Ph.D. in Computer Science

University of Exeter

Student: Han Wu
Supervisors: Dr. Johan Wahlström and Dr. Sareh Rowlands
Expected completion date: 24/May/2024

Research Website


① Adversarial Driving: Attacking End-to-End Autonomous Driving System. [Paper]

② Adversarial Detection: Attacking Object Detection in Real Time. [Paper]


③ A Man-in-the-Middle Attack against Object Detection System. [Paper]

④ Distributed Black-box Attack against Image Classification. [Paper]


⑤ Coming soon.


⑥ Adversarial Tracking: Real-time Adversarial Attacks against Object Tracking. [Proposal]

⑦ Adversarial Patch: Physical Patch in Carla Simulator. [Proposal]


⑧ A WHite-box Adversarial Toolbox (WHAT). [GitHub]

⑨ A Black-box Adversarial Toolbox (BAT). [GitHub]


🄋 Interpretable Machine Learning for COVID-19. [Paper]

Week 0

2022/08/15 - 2022/09/18

Three Demo Videos for ICRA 2023.


Three Draft Papers for ICRA 2023:

The ICRA 2023 paper submission deadline is 15 September 2022.


One Draft Paper for MLSys 2023:

  • Distributed Black-box Attack against Image Classification Cloud Services.

The MLSys 2023 paper submission deadline is 28 October 2022.

Week 1

2022/09/26 - 2022/10/02

Whether black-box attacks are real threats or just research stories?

MLSys 2023:

  • Paper Submission: Friday, October 28, 2023 4pm ET
  • Page Length: Up to 10 pages long, not including references (10 + n)

Survey

Black-box attacks rely on queries but attacking real-world image classification models in cloud services could cost 20,000 to 50,000 queries for a single attack, which means attacking a single image could cost $480 - $1200 and 5-14 hours (Ilyas et al.) and the attack is not guaranteed to succeed (the success rate is not 100%).

The following evaluation metrics are important for black-box attacks:

  • Success Rate: Initial research focused on improving the success rate.
  • Number of Queries: Recent research interests shifted to reducing the number of queries.
  • Time Cost: I notice that reducing the number of queries is not the only way to accelerate black-box attacks (also possible via distributed queries).

In a survey paper (Bhambri et al.), black-box attacks are classified into:

  • Gradient-based Methods
  • Local Search
  • Combinatorics
  • Transferability

Problems

For black-box attacks against cloud services:

  • The more queries we sent simultaneously, the faster the attack is.
  • Do we need to start from scratch every time we attack the same model?
  • Experiments: we shouldn't assume access to pre-processing methods.

Plan

Week 1 - Week 5 (Total: 5 weeks)

Week 1:

  • Local Search

    • SimBA (2019)
    • Square Attack (2020)

Week 2:

  • Gradient Estimation

    • Limited Query (2018)
    • Bandits (2019)
  • The Draft for MLSys 2023. (Introduction)

Week 3: The Draft for MLSys 2023. (Methodology)

Week 4: The Draft for MLSys 2023. (Experiment)

Week 5: Revision & Submission.

Week 2

2022/10/03 - 2022/10/09

Acceleration Ratio

The distributed square attack can reduce the attack time from ~15h to ~4h.

Source Code: https://github.com/wuhanstudio/adversarial-classification

Common Mistakes

While implementing distributed black-box attacks, I noticed that some prior research made several common mistakes in their code. Their methods outperformed state-of-the-art partly because these mistakes gave them access to extra information that should not be available for black-box attacks. For example:

  • They apply the perturbation after image resizing, assuming they know the input image size of a black-box model.
  • The bandit attack does not clip the image while estimating gradients, assuming they can send invalid images (pixel value > 255 or < 0) to the black-box model.

Besides these mistakes, some methods are less effective while attacking real-world image classification APIs:

  • They assume they can perturb a pixel value from 105 to 105.45 (float), while real-world input images are 8-bit integers, thus some perturbations are mitigated after data type conversion: int(105.45) == 105.

  • Cloud APIs accept JPEG or PNG images (lossy compression) as input, while prior research assumes they can add perturbations to the raw pixels. After JPEG encoding, some adversarial perturbation gets lost.

As a result, some prior research compared their methods with others under on unfair settings. To prevent making these mistakes, I designed my own image classification cloud service for further research, so that we have a fair comparison.

