown exponentially on the Internet due to its easy availability. Information mining and content understanding based on these video data have important academic and commercial value. Video action recognition has received extensive attention as an important video content understanding problem. The existing mainstream recognition methods in the field of video action recognition are based on deep convolutional neural networks. However, in recent years, it has been proved that deep convolutional neural networks are vulnerable to adversarial attacks. Adversarial attacks mainly achieve the purpose of misclassifying existing deep network models by adding some noise to the data in the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K9/00G06N3/04G06N3/08
CPCG06N3/08G06V40/23G06V20/46G06V20/41G06N3/045
Inventor 徐行张静然沈复民杨阳申恒涛
Owner UNIV OF ELECTRONIC SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products