<node id="611783">
  <nid>611783</nid>
  <type>news</type>
  <uid>
    <user id="34540"><![CDATA[34540]]></user>
  </uid>
  <created>1537537055</created>
  <changed>1537541525</changed>
  <title><![CDATA[Erasing Stop Signs: ShapeShifter Shows Self-Driving Cars Can Still Be Manipulated ]]></title>
  <body><![CDATA[<p>Georgia Tech researchers have confirmed that state-of-the-art image detection systems used in self-driving cars are vulnerable to attack.</p>

<p>According to new research, these systems are particularly vulnerable to a type of attack known as adversarial perturbation. In this type of attack, an object in the real world &ndash; like a stop sign &ndash; is intentionally altered to trick a machine learning system into identifying it as something else entirely different.&nbsp;</p>

<p>The vulnerability was confirmed using&nbsp;<em>ShapeShifter</em>, an attack tool developed by&nbsp;<strong>Shang-Tse Chen</strong>, a Ph.D. student in the&nbsp;<a href="https://www.cse.gatech.edu/">School of Computational Science and Engineering</a>&nbsp;(CSE), and fellow researchers from CSE and Intel.&nbsp;<em>ShapeShifter</em>is the first targeted physical adversarial attack on Faster R-CNN object detectors.</p>

<p>&ldquo;Our motivation comes from vandalism on traffic signs. Despite real vandalism not affecting DNNs (deep neural networks) greatly, in our work we show that we can craft adversarial perturbations that look like normal vandalism. But these perturbations can drastically change the output of a DNN model causing it to malfunction and identify things incorrectly,&rdquo; said Chen.</p>

<p>The goal in creating this attack system is to reveal the weaknesses within image recognition systems using object detectors, and figuring out how to defend against real attacks in the future.</p>

<p>&ldquo;<em>ShapeShifter&nbsp;</em>tells us that self-driving cars that depend purely on vision-based input are not safe until we can defend this kind of attack,&rdquo; said Chen. &ldquo;<em>ShapeShifter&nbsp;</em>was created to, and has succeeded in, attacking self-driving cars that use the state-of-the-art Faster R-CNN object detection algorithm.&rdquo;</p>

<p>There are many different types of object detectors, and it just happens that the current leading edge object detectors use deep neural networks (DNNs) internally. These detectors are able to recognize what objects are in an image and where they are located &ndash; much different than their simpler counterpart, image classifiers, that output a single label for an image.</p>

<p>&ldquo;For example, for an input image of a park, an image classifier will say it&rsquo;s a park. But, an object detector will tell us there are trees, people, and benches, and use bounding boxes to show their locations,&rdquo; explained Chen.&nbsp;</p>

<p>&ldquo;In our work, we only consider manipulating things that are outside of the computer vision system. Which, in this case, is the physical environment. Therefore, we craft physical adversarial objects that, after the image is captured by a camera, goes through a sequence of pre-processing, is fed to the DNN model, and ultimately tells the system makes an incorrect decision,&rdquo; said Chen.</p>

<p>An example of this can be seen in a&nbsp;video&nbsp;posted online. It shows&nbsp;<em>ShapeShifter&nbsp;</em>feeding false inputs to the system, causing it to misclassify a stop sign as a person.</p>

<p>Chen presented his&nbsp;<em>ShapeShifter</em>research at the&nbsp;<a href="http://www.ecmlpkdd2018.org/">European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases</a>&nbsp;(ECML-PKDD 2018) in Dublin, Ireland on Sept. 13.&nbsp;</p>

<p>The code repository for the paper can be found&nbsp;<a href="https://github.com/shangtse/robust-physical-attack">here</a>.</p>
]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2018-09-21T00:00:00-04:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[CSE Ph.D. student presents an adversarial attack method that is able to manipulate object detectors.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="611781">
            <nid>611781</nid>
            <type>image</type>
            <title><![CDATA[ShapeShifter still image of a stop sign being read incorrectly by a machine learning system]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>232910</fid>
                  <filename><![CDATA[ShapeShifterIMG.png]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/ShapeShifterIMG.png]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/ShapeShifterIMG.png]]></file_full_path>
                  <filemime>image/png</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[kristen.perez@cc.gatech.edu]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[<p><strong>Kristen Perez</strong></p>

<p>Communications Officer I</p>

<p>College of Computing - School of Computational Science and Engineering</p>
]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>47223</item>
          <item>50877</item>
      </og_groups>
  <og_groups_both>
      </og_groups_both>
  <field_categories>
      </field_categories>
  <core_research_areas>
          <term tid="39431"><![CDATA[Data Engineering and Science]]></term>
          <term tid="39541"><![CDATA[Systems]]></term>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>47223</item>
          <item>50877</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
          <item><![CDATA[School of Computational Science and Engineering]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>179180</tid>
        <value><![CDATA[object detectors]]></value>
      </item>
          <item>
        <tid>4305</tid>
        <value><![CDATA[cse]]></value>
      </item>
          <item>
        <tid>83261</tid>
        <value><![CDATA[Polo Chau]]></value>
      </item>
          <item>
        <tid>179178</tid>
        <value><![CDATA[Shang-Tse Chen]]></value>
      </item>
      </field_keywords>
  <field_userdata>
      <![CDATA[]]>
  </field_userdata>
</node>