Why they made these mistakes

They tested their attacks against local models on their computers (they have access to the file model.h5), and rely on themselves to restrain access to model information. Intentionally or unintentionally, they exploit extra information to improve their methods. For example:

  • A Pytorch / Tensorflow model makes predictions using the function model.predict(X), and the function only accepts input images X as arrays. We can't stack images of different shapes to be an array, thus they resize the images to be the same size so that the function won't give errors, which is a mistake.
  • The function model.predict(X) won't give errors even if the image X contains negative values. Thus they are unaware that their methods generate invalid images.
  • The function model.predict(X) accepts float numbers, thus they did not convert their input images to be integers.
  • The function model.predict(X) accepts raw images, thus they did not encode their inputs.

Plan

Week 1:

  • Local Search

    [●] SimBA (2019)

    [●] Square Attack (2020)

Week 2:

  • Gradient Estimation

    [  ] Limited Query (2018) (NES Gradient Estimation)

    [●] Bandits (2019) (The Data and Time priors)

  • Cloud Service APIs

    [●] Cloud Vision (Google)

    [●] Imagga

    [●] Deep API (ours)

  • The Draft for MLSys 2023. (Introduction)

Week 3

2022/10/10 - 2022/10/16

Most experiments were completed.

1. Pre-processing

Experiment Settings:

  • Attacking 1000 images in the ImageNet dataset.

  • $L_{\inf}$ = 0.05

  • Max number of queries for each image = 1,000

Model Accuracy (1000 samples):

EnvironmentInception v3Resnet 50VGG16
Local Model75.90%70.90%65.20%
DeepAPI75.70%70.80%65.00%

Before Pre-processing (Local):

AttackAvg. QueriesAttack Success RateTotal Queries
IRVIRVIRV
SimBA745.40690.50630.753.04%4.33%5.13%745,000691,000631,000
Square178.4088.47102.1091.30%97.46%95.40%135,00062,70066,400
Bandits520.40403.00382.1041.37%55.01%57.52%520,000403,000382,000

After Pre-processing (Cloud):

AttackAvg. QueriesAttack Success RateTotal Queries
IRVIRVIRV
SimBA744.75697.60633.253.33%3.64%8.9%745,000697,000633,000
Square290.50194.15223.6083.01%92.15%88.30%222,000138,700145,100
Bandits683.35639.55596.2010.80%11.17%9.47%681,000639,000596,000

2. Distributed Queries

Distributed queries (8 workers):

Cloud Service1 query2 queries10 queries20 queries
Cloud Vision446.68ms353.61ms684.25ms1124.82ms
Imagga1688.11ms2331.81ms10775.75ms21971.77ms
DeepAPI (ours)538.47ms643.17ms1777.81ms1686.36ms

3. Distributed Attacks

Experiment Settings:

  • Attacking 100 images in the ImageNet dataset.

  • $L_{\inf}$ = 0.05

  • max number of queries for each image = 1,000

3.1 Non-Distributed:

AttackAvg. QueriesAttack Success RateTotal QueriesTime (min)
IRVIRVIRVIRV
SimBA775.10739.60729.702.56%4.00%2.70%77,50074,00073,000662638657
Square359.80200.10227.6078.21%93.33%91.89%28,10015,40016,80030181175
Bandits730.30688.30697.707.69%9.33%6.76%73,00068,80069,800758629670

3.2 Horizontal Distribution:

AttackAvg. QueriesAttack Success RateTotal QueriesTime (min)
IRVIRVIRVIRV
SimBA772.50738.80727.702.56%2.67%2.70%77,30073,90072,800148133226
Square359.80204.70222.8078.21%93.33%90.54%28,10015,40016,500482458
Bandits740.50672.60706.805.13%10.67%5.41%73,70067,00070,400221202292

3.3 Vertical Distribution:

AttackAvg. QueriesAttack Success RateTotal Queries
IRVIRVIRV
SimBA
Square
Bandits

Plan

  • Week 4: Draft

  • Week 5: Revision and Submission

Week 4

2022/10/17 - 2022/10/23

Completed all experiments except vertical distribution (need one more day).

The experiments used up $300 free tier provided by Microsoft Azure.

Plan

  • Week 5: Revision and Submission

Week 5

2022/10/24 - 2022/10/30

One Draft Paper for MLSys 2023:

  • Distributed Black-box Attack against Image Classification Cloud Service: PDF

One Demo Video for MLSys 2023.

Plan

  • Week 6: Reinforcement Learning

Week 6

2022/10/31 - 2022/11/06

Reinforcement Learning

Textbook (Sutton & Barto):

Online Courses:

Week 7

2022/11/07 - 2022/11/13

1. Reinforcement Learning

Trade-off between exploration and exploitation.

1.1 Tabular Solution

The state and action spaces are small enough for the approximate value functions to be represented as arrays or tables.

  • Finite Markov Decision Process
  • Dynamic Programming
  • Monte Carlo Methods

TD learning combines some of the features of both Monte Carlo and Dynamic Programming (DP) methods.


