Attacking the Loop: Adversarial Attacks on Graph-Based Loop Closure Detection

Show simple item record

dc.contributor.author Kim, Jonathan
dc.contributor.author Urschler, Martin
dc.contributor.author Riddle, Patricia
dc.contributor.author Wicker, Jörg
dc.contributor.editor Radeva, Petia
dc.contributor.editor Furnari, Antonino
dc.contributor.editor Bouatouch, Kadi
dc.contributor.editor Sousa, A Augusto de
dc.date.accessioned 2024-06-04T23:36:15Z
dc.date.available 2024-06-04T23:36:15Z
dc.date.issued 2024-01-01
dc.identifier.citation (2024). Proceedings of the 19th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, 4, 90-97.
dc.identifier.isbn 978-989-758-679-8
dc.identifier.issn 2184-5921
dc.identifier.uri https://hdl.handle.net/2292/68550
dc.description.abstract With the advancement in robotics, it is becoming increasingly common for large factories and warehouses to incorporate visual SLAM (vSLAM) enabled automated robots that operate closely next to humans. This makes any adversarial attacks on vSLAM components potentially detrimental to humans working alongside them. Loop Closure Detection (LCD) is a crucial component in vSLAM that minimizes the accumulation of drift in mapping, since even a small drift can accumulate into a significant drift over time. A prior work by Kim et al., SymbioLCD2, unified visual features and semantic objects into a single graph structure for finding loop closure candidates. While this provided a performance improvement over visual feature-based LCD, it also created a single point of vulnerability for potential graph-based adversarial attacks. Unlike previously reported visual-patch based attacks, small graph perturbations are far more challenging to detect, making them a more significant threat. In this paper, we present Adversarial-LCD, a novel black-box evasion attack framework that employs an eigencentrality-based perturbation method and an SVM-RBF surrogate model with a WeisfeilerLehman feature extractor for attacking graph-based LCD. Our evaluation shows that the attack performance of Adversarial-LCD with the SVM-RBF surrogate model was superior to that of other machine learning surrogate algorithms, including SVM-linear, SVM-polynomial, and Bayesian classifier, demonstrating the effectiveness of our attack framework. Furthermore, we show that our eigencentrality-based perturbation method outperforms other algorithms, such as Random-walk and Shortest-path, highlighting the efficiency of AdversarialLCD’s perturbation selection method.
dc.publisher Scitepress
dc.relation.ispartof Proceedings of the 19th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications
dc.relation.ispartofseries Proceedings of the 19th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications
dc.rights Items in ResearchSpace are protected by copyright, with all rights reserved, unless otherwise indicated. Previously published items are made available in accordance with the copyright policy of the publisher.
dc.rights.uri https://researchspace.auckland.ac.nz/docs/uoa-docs/rights.htm
dc.rights.uri https://creativecommons.org/licenses/by-nc-nd/4.0/
dc.title Attacking the Loop: Adversarial Attacks on Graph-Based Loop Closure Detection
dc.type Conference Item
dc.identifier.doi 10.5220/0012313100003660
pubs.begin-page 90
pubs.volume 4
dc.date.updated 2024-05-10T04:15:17Z
dc.rights.holder Copyright: The authors en
pubs.end-page 97
pubs.finish-date 2024-02-29
pubs.publication-status Published
pubs.start-date 2024-02-27
dc.rights.accessrights http://purl.org/eprint/accessRights/OpenAccess en
pubs.elements-id 1016416
pubs.org-id Science
pubs.org-id School of Computer Science
dc.identifier.eissn 2184-4321
pubs.record-created-at-source-date 2024-05-10


Files in this item

Find Full text

This item appears in the following Collection(s)

Show simple item record

Share

Search ResearchSpace


Browse

Statistics