26 research outputs found

    Adversarial Zoom Lens: A Novel Physical-World Attack to DNNs

    Full text link
    Although deep neural networks (DNNs) are known to be fragile, no one has studied the effects of zooming-in and zooming-out of images in the physical world on DNNs performance. In this paper, we demonstrate a novel physical adversarial attack technique called Adversarial Zoom Lens (AdvZL), which uses a zoom lens to zoom in and out of pictures of the physical world, fooling DNNs without changing the characteristics of the target object. The proposed method is so far the only adversarial attack technique that does not add physical adversarial perturbation attack DNNs. In a digital environment, we construct a data set based on AdvZL to verify the antagonism of equal-scale enlarged images to DNNs. In the physical environment, we manipulate the zoom lens to zoom in and out of the target object, and generate adversarial samples. The experimental results demonstrate the effectiveness of AdvZL in both digital and physical environments. We further analyze the antagonism of the proposed data set to the improved DNNs. On the other hand, we provide a guideline for defense against AdvZL by means of adversarial training. Finally, we look into the threat possibilities of the proposed approach to future autonomous driving and variant attack ideas similar to the proposed attack

    Adversarial Neon Beam: Robust Physical-World Adversarial Attack to DNNs

    Full text link
    In the physical world, light affects the performance of deep neural networks. Nowadays, many products based on deep neural network have been put into daily life. There are few researches on the effect of light on the performance of deep neural network models. However, the adversarial perturbations generated by light may have extremely dangerous effects on these systems. In this work, we propose an attack method called adversarial neon beam (AdvNB), which can execute the physical attack by obtaining the physical parameters of adversarial neon beams with very few queries. Experiments show that our algorithm can achieve advanced attack effect in both digital test and physical test. In the digital environment, 99.3% attack success rate was achieved, and in the physical environment, 100% attack success rate was achieved. Compared with the most advanced physical attack methods, our method can achieve better physical perturbation concealment. In addition, by analyzing the experimental data, we reveal some new phenomena brought about by the adversarial neon beam attack

    Impact of Colour Variation on Robustness of Deep Neural Networks

    Full text link
    Deep neural networks (DNNs) have have shown state-of-the-art performance for computer vision applications like image classification, segmentation and object detection. Whereas recent advances have shown their vulnerability to manual digital perturbations in the input data, namely adversarial attacks. The accuracy of the networks is significantly affected by the data distribution of their training dataset. Distortions or perturbations on color space of input images generates out-of-distribution data, which make networks more likely to misclassify them. In this work, we propose a color-variation dataset by distorting their RGB color on a subset of the ImageNet with 27 different combinations. The aim of our work is to study the impact of color variation on the performance of DNNs. We perform experiments on several state-of-the-art DNN architectures on the proposed dataset, and the result shows a significant correlation between color variation and loss of accuracy. Furthermore, based on the ResNet50 architecture, we demonstrate some experiments of the performance of recently proposed robust training techniques and strategies, such as Augmix, revisit, and free normalizer, on our proposed dataset. Experimental results indicate that these robust training techniques can improve the robustness of deep networks to color variation.Comment: arXiv admin note: substantial text overlap with arXiv:2209.0213

    Fooling Thermal Infrared Detectors in Physical World

    Full text link
    Infrared imaging systems have a vast array of potential applications in pedestrian detection and autonomous driving, and their safety performance is of great concern. However, few studies have explored the safety of infrared imaging systems in real-world settings. Previous research has used physical perturbations such as small bulbs and thermal "QR codes" to attack infrared imaging detectors, but such methods are highly visible and lack stealthiness. Other researchers have used hot and cold blocks to deceive infrared imaging detectors, but this method is limited in its ability to execute attacks from various angles. To address these shortcomings, we propose a novel physical attack called adversarial infrared blocks (AdvIB). By optimizing the physical parameters of the adversarial infrared blocks, this method can execute a stealthy black-box attack on thermal imaging system from various angles. We evaluate the proposed method based on its effectiveness, stealthiness, and robustness. Our physical tests show that the proposed method achieves a success rate of over 80% under most distance and angle conditions, validating its effectiveness. For stealthiness, our method involves attaching the adversarial infrared block to the inside of clothing, enhancing its stealthiness. Additionally, we test the proposed method on advanced detectors, and experimental results demonstrate an average attack success rate of 51.2%, proving its robustness. Overall, our proposed AdvIB method offers a promising avenue for conducting stealthy, effective and robust black-box attacks on thermal imaging system, with potential implications for real-world safety and security applications

    Adversarial Color Projection: A Projector-Based Physical Attack to DNNs

    Full text link
    Recent advances have shown that deep neural networks (DNNs) are susceptible to adversarial perturbations. Therefore, it is necessary to evaluate the robustness of advanced DNNs using adversarial attacks. However, traditional physical attacks that use stickers as perturbations are more vulnerable than recent light-based physical attacks. In this work, we propose a projector-based physical attack called adversarial color projection (AdvCP), which performs an adversarial attack by manipulating the physical parameters of the projected light. Experiments show the effectiveness of our method in both digital and physical environments. The experimental results demonstrate that the proposed method has excellent attack transferability, which endows AdvCP with effective blackbox attack. We prospect AdvCP threats to future vision-based systems and applications and propose some ideas for light-based physical attacks.Comment: arXiv admin note: substantial text overlap with arXiv:2209.0243