  • Temporal-Difference Learning
  • n-step Bootsrapping

1.2 Approximate Solution Methods

Problems with arbitrary large state spaces.


  • Prediction Task: Evaluate a given policy by estimating the value of taking actions following the policy.

  • Control Task: Find the optimal policy that gets most rewards.


  • On-policy: Estimate the value of a policy while using it for control.

  • Off-policy: The policy used to generate behaviour, called the behaviour policy, may be unrelated to the policy that is evaluated and improved, called the estimation policy.


  • On-policy TD Prediction
    • TD(0)
  • On-policy TD Control
    • SARSA
  • Off-policy TD Control
    • Q-Learning
    • Dyna-Q and Dynq-Q+
    • Expected SARSA

  • Policy Gradient Methods
    • REINFORCE
    • Actor-Critic
    • Advantage Actor-Critic (A2C)

2. Webots Simulator (ROS2)

Multi-agent Reinforcement Learning.

Week 8

2022/11/14 - 2022/11/20

Multi-Agent Reinforcement Learning (MARL)

Trade-off between exploration and exploitation.

Paper:

Books:

Environments:

Week 9

2022/11/21 - 2022/11/27

Travel

  • Exeter --> London --> Hong Kong

Week 10

2022/11/28 - 2022/12/04

Travel

  • Hong Kong (self-isolation)

Week 11

2022/12/05 - 2022/12/11

Travel

  • Shen Zhen (self-isolation)

Week 12

2022/12/12 - 2022/12/18

Travel

Week 13

2022/12/19 - 2022/12/25

Travel

Week 14

2022/12/26 - 2023/01/01

Travel

  • Guangzhou --> Singapore --> London --> Exeter

Week 0

2023/01/02 - 2023/01/08

Research Plan

  • Milestone 1: Reinforcement Learning: Is reinforcement-learning-based end-to-end driving model secure?
  • Milestone 2: Adversarial Tracking: Real-time adversarial attacks against Object Tracking.
  • Milestone 3: Adversarial Patch: Physical Patch in Carla Simulator.

Week 1

2023/01/09 - 2023/01/15

Multi-Agent Connected Autonomous Driving (MACAD)

OpenAI Gym environment

  • Environments:

    • Hete Ncom | Inde | PO Intrx MA | TLS 1B2C1P TWN3-v0

    • Homo Ncom | Inde | PO Intrx MA | SS 3C TWN3-v0

  • Observation Space: Images (168 x 168 x 3).

  • Action Space: 9 discrete actions.

RL Methods

Baseline

Discrete Action Space:

Continuous Action Space:

Advanced

Continuous Action Space:

Other Platforms

Week 2

2023/01/16 - 2023/01/22

MLSys 2023 (Author Feedback)

There will be another discussion before making the final decision (17th Feb.).

Future Plan

IROS (Mar. 2023)

  • Adversarial Driving
    • End-to-End Imitation Learning.
    • End-to-End Reinforcement Learning.
  • Adversarial Detection

IEEE Journal & Conference

  • IEEE Intelligent Vehicle Symposium
  • IEEE Intelligent Transportation Systems Conference.

ICCV (Jun. 2023) or BMVC (Jul. 2023)

  • Man-in-the-Middle Attack (WHAT)
  • Distributed Black-box Attack (BAT)

CVPR (Nov. 2023) or IJCAI (Jan. 2024)

  • Adversarial Tracking (Carla)
  • Adversarial Patch (Carla)

Week 3

2023/01/23 - 2023/01/29

IEEE Intelligent Vehicle Symposium

IEEE Conference

  • Paper Submission Deadline: February 01, 2023.
  • Page Limit: At most 8 pages.

Re-structured two manuscripts:

  • Adversarial Driving

    • Added more references.
    • Highligted the difference between online and offline attacks.
    • Added experiments on the FPS of the attack (CPU and GPU).
  • Adversarial Detection

    • Added more references.
    • Added experiments on the FPS of the attack (GPU).

Week 4

2023/01/30 - 2023/02/05

IEEE Intelligent Vehicle Symposium

Notification of Acceptance March 30, 2023.

  • Adversarial Driving
  • Adversarial Detection

Reinforcement Learning

[●] Deep SARSA
[●] Deep Q Network

[  ] REINFORCE
[  ] A2C / A3C

[  ] DDPG
[  ] TRPO & PPO

[  ] SAC
[  ] TD3

Week 5

2023/02/06 - 2023/02/12

UWE Bristol

Adversarial Attacks

  • Adversarial Driving
  • Adversarial Detection

  • [22/May] Third-Year Report
  • Imitation Learning vs Reinforcement Learning

  • A Man-in-the-Middle Attack (WHAT)
  • Distributed Black-box Attack (BAT)

  • Adversarial Tracking (Carla)
  • Physical Patch (Carla)

Adversarial RL

Reinforcement Learning

[●] Deep SARSA
[●] Deep Q Network

[●] REINFORCE
[●] A2C / A3C

[  ] DDPG
[  ] TRPO & PPO

[  ] SAC
[  ] TD3

Week 6

2023/02/13 - 2023/02/19

OpenEuler Meetup

Recorded video will be available on YouTube and Bilibili this Thursday.

