A kind of anti-attack method for video action recognition that is not sensitive to sampling

An action recognition and sensitive technology, applied in neural learning methods, character and pattern recognition, instruments, etc., can solve the problems of affecting attack effect, failure, loss of video timing context features, etc., to ensure the flexibility of supply and the effect of expanding the scope

Active Publication Date: 2022-03-25
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] (1) Separate attack processing is performed on video frames. The rich time-domain connection characteristics of video frames in videos are ignored. In video data sets with complex timing reasoning, this method of separately processing video frames will lose video timing. Context features, thereby affecting the attack effect;
[0011] (2), Only the sampled video frame data is attacked and processed, and video-level confrontation attacks cannot be achieved
Since there are many frame sampling methods for a given video, if the adversarial attack processing is only performed on the sampled frame data under a certain sampling method, then the attack method will be invalid under another sampling method of the video

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kind of anti-attack method for video action recognition that is not sensitive to sampling
  • A kind of anti-attack method for video action recognition that is not sensitive to sampling
  • A kind of anti-attack method for video action recognition that is not sensitive to sampling

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0052] figure 1 It is a flow chart of the video action recognition confrontation attack method which is insensitive to sampling according to the present invention.

[0053] In this embodiment, as figure 1 As shown in the present invention, a sampling-insensitive video action recognition adversarial attack method includes the following steps:

[0054] S1, video sample set preprocessing

[0055] Manually divide the video sample set χ into the adversarial perturbation generation set χ 1 and the adversarial check set χ 2 , any video usually contains a large number of frames, and a few video frames are sampled to contain the patterns in the entire video, and the computational cost can be reduced. Therefore, the video needs to be sampled first, where the adversarial perturbation generation set is expressed as m 1 represents χ 1 The total number of video samples in the middle, the ith video sample X i ={x 1 ,x 2 ,…,x t ,...,x T }, x t Represents the t-th frame image, T i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a video action recognition confrontation attack method that is insensitive to sampling. The video sample set χ is manually divided into the confrontation disturbance generation set χ. 1 and the adversarial check set χ 2 , and then generate the set χ from the adversarial perturbation 1 The adversarial disturbance feature set V is extracted from the adversarial disturbance feature set V, and then based on the adversarial disturbance feature set V, combined with the adversarial verification set χ 2 , and obtain the optimal sampling-insensitive anti-disturbance R through iterative optimization. * , and finally add sampling-insensitive adversarial perturbation R to the test arbitrary video sample X * , and test the attack effect.

Description

technical field [0001] The invention belongs to the technical field of adversarial attack and video action recognition, and more particularly relates to a video action recognition adversarial attack method that is insensitive to sampling. Background technique [0002] In recent years, video data has grown exponentially on the Internet due to its easy availability. Information mining and content understanding based on these video data have important academic and commercial value. Video action recognition has received extensive attention as an important video content understanding problem. The existing mainstream recognition methods in the field of video action recognition are based on deep convolutional neural networks. However, in recent years, it has been proved that deep convolutional neural networks are vulnerable to adversarial attacks. Adversarial attacks mainly achieve the purpose of misclassifying existing deep network models by adding some noise to the data in the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06V40/20G06N3/04G06N3/08G06V20/40
CPCG06N3/08G06V40/23G06V20/46G06V20/41G06N3/045
Inventor 徐行张静然沈复民杨阳申恒涛
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products