Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
110 tokens/sec
GPT-4o
56 tokens/sec
Gemini 2.5 Pro Pro
44 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

SA-Attack: Speed-adaptive stealthy adversarial attack on trajectory prediction (2404.12612v1)

Published 19 Apr 2024 in cs.LG and cs.CV

Abstract: Trajectory prediction is critical for the safe planning and navigation of automated vehicles. The trajectory prediction models based on the neural networks are vulnerable to adversarial attacks. Previous attack methods have achieved high attack success rates but overlook the adaptability to realistic scenarios and the concealment of the deceits. To address this problem, we propose a speed-adaptive stealthy adversarial attack method named SA-Attack. This method searches the sensitive region of trajectory prediction models and generates the adversarial trajectories by using the vehicle-following method and incorporating information about forthcoming trajectories. Our method has the ability to adapt to different speed scenarios by reconstructing the trajectory from scratch. Fusing future trajectory trends and curvature constraints can guarantee the smoothness of adversarial trajectories, further ensuring the stealthiness of attacks. The empirical study on the datasets of nuScenes and Apolloscape demonstrates the attack performance of our proposed method. Finally, we also demonstrate the adaptability and stealthiness of SA-Attack for different speed scenarios. Our code is available at the repository: https://github.com/eclipse-bot/SA-Attack.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (30)
  1. Agentformer: Agent-aware transformers for socio-temporal multi-agent forecasting. In Proceedings of the IEEE/CVF International Conference on Computer Vision, pages 9813–9823, 2021.
  2. A memory-attention hierarchical model for driving-behavior recognition and motion prediction. International journal of automotive technology, 22:895–908, 2021.
  3. Trajectron++: Dynamically-feasible trajectory forecasting with heterogeneous data. In Computer Vision–ECCV 2020: 16th European Conference, Glasgow, UK, August 23–28, 2020, Proceedings, Part XVIII 16, pages 683–700. Springer, 2020.
  4. Grip++: Enhanced graph-based interaction-aware trajectory prediction for autonomous driving. arXiv preprint arXiv:1907.07792, 2019.
  5. Advdo: Realistic adversarial attacks for trajectory prediction. In European Conference on Computer Vision, pages 36–52. Springer, 2022.
  6. On adversarial robustness of trajectory prediction for autonomous vehicles. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pages 15159–15168, 2022.
  7. When human pose estimation meets robustness: Adversarial algorithms and benchmarks. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pages 11855–11864, 2021.
  8. Kinodynamic motion planning with state lattice motion primitives. In 2011 IEEE/RSJ International Conference on Intelligent Robots and Systems, pages 2172–2179. IEEE, 2011.
  9. Online generation of kinodynamic trajectories for non-circular omnidirectional robots. In 2011 IEEE International Conference on Robotics and Automation, pages 72–77. IEEE, 2011.
  10. Fast, continuous state path smoothing to improve navigation accuracy. In 2015 IEEE International Conference on Robotics and Automation (ICRA), pages 662–669. IEEE, 2015.
  11. Tnt: Target-driven trajectory prediction. In Conference on Robot Learning, pages 895–904. PMLR, 2021.
  12. nuscenes: A multimodal dataset for autonomous driving. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pages 11621–11631, 2020.
  13. The apolloscape dataset for autonomous driving. In Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pages 954–960, 2018.
  14. Social lstm: Human trajectory prediction in crowded spaces. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 961–971, 2016.
  15. Social attention: Modeling attention in human crowds. In 2018 IEEE international Conference on Robotics and Automation (ICRA), pages 4601–4607. IEEE, 2018.
  16. Trajectory prediction for intelligent vehicles using spatial-attention mechanism. IET Intelligent Transport Systems, 14(13):1855–1863, 2020.
  17. Vectornet: Encoding hd maps and agent dynamics from vectorized representation. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pages 11525–11533, 2020.
  18. Hivt: Hierarchical vector transformer for multi-agent motion prediction. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pages 8823–8833, 2022.
  19. Graph convolutional networks: a comprehensive review. Computational Social Networks, 6(1):1–23, 2019.
  20. Multimodal trajectory predictions for autonomous driving using deep convolutional networks. In 2019 International Conference on Robotics and Automation (ICRA), pages 2090–2096. IEEE, 2019.
  21. Trafficpredict: Trajectory prediction for heterogeneous traffic-agents. In Proceedings of the AAAI conference on artificial intelligence, volume 33, pages 6120–6127, 2019.
  22. Towards adversarially robust object detection. In Proceedings of the IEEE/CVF International Conference on Computer Vision, pages 421–430, 2019.
  23. An adversarial attack on salient regions of traffic sign. Automotive Innovation, pages 1–14, 2023.
  24. Fooling detection alone is not enough: Adversarial attack against multiple object tracking. In International Conference on Learning Representations (ICLR’20), 2020.
  25. Dirty road can attack: Security of deep learning based automated lane centering under {{\{{Physical-World}}\}} attack. In 30th USENIX Security Symposium (USENIX Security 21), pages 3309–3326, 2021.
  26. On adversarial robustness of semantic segmentation models for automated driving. In 2022 IEEE Intelligent Vehicles Symposium (IV), pages 867–873. IEEE, 2022.
  27. Claude E Shannon. Communication theory of secrecy systems. The Bell system technical journal, 28(4):656–715, 1949.
  28. Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083, 2017.
  29. Jarrod M Snider et al. Automatic steering methods for autonomous automobile path tracking. Robotics Institute, Pittsburgh, PA, Tech. Rep. CMU-RITR-09-08, 2009.
  30. Motion planning for autonomous vehicles in highly constrained urban environments. In 2016 IEEE/RSJ international conference on intelligent robots and systems (IROS), pages 4708–4713. IEEE, 2016.
User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (4)
  1. Huilin Yin (14 papers)
  2. Jiaxiang Li (22 papers)
  3. Pengju Zhen (2 papers)
  4. Jun Yan (247 papers)

Summary

We haven't generated a summary for this paper yet.