MSc Project

  • Real-time End-to-End Driving

    • Wei Yu
    • Jinming Wang
  • Real-time Vehicle Tracking

    • Bhavana
    • Jagadeesh

Deep Q Network

  • Double DQN
  • Dueling DQN
  • Prioritized Experience Replay
  • Noisy DQN
  • N-step DQN
  • Distributional DQN

Reinforcement Learning

[●] Deep SARSA
[●] Deep Q Network

[●] REINFORCE
[●] A2C / A3C

[  ] DDPG
[  ] TRPO & PPO

[  ] SAC
[  ] TD3

Week 7

2023/02/20 - 2023/02/26

Paper Submission

[IEEE IV] Decision: 30 March

  • Adversarial Driving
  • Adversarial Detection

[IEEE ITS] Submission: 13 May

  • Adversarial Driving
  • Adversarial Detection

[BMVC] Submission: 12 May

  • Man-in-the-Middle Attack
  • Distributed Black Box Attack

[Third-year Report] Submission: 24 May


[ICLR / CVPR] Submission: Sep 2024

  • Adversarial Tracking
  • Physical Patch

Research Plan

  • Jan. Reinforcement Learning
  • Feb. Reinforcement Learning

  • Mar. Object Tracking
  • Apr. Object Tracking

  • May. WHAT & BAT (Resubmission)

HPC ( JADE 2 Cluster )

Hartree Centre Login

https://um.hartree.stfc.ac.uk/hartree/login.jsp

The Slurm Scheduler

https://docs.jade.ac.uk/en/latest/jade/scheduler/


Allocate a temporary node with 8 GPUS:

srun --gres=gpu:8 --pty bash

Allocate a small partition with 1 GPU:

srun --gres=gpu:1 -p small --pty bash

# 20 CPU Cores / 40 Threads
# 32 GB VRAM / 512 GB RAM

Submit and monitor jobs:

sbatch
sacct
squeue
scancel

Deep Q Network

  • Double DQN
  • Dueling DQN
  • Prioritized Experience Replay
  • Noisy DQN
  • N-step DQN
  • Distributional DQN

Reinforcement Learning

[●] Deep SARSA
[●] Deep Q Network

[●] REINFORCE
[●] A2C / A3C

[●] DDPG
[●] TRPO & PPO

[  ] SAC
[  ] TD3

Week 8

2023/02/27 - 2023/03/05

Research Plan

  • Jan. Reinforcement Learning
  • Feb. Reinforcement Learning

  • Mar. Object Tracking
  • Apr. Object Tracking

  • May. WHAT & BAT (Resubmission)

Reinforcement Learning

Four Courses on Coursera:

Four Courses on Udemy:

Two Books:

Deep Q Network

  • Double DQN
  • Dueling DQN
  • Prioritized Experience Replay
  • Noisy DQN
  • N-step DQN
  • Distributional DQN

Reinforcement Learning

[●] Deep SARSA
[●] Deep Q Network

[●] REINFORCE
[●] A2C / A3C

[●] GAE / NAF / HER

[●] DDPG
[●] TRPO & PPO

[●] SAC
[●] TD3

Week 9

2023/03/06 - 2023/03/12

Research Plan

  • Jan. Reinforcement Learning
  • Feb. Reinforcement Learning

  • Mar. Object Tracking

  • Apr. Man-in-the-Middle - WHAT (Resubmission)
  • May. Distributed Black-Box - BAT (Resubmission)

Adversarial Tracking

[●] Object Tracking (Computer Vision)
[   ] Vehicle Tracking (Autonomous Driving)
[   ] Adversarial Tracking
[   ] Adversarial Patch

Week 10

2023/03/13 - 2023/03/19

Research Plan

  • Jan. Reinforcement Learning
  • Feb. Reinforcement Learning

  • Mar. Object Tracking

  • Apr. Man-in-the-Middle - WHAT (Resubmission)
  • May. Distributed Black-Box - BAT (Resubmission)

Research Papers

Papers Accepted (x3):

  • Interpretable Machine Learning for COVID-19, IEEE Trans on AI.
  • Adversarial Driving: Attacking End-to-End Autonomous Driving System, IEEE Intelligent Vehicle.
  • Adversarial Detection: Attacking Object Detection in Real Time, IEEE Intelligent Vehicle.