    Mathematical Simulation and program of gas-liquid two-phase well flow pattern

    No full text
    The judgment of flow pattern in the wellbore of a liquid-producing gas well is very important to the judgment of its liquid-carrying capacity in the production process. Through mathematical fitting of duns- ROS flow pattern of vertical well, Gould flow pattern of inclined well and Goiver flow pattern of horizontal well, the different flow pattern is fitted into 3, 4 and 4 curves respectively, and divided into 9, 10 and 20 regions respectively. The division standard among different regions is given, optimized parameters are selected, and a VB software is edited. The results show that the software fitting effect is accurate, and can be well applied to the actual flow pattern judgment

    Major advancement in oil and gas exploration of Jurassic channel sandstone in Well Bazhong 1HF in northern Sichuan Basin and its significance

    No full text
    In January 2023, Well Bazhong 1HF in the northern Sichuan Basin obtained high-yield industrial oil flow of over 100 cubic meters from the Jurassic channel sandstone for the first time, realizing a major breakthrough. In order to provide more support for further oil and gas exploration in this area, this paper analyzes the sedimentary and reservoir characteristics of the Jurassic Lianggaoshan Formation in Bazhong region of northern Sichuan Basin and their control factors based on the exploration achievements of Well Bazhong 1HF. Then, oil and gas reservoir characteristics and oil and gas sources are comparatively analyzed. Finally, the key technologies for the exploration of channel sandstone oil and gas with multi-stage vertical superimposition, lateral migration, thin reservoir and strong heterogeneity are researched and developed, and the next oil and gas exploration direction in the Lianggaoshan Formation of northern Sichuan Basin is pointed out. And the following research results are obtained. First, in the second member of Lianggaoshan Formation (“Liang 2 Member” for short) in Bazhong region, multi-stage underwater distributary sand bodies of delta front are developed with sandstone thickness of about 25 m and average porosity of 5.6%. The pore types are mainly primary intergranular pores and feldspar/debris intragranular dissolved pores, the pore throat structure is good, and the development of good-quality reservoirs is controlled by the sedimentary microfacies of underwater distributary channel. Second, the oil and gas reservoir of Liang 2 Member is a highly oil-bearing condensate gas reservoir/volatile oil reservoir, whose oil and gas is mainly sourced from the semi-deep lacustrine shale of Liang 1 and 2 Members. Third, channel sand bodies are superimposed and developed continuously in the upper part of Liang 2 and Liang 3 Members, and the source-reservoir configuration is good, with the characteristics of near-source hydrocarbon accumulation and overpressure hydrocarbon enrichment. Fourth, for the channel sandstones with multi-stage vertical superimposition, lateral migration, thin reservoir and strong heterogeneity, the reservoir prediction technology of “high-frequency sequence stratigraphy slice, seismic frequency decomposition and facies-constrained seismic waveform indication inversion” is developed to precisely characterize the “sweet spot” target of narrow channel sandstone, and the key fracturing technology of “dense cutting + composite temporary plugging + high-intensity proppant injection + imbibition and oil-increasing” is formed to realize the large-scale reconstruction of channel sandstone reservoir. In conclusion, the breakthrough of Well Bazhong 1HF in the exploration of Lianggaoshan Formation oil and gas in Bazhong region reveals the huge potential of Jurassic oil and gas exploration in the Sichuan Basin, and plays a positive role in promoting the exploration and development of the Jurassic channel sandstone oil and gas in the Sichuan Basin

    Study on critical liquid-carrying flow model in inclined Wells

    No full text
    It is very important to calculate the critical liquid-carrying flow for gas well.In this paper, an ellipsoid droplet model is established. By analyzing the droplet force in the inclined well and comprehensively considering the droplet drag force, gravity force, friction force, buoyancy force and supporting force, the general formula for calculating the critical liquid carrying flow is obtained. By using the reasonable formula of gas-liquid interfacial tension and The Formula of Weber number, the critical liquid carrying flow of gas well is verified

    Preparation of particle-fixed silica monoliths used in capillary electrochromatography

    No full text
    Fused-silica capillaries were packed with porous 1 pin bare silica microspheres and immobilized by potassium silicate-formamide in order to obtain columns with silica-based monolithic packing. After curing, the particle-fixed monolithic columns were octadecylated in situ with dimethyloctadecylchlorosilane. The columns were mechanically strong and permeable. No noticeable loss in efficiency was found after using a column continuously for 1 month. The performances of the particle-fixed silica monolithic columns were evaluated for CEC under RP conditions. High separation efficiency (about 125200 plates/m) was obtained by using these new types of columns
    corecore