Method for black box attack of pedestrian re-identification system

A pedestrian re-identification and black-box technology, applied in neural learning methods, character and pattern recognition, instruments, etc., can solve problems affecting attack effects

Pending Publication Date: 2021-07-13
SHENZHEN GRADUATE SCHOOL TSINGHUA UNIV
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it is undeniable that there are still differences between the surrogate model and the target model, and the existence of this difference affects the enhancement of the attack effect to a certain extent.
[0007] There is a lack of a method for targeted attacking pedestrian re-identification models under black-box conditions in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for black box attack of pedestrian re-identification system
  • Method for black box attack of pedestrian re-identification system
  • Method for black box attack of pedestrian re-identification system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the technical problems, technical solutions and beneficial effects to be solved by the embodiments of the present invention, the present invention will be described in further detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are merely intended to illustrate the invention and are not intended to limit the invention.

[0038] It should be noted that when the element is referred to as "fixed to" or "set to" another element, it can be directly on the other element or indirectly on the other element. When one element is called "connected to" another element, it can be directly connected to another element or indirectly connected to the other element. Additionally, the connection can be either used in a fixed action or a circuit communication function.

[0039] It is to be understood that the term "length", "width", "upper", "lower", "front", "post", "right", "vertical",...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for attacking a pedestrian re-identification system. The method comprises the following steps: training the pedestrian re-identification system by using a training data set; testing a pedestrian re-recognition system by using the query image before the attack; based on the mobility between the substitution model and a target model and the inquirability of the target model, black box attack is adopted to generate an adversarial sample for the pedestrian re-recognition system, and the adversarial sample is generated by adding disturbance to all query images of an attacked person; when the attacked query image is used for testing the pedestrian re-recognition system, the matching degree of the pedestrian re-recognition system and the query library image is reduced. The same disturbance is added to all images of an attacked person, so that a corresponding adversarial sample is generated, a new black box attack mode is formed, and the black box attack mode is more practical; time and labor are saved, and the attack effect is good.

Description

Technical field [0001] The present invention relates to the field of confrontation attacks and target tracking techniques in computer vision, in particular, to a method of attacked pedestrian re-identification systems. Background technique [0002] In recent years, with the advancement of society and the improvement of people's living standards, people have more and more emphasis on public safety issues. On the other hand, with the arrival of smart cities, the Internet of Things, the camera has nowhere to, which make up a large-scale camera network. This network-based video surveillance system provides a lot of video and image data. With these data, people can get many useful information to effectively solve public security issues. Since the amount of data is huge, how to quickly and accurately in these massive data, information about the specific pedestrians will be successfully locked, and the travel of the target person is successfully locked, and it is an urgent problem to be...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K9/62G06K9/00G06N3/04G06N3/08
CPCG06N3/084G06V40/103G06N3/048G06N3/045G06F18/22G06F18/214Y02T10/40
Inventor 王好谦陈炜欣
Owner SHENZHEN GRADUATE SCHOOL TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products