Papers to be submitted (x2):

  • A Man-in-the-Middle Attack against Object Detection System.
  • Distributed Black-box Attack against Image Classification Cloud Services.

Papers to be written (x2):

  • Adversarial Tracking: Real-time Adversarial Attacks against Object Tracking.
  • Adversarial Patch: Physical Patch in Carla Simulator.

Undetermined (x2):

  • Reinforcement Learning.
  • Interpretation and Defence.

Adversarial Tracking

[●] Object Tracking (Computer Vision)
[●] Vehicle Tracking (Autonomous Driving)
[   ] Adversarial Tracking
[   ] Adversarial Patch

Week 11

2023/03/20 - 2023/03/26

Research Plan

  • Jan. Reinforcement Learning
  • Feb. Reinforcement Learning

  • Mar. Object Tracking

  • Apr. Man-in-the-Middle - WHAT (Resubmission)
  • May. Distributed Black-Box - BAT (Resubmission)

Adversarial Tracking

[●] Object Tracking (Computer Vision)
[●] Vehicle Tracking (Autonomous Driving)
[●] Adversarial Tracking (Research Proposal)
[   ] Adversarial Patch

Week 12

2023/03/27 - 2023/04/02

Research Plan

  • Jan. Reinforcement Learning
  • Feb. Reinforcement Learning

  • Mar. Object Tracking

  • Apr. Man-in-the-Middle - WHAT (BMVC)
  • May. Distributed Black-Box - BAT (BMVC)

Research Papers

Papers Accepted (x3):

  • Interpretable Machine Learning for COVID-19, IEEE Trans on AI.
  • Adversarial Driving: Attacking End-to-End Autonomous Driving System, IEEE Intelligent Vehicle.
  • Adversarial Detection: Attacking Object Detection in Real Time, IEEE Intelligent Vehicle.

Papers to be submitted (x2):

  • A Man-in-the-Middle Attack against Object Detection System.
  • Distributed Black-box Attack against Image Classification Cloud Services.

Papers to be written (x2):

  • Adversarial Tracking: Real-time Adversarial Attacks against Object Tracking.
  • Adversarial Patch: Physical Patch in Carla Simulator.

Adversarial Tracking

[●] Object Tracking (Computer Vision)
[●] Vehicle Tracking (Autonomous Driving)
[●] Adversarial Tracking (Research Proposal)
[●] Adversarial Patch      (Research Proposal)

Week 13

2023/04/03 - 2023/04/09

Research Plan

  • Jan. Reinforcement Learning
  • Feb. Reinforcement Learning

  • Mar. Object Tracking

  • Apr. Man-in-the-Middle - WHAT (BMVC)
  • May. Distributed Black-Box - BAT (BMVC)

IEEE IV 2023

[●] The T1 System

[●] Conference Registration
[●] Final Manuscript
[●] Invitation Letter

[   ] The US Visa Application

[   ] Flight Tickets
[   ] Accommodation

BMVC 2023

[   ] Man-in-the-Middle Attack
[   ] Distributed Black-box Attack

Week 14

2023/04/10 - 2023/04/16

Research Plan

  • Jan. Reinforcement Learning
  • Feb. Reinforcement Learning

  • Mar. Object Tracking

  • Apr. Man-in-the-Middle - WHAT (BMVC)
  • May. Distributed Black-Box - BAT (BMVC)

IEEE IV 2023

[●] The T1 System

[●] Conference Registration
[●] Final Manuscript
[●] Invitation Letter

[●] The US Visa Application

[   ] Flight Tickets
[●] Accommodation

BMVC 2023

[   ] Man-in-the-Middle Attack
[   ] Distributed Black-box Attack

Week 15

2023/04/17 - 2023/04/23

Research Plan

  • Jan. Reinforcement Learning
  • Feb. Reinforcement Learning

  • Mar. Object Tracking

  • Apr. Man-in-the-Middle - WHAT (BMVC)
  • May. Distributed Black-Box - BAT (BMVC)

IEEE IV 2023

[●] The T1 System

[●] Conference Registration
[●] Final Manuscript
[●] Invitation Letter

[●] The US Visa Application

[   ] Flight Tickets
[●] Accommodation

BMVC 2023

[   ] Man-in-the-Middle Attack (9 pages)
[   ] Distributed Black-box Attack (9 pages)

Week 16

2023/04/24 - 2023/04/30

Research Plan

  • Jan. Reinforcement Learning
  • Feb. Reinforcement Learning

  • Mar. Object Tracking

  • Apr. Man-in-the-Middle - WHAT (BMVC)
  • May. Distributed Black-Box - BAT (BMVC)

