Case study of the FCA. The code can be find in FCA.
before | |||
after |
before | ||
after |
before | ||
after |
before | ||||||
after |
The first row is the original detection result. The second row is the camouflaged detection result.
before | ||||||
after |
The first row is the original detection result. The second row is the camouflaged detection result.
As we can see from the Figure, different loss terms plays different roles in attacking. For example, the camouflaged car generated by obj+smooth (we omit the smooth loss, and denotes as obj)
can hidden the vehicle successfully, while the camouflaged car generated by iou
can successfully suppress the detecting bounding box of the car region, and finally the camouflaged car generated by cls
successfully make the detector to misclassify the car to anther category.
original | basic initialization | random initialization | zero initialization |