Papers
Topics
Authors
Recent
Search
2000 character limit reached

Realistic Scatterer Based Adversarial Attacks on SAR Image Classifiers

Published 5 Dec 2023 in cs.CV | (2312.02912v1)

Abstract: Adversarial attacks have highlighted the vulnerability of classifiers based on machine learning for Synthetic Aperture Radar (SAR) Automatic Target Recognition (ATR) tasks. An adversarial attack perturbs SAR images of on-ground targets such that the classifiers are misled into making incorrect predictions. However, many existing attacking techniques rely on arbitrary manipulation of SAR images while overlooking the feasibility of executing the attacks on real-world SAR imagery. Instead, adversarial attacks should be able to be implemented by physical actions, for example, placing additional false objects as scatterers around the on-ground target to perturb the SAR image and fool the SAR ATR. In this paper, we propose the On-Target Scatterer Attack (OTSA), a scatterer-based physical adversarial attack. To ensure the feasibility of its physical execution, we enforce a constraint on the positioning of the scatterers. Specifically, we restrict the scatterers to be placed only on the target instead of in the shadow regions or the background. To achieve this, we introduce a positioning score based on Gaussian kernels and formulate an optimization problem for our OTSA attack. Using a gradient ascent method to solve the optimization problem, the OTSA can generate a vector of parameters describing the positions, shapes, sizes and amplitudes of the scatterers to guide the physical execution of the attack that will mislead SAR image classifiers. The experimental results show that our attack obtains significantly higher success rates under the positioning constraint compared with the existing method.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (20)
  1. L. Landuyt, A. Van Wesemael, G. J.-P. Schumann, R. Hostache, N. E. C. Verhoest, and F. M. B. Van Coillie, “Flood mapping based on synthetic aperture radar: An assessment of established approaches,” IEEE Transactions on Geoscience and Remote Sensing, vol. 57, no. 2, 2019.
  2. P. Zhan, W. Zhu, and N. Li, “An automated rice mapping method based on flooding signals in synthetic aperture radar time series,” Remote Sensing of Environment, vol. 252, 2021.
  3. T. Zhang, X. Zhang, J. Shi, and S. Wei, “Hyperli-net: A hyper-light deep learning network for high-accurate and high-speed ship detection from synthetic aperture radar imagery,” ISPRS Journal of Photogrammetry and Remote Sensing, vol. 167, pp. 123–153, 2020.
  4. M. Zhang, J. An, D. H. Yu, L. D. Yang, L. Wu, and X. Q. Lu, “Convolutional neural network with attention mechanism for sar automatic target recognition,” Geoscience and Remote Sensing Letters, vol. 19, 2022.
  5. J. Pei, Y. Huang, W. Huo, Y. Zhang, J. Yang, and T.-S. Yeo, “Sar automatic target recognition based on multiview deep learning framework,” IEEE Transactions on Geoscience and Remote Sensing, vol. 56, 2018.
  6. Z. Ying, C. Xuan, Y. Zhai, B. Sun, J. Li, W. Deng, C. Mai, F. Wang, R. D. Labati, V. Piuri, and F. Scotti, “Tai-sarnet: Deep transferred atrous-inception cnn for small samples sar atr,” Sensors, vol. 20, no. 6, 2020.
  7. B. Zhang, R. Kannan, V. Prasanna, and C. Busart, “Accurate, low-latency, efficient sar automatic target recognition on fpga,” in FPL, 2022.
  8. H. Li, H. Huang, L. Chen, J. Peng, H. Huang, Z. Cui, X. Mei, and G. Wu, “Adversarial examples for cnn-based sar image classification: An experience study,” IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, vol. 14, pp. 1333–1347, 2021.
  9. T. Huang, Q. Zhang, J. Liu, R. Hou, X. Wang, and Y. Li, “Adversarial attacks on deep-learning-based sar image target recognition,” Journal of Network and Computer Applications, vol. 162, p. 102632, 2020.
  10. B. Peng, B. Peng, S. Yong, and L. Liu, “An empirical study of fully black-box and universal adversarial attack for sar target recognition,” Remote Sensing, vol. 14, no. 16, 2022.
  11. C. Du and L. Zhang, “Adversarial attack for sar target recognition based on unet-generative adversarial network,” Remote Sensing, vol. 13, 2021.
  12. B. Peng, B. Peng, J. Zhou, J. Xia, and L. Liu, “Speckle-variant attack: Toward transferable adversarial attack to sar target recognition,” IEEE Geoscience and Remote Sensing Letters, vol. 19, pp. 1–5, 2022.
  13. E. R. Keydel, S. W. Lee, and J. T. Moore, “MSTAR extended operating conditions: a tutorial,” in Algorithms for Synthetic Aperture Radar Imagery III, vol. 2757.   SPIE, 1996, pp. 228 – 242.
  14. I. J. Goodfellow, J. Shlens, and C. Szegedy, “Explaining and harnessing adversarial examples,” 2015.
  15. A. Kurakin, I. Goodfellow, and S. Bengio, “Adversarial examples in the physical world,” 2017.
  16. B. Peng, B. Peng, J. Zhou, J. Xie, and L. Liu, “Scattering model guided adversarial examples for SAR target recognition: Attack and defense,” IEEE Transactions on Geoscience and Remote Sensing, vol. 60, 2022.
  17. M. Gerry, L. Potter, I. Gupta, and A. Van Der Merwe, “A parametric model for synthetic aperture radar measurements,” IEEE Transactions on Antennas and Propagation, vol. 47, no. 7, pp. 1179–1188, 1999.
  18. D. Malmgren-Hansen and M. Nobel-Jørgensen, “Convolutional neural networks for sar image segmentation,” in ISSPIT, 2015, pp. 231–236.
  19. S. Chen, H. Wang, F. Xu, and Y.-Q. Jin, “Target classification using the deep convolutional networks for sar images,” IEEE Transactions on Geoscience and Remote Sensing, vol. 54, no. 8, pp. 4806–4817, 2016.
  20. D. Malmgren-Hansen, “SARBake overlays for the MSTAR dataset,” 2017.
Citations (3)

Summary

No one has generated a summary of this paper yet.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.