IEEE IV 2023

[●] The T1 System

[●] Conference Registration
[●] Final Manuscript
[●] Invitation Letter

[●] The US Visa Application

[   ] Flight Tickets
[●] Accommodation

BMVC 2023

[   ] Man-in-the-Middle Attack (9 pages) [Toolbox]
[   ] Distributed Black-box Attack (9 pages) [Toolbox]

Week 17

2023/05/01 - 2023/05/07

Research Plan

  • Jan. Reinforcement Learning
  • Feb. Reinforcement Learning

  • Mar. Object Tracking

  • Apr. Man-in-the-Middle - WHAT (BMVC)
  • May. Distributed Black-Box - BAT (BMVC)

IEEE IV 2023

[●] The T1 System

[●] Conference Registration
[●] Final Manuscript
[●] Invitation Letter

[●] The US Visa Application

[   ] Flight Tickets
[●] Accommodation

BMVC 2023

[●] The hardware attack (Buildroot and Raspi OS)
[   ] Man-in-the-Middle Attack (9 pages) [Toolbox]
[   ] Distributed Black-box Attack (9 pages) [Toolbox]

Week 18

2023/05/08 - 2023/05/14

Research Plan

  • Jan. Reinforcement Learning
  • Feb. Reinforcement Learning

  • Mar. Object Tracking

  • Apr. Man-in-the-Middle - WHAT (BMVC)
  • May. Distributed Black-Box - BAT (BMVC)

IEEE IV 2023

[●] The T1 System

[●] Conference Registration
[●] Final Manuscript
[●] Invitation Letter

[●] The US Visa Application

[   ] Flight Tickets
[●] Accommodation

[   ] Adversarial Driving (oral)
[   ] Adversarial Detection (poster)

BMVC 2023

[●] The third-year report
[●] The hardware attack (Buildroot and Raspi OS)

[●] Man-in-the-Middle Attack (9 pages) [Toolbox]
[●] Distributed Black-box Attack (9 pages) [Toolbox]

Week 19

2023/05/15 - 2023/05/21

Research Plan

  • Jan. Reinforcement Learning
  • Feb. Reinforcement Learning

  • Mar. Object Tracking

  • Apr. Man-in-the-Middle - WHAT (BMVC)
  • May. Distributed Black-Box - BAT (BMVC)

IEEE IV 2023

[●] The T1 System

[●] Conference Registration
[●] Final Manuscript
[●] Invitation Letter

[●] The US Visa Application

[   ] Flight Tickets
[●] Accommodation

[●] Adversarial Driving (oral)
[●] Adversarial Detection (poster)

BMVC 2023

[●] The third-year report
[●] The hardware attack (Buildroot and Raspi OS)

[●] Man-in-the-Middle Attack (9 pages) [Toolbox]
[●] Distributed Black-box Attack (9 pages) [Toolbox]

Week 20

2023/05/22 - 2023/05/28

Research Plan

  • Jan. Reinforcement Learning
  • Feb. Reinforcement Learning

  • Mar. Object Tracking

  • Apr. Man-in-the-Middle - WHAT (BMVC)
  • May. Distributed Black-Box - BAT (BMVC)

IEEE IV 2023

[●] The T1 System

[●] Conference Registration
[●] Final Manuscript
[●] Invitation Letter

[●] The US Visa Application

[x] Flight Tickets
[x] Accommodation

[●] Adversarial Driving (oral)
[●] Adversarial Detection (poster)

[●] Substitute Presenters

BMVC 2023

[●] The third-year report
[●] The hardware attack (Buildroot and Raspi OS)

[●] Man-in-the-Middle Attack (9 pages) [Toolbox]
[●] Distributed Black-box Attack (9 pages) [Toolbox]

Week 21

2023/05/29 - 2023/06/04

Talk

Toolbox

  • WHitebox-Adversarial-Toolbox (WHAT)
  • Blackbox-Adversarial-Toolbox (BAT)

Research Plan

  • Jun. Adversarial Tracking

Week 22

2023/06/05 - 2023/06/11

Research Plan

  • Jun. Adversarial Tracking

Environment

Target Model

Adversarial Attacks

  • Universal Adversarial Perturbation (UAP)

Next Step


Week 23

2023/06/12 - 2023/06/18

Carla API

Models

  • 3D Detection: PointPillar with PointPainting
  • 2D Segmentation: ERFNet

Reading


Week 24

2023/06/19 - 2023/06/25

Presentation

  • Third-Year Mini Viva (Thursday, 22nd June)
  • PGR Conference (Friday, 23rd June)

Reading


Week 25

2023/06/26 - 2023/07/02

Reading


Week 26

2023/07/03 - 2023/07/09

Current Progress:

https://tracking.wuhanstudio.uk/

  • Problem 1: How can we generate 3D Bounding Boxes? (Ground Truth)
  • Problem 2: From 3D global coordinates to 2D image coordinates

  • Problem 3: From 2D Bounding Boxes to 3D Bounding Boxes
  • Problem 4: How can we do multi-object tracking?

