Go to file
Tingsong 9e5c8d40e2 Update README.md
update paper website
2021-11-13 15:51:56 +08:00
assets update119 2021-09-13 09:50:02 +08:00
src update 116 2021-09-12 22:34:04 +08:00
README.md Update README.md 2021-11-13 15:51:56 +08:00
_config.yml Set theme jekyll-theme-slate 2021-09-07 16:16:21 +08:00

README.md

FCA: Learning a 3D Full-coverage Vehicle Camouflage for Multi-view Physical Adversarial Attack

FCA: Learning a 3D Full-coverage Vehicle Camouflage for Multi-view Physical Adversarial Attack pdf

Case study of the FCA. The code can be find in FCA.

Cases of Digital Attack

Carmear distance is 3

before
after

Carmear distance is 5

before
after

Carmear distance is 10

before
after

Cases of Multi-view Attack

before
after

The first row is the original detection result. The second row is the camouflaged detection result.

before
after

The first row is the original detection result. The second row is the camouflaged detection result.

Ablation study

Different combination of loss terms

As we can see from the Figure, different loss terms plays different roles in attacking. For example, the camouflaged car generated by obj+smooth (we omit the smooth loss, and denotes as obj) can hidden the vehicle successfully, while the camouflaged car generated by iou can successfully suppress the detecting bounding box of the car region, and finally the camouflaged car generated by cls successfully make the detector to misclassify the car to anther category.

Different initialization ways

original basic initialization random initialization zero initialization