  • Problem 5: How can we generate UAPs?

Week 27

2023/07/10 - 2023/07/16

3D Object Detection in CARLA

  • Pretrained on KITTI

https://github.com/skhadem/3D-BoundingBox

Week 28

2023/07/17 - 2023/07/23

3D Object Detection in CARLA

  • Fixed 2D bounding boxes

Week 29

2023/07/24 - 2023/07/30

  • BMVC (21st Aug. 2023)

  • IEEE Transactions on AI

  • AAAI Workshop (9th Dec. 2023)
  • IEEE Symposium on Security and Privacy (12th Dec. 2023)

  • ICLR Tiny Paper (Feb. 2024)
  • ACM Workshop on AI And Security (Jul. 2024)

Week 30

2023/07/31 - 2023/08/06

2D Detection:

  • YOLO
  • SSD
  • Faster RCNN

3D Detection:

  • Orientation
  • 3D Center
  • Depth

Object Tracking:

  • SORT
  • DeepSORT
  • StrongSORT

Week 31

2023/08/07 - 2023/08/13

SORT:

  • Kalman Filter

  • Jonker–Volgenant Algorithm
  • Hungarian Algorithm

Week 32

2023/08/14 - 2023/08/20

Deep SORT:

  • Feature Pyramid Network
  • Siamese Neural Network

  • Kalman Filter

  • Jonker–Volgenant Algorithm
  • Hungarian Algorithm (Matching Cascade)

Week 33

2023/08/21 - 2023/08/27

Strong SORT:

  • YOLOX

  • Feature Pyramid Network
  • Siamese Neural Network

  • Exponential Moving Average (EMA)
  • Enhanced Correlation Coefficient Maximization (ECC)

  • Motion Cost
  • Global Linear Assignment

  • NSA Kalman Filter

  • Jonker–Volgenant Algorithm
  • Hungarian Algorithm

Strong SORT++:

  • Appearance-Free Link Model (AF Link)
  • Gaussian-smoothed Interpolation Algorithm (GSI)

Week 34

2023/08/28 - 2023/09/03

Unsolved Problems:

  • Pedestrian Detection / Vehicle Detection
  • CARLA Dataset / KITTI Dataset
  • 3D Detection

Solutions:

  • Both Person and Vehicle ReID: Model Zoo.
  • Bag of Tricks (BoT), Bag of Freebies (BoF), Bag of Specials (BoS)
  • MOT Dataset / CARLA Demo

Three Deep Learning Models:

  • 2D Object Detection (MS COCO)
  • Pedestrian / Vehicle ReID (ImageNet)
  • 3D Bounding Boxes [Position, Dimension, Orientation] (KITTI)

Source Code:

https://github.com/wuhanstudio/2d-carla-tracking

The Alan Turing Institute

2023/09/04 - 2023/09/15

International Welcome Team

2023/09/16 - 2023/09/30

Week 2

2023/10/02 - 2023/10/08

October:

  • Man-in-the-Middle: Hardware UAP
  • Distributed Black-box: Initial UAP

  • Adversarial Tracking: Digital UAP
  • Adversarial Patch: Physical UAP

Conferences:

Week 3

2023/10/09 - 2023/10/15


  • Siamese Network and Tracking

    • One-shot Image Recognition
    • Face Recognition
    • Signature Verification

    • Learns a similarity function

    • Triplet Loss
    • Contrastive Loss

KITTICARLA
Dataset (Ground Truth)x-
Tracking (Model Output)x
Evaluation--
Attack

Week 4

2023/10/16 - 2023/10/22

High Order Tracking Accuracy (HOTA)

KITTICARLA
Dataset (Ground Truth)x-
Tracking (Model Output)xx
Evaluationx-
Attack

HOTAKITTICARLA
Ground Truth100.00
Ground Truth (Strong SORT)93.72
Ground Truth (Deep SORT)85.55
Ground Truth (SORT)84.62
CWIT66.31
YOLO (Strong SORT)55.17
YOLO (Deep SORT)51.99
YOLO (SORT)50.63

Siamese Tracking (SOT)

Physical Patch

Week 5

2023/10/23 - 2023/10/29

High Order Tracking Accuracy (HOTA)

KITTICARLA
Dataset (Ground Truth)xx
Tracking (Model Output)xx
Evaluationxx
Attack

HOTAKITTICARLA
Ground Truth100.00100.00
Ground Truth (Strong SORT)93.7289.88
Ground Truth (Deep SORT)85.5581.79
Ground Truth (SORT)84.6282.82
CWIT66.31-
YOLO (Strong SORT)55.1756.16
YOLO (Deep SORT)51.9953.16
YOLO (SORT)50.6353.97

Week 6

2023/10/30 - 2023/11/05

Cross-linking Surgery

Week 7

2023/11/06 - 2023/11/12

High Order Tracking Accuracy (HOTA)

KITTICARLA
Dataset (Ground Truth)xx
Tracking (Model Output)xx
Evaluationxx
Attack

HOTAKITTICARLA
Ground Truth100.00100.00
Ground Truth (OC SORT)93.8492.93
Ground Truth (Strong SORT)93.7291.19
Ground Truth (Deep SORT)85.5582.49
Ground Truth (SORT)84.6282.11
3D Lidar
PermaTrack (OC-SORT)76.50-
Stereo Camera
CWIT66.31-
Single Camera
YOLOX (OC SORT)53.7860.40
YOLOX (Strong SORT)54.3059.60
YOLOX (Deep SORT)52.8256.97
YOLOX (SORT)51.3257.01
 
YOLO (OC SORT)53.3857.99
YOLO (Strong SORT)55.1759.49
YOLO (Deep SORT)51.9956.65
YOLO (SORT)50.6356.31

Week 8

2023/11/13 - 2023/11/19

Research Plan

Week 9

2023/11/20 - 2023/11/26

  • Yolov3 + Leaky ReLU + TensorFlow
  • Yolov4 + mish + TensorFlow
  • YoloX + SiLU + Pytorch
  • Bilinear Interpolation

Week 10

2023/11/27 - 2023/12/03

  • ISCA HPC
  • YOLO-X

Week 11

2023/12/04 - 2023/12/10

  • Computer Graphics - Marking

Week 12

2023/12/11 - 2023/12/17

1. White-box Adversarial Toolbox

  • Digital Perturbation

    • Adversarial Driving
    • Adversarial Detection
    • [•] Man-in-the-Middle Attack
    • [ ] Adversarial Tracking
  • Physical Perturbation

    • [ ] Adversarial Patch

2. Black-box Adversarial Toolbox

3. Model Interpretation

  • Interpretable Machine Learning for COVID-19
  • Clinico-Radiological Data Assessment using Machine Learning

4. PhD Thesis

1st March, 2024 --> 24th May, 2024

Travel

2023/12/18 - 2023/12/24

  • Computer Graphics
  • Differentiable Physics
  • Differentiable Rendering

2023/12/25 - 2023/12/31

  • Exeter --> London --> Hong Kong --> Taiwan

2024/01/01 - 2024/01/07

  • Taiwan --> Hong Kong --> Hangzhou
  • Hangzhou --> Wuhan --> London --> Exeter

Week 1

2024/01/08 - 2024/01/14

Recovering from flu.

Week 2

2024/01/15 - 2024/01/21

  • IEEE TAI Major Revision (Response Letter)

  • Lab: Computers and Internet
  • Workshop: Computer Vision

Week 3

2024/01/22 - 2024/01/28

  • IEEE TAI Major Revision (Experimental Results)

Week 4

2024/01/29 - 2024/02/04

  • IEEE TAI Major Revision (Submission)

Week 5

2024/02/05 - 2024/02/11

Week 6

2024/02/12 - 2024/02/18

  • IEEE Access Major Revision (SOTA Methods)

Week 7

2024/02/19 - 2024/02/25

  • IEEE Access Major Revision (Discussion)

Week 8

2024/02/26 - 2024/03/03

  • ECCV 2024 (Submission)

Week 9

2024/03/04 - 2024/03/10

  • Introduction
  • Chapter 2: Adversarial Driving (Published x1)
  • Chapter 3: Adversarial Detection (Published x1) & Man-in-the-Middle Attack (Minor Revision x1)
  • Chapter 4: Adversarial Tracking (Proposal)
  • Chapter 5: Distributed Black-box Attack (Manuscript x1)
  • Chapter 6: Inpterpretation and Defence (Published x2)
  • Summary
  • Future Research: Adversarial Patch (Proposal)

Week 13

2024/04/01 - 2024/04/07

[●] Thesis Template

[●] University Logo and Header
[●] GitHub Repo: Fix compilation errors
[●] Restructure figures and sections

[●] Abstact and Introduction
[●] Published papers and manuscripts
[●] Summary and Future Research

[ ] Acknowledgements
[ ] Revision

Week 18

2024/05/06 - 2024/05/12

[ ] Adversarial Tracking
[ ] Revision