Skip to main content

Showing 1–7 of 7 results for author: Wahlstrom, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2210.16371  [pdf, other

    cs.LG

    Distributed Black-box Attack against Image Classification Cloud Services

    Authors: Han Wu, Sareh Rowlands, Johan Wahlstrom

    Abstract: Black-box adversarial attacks can fool image classifiers into misclassifying images without requiring access to model structure and weights. Recent studies have reported attack success rates of over 95% with less than 1,000 queries. The question then arises of whether black-box attacks have become a real threat against IoT devices that rely on cloud APIs to achieve image classification. To shed so… ▽ More

    Submitted 21 August, 2023; v1 submitted 28 October, 2022; originally announced October 2022.

    Comments: 8 pages, 10 figures

  2. Adversarial Detection: Attacking Object Detection in Real Time

    Authors: Han Wu, Syed Yunas, Sareh Rowlands, Wenjie Ruan, Johan Wahlstrom

    Abstract: Intelligent robots rely on object detection models to perceive the environment. Following advances in deep learning security it has been revealed that object detection models are vulnerable to adversarial attacks. However, prior research primarily focuses on attacking static images or offline videos. Therefore, it is still unclear if such attacks could jeopardize real-world robotic applications in… ▽ More

    Submitted 12 December, 2023; v1 submitted 5 September, 2022; originally announced September 2022.

    Comments: Accepted by IEEE Intelligent Vehicle Symposium, 2023

    Journal ref: IEEE Intelligent Vehicle Symposium, 2023

  3. arXiv:2208.07174  [pdf, other

    cs.RO cs.CV

    A Man-in-the-Middle Attack against Object Detection Systems

    Authors: Han Wu, Sareh Rowlands, Johan Wahlstrom

    Abstract: Object detection systems using deep learning models have become increasingly popular in robotics thanks to the rising power of CPUs and GPUs in embedded systems. However, these models are susceptible to adversarial attacks. While some attacks are limited by strict assumptions on access to the detection system, we propose a novel hardware attack inspired by Man-in-the-Middle attacks in cryptography… ▽ More

    Submitted 21 August, 2023; v1 submitted 15 August, 2022; originally announced August 2022.

    Comments: 6 pages, 7 figures

  4. Adversarial Driving: Attacking End-to-End Autonomous Driving

    Authors: Han Wu, Syed Yunas, Sareh Rowlands, Wenjie Ruan, Johan Wahlstrom

    Abstract: As research in deep neural networks advances, deep convolutional networks become promising for autonomous driving tasks. In particular, there is an emerging trend of employing end-to-end neural network models for autonomous driving. However, previous research has shown that deep neural network classifiers are vulnerable to adversarial attacks. While for regression tasks, the effect of adversarial… ▽ More

    Submitted 12 December, 2023; v1 submitted 16 March, 2021; originally announced March 2021.

    Comments: Accepted by IEEE Intelligent Vehicle Symposium, 2023

    Journal ref: IEEE Intelligent Vehicle Symposium, 2023

  5. arXiv:1909.07231  [pdf, other

    cs.CV cs.LG cs.RO

    DeepTIO: A Deep Thermal-Inertial Odometry with Visual Hallucination

    Authors: Muhamad Risqi U. Saputra, Pedro P. B. de Gusmao, Chris Xiaoxuan Lu, Yasin Almalioglu, Stefano Rosa, Changhao Chen, Johan Wahlström, Wei Wang, Andrew Markham, Niki Trigoni

    Abstract: Visual odometry shows excellent performance in a wide range of environments. However, in visually-denied scenarios (e.g. heavy smoke or darkness), pose estimates degrade or even fail. Thermal cameras are commonly used for perception and inspection when the environment has low visibility. However, their use in odometry estimation is hampered by the lack of robust visual features. In part, this is a… ▽ More

    Submitted 19 January, 2020; v1 submitted 16 September, 2019; originally announced September 2019.

    Comments: Accepted to IEEE Robotics and Automation Letters (RAL)

  6. arXiv:1611.07910  [pdf, other

    cs.CR cs.CE eess.SY

    Map-aided Dead-reckoning --- A Study on Locational Privacy in Insurance Telematics

    Authors: Johan Wahlström, Isaac Skog, João G. P. Rodrigues, Peter Händel, Ana Aguiar

    Abstract: We present a particle-based framework for estimating the position of a vehicle using map information and measurements of speed. Two measurement functions are considered. The first is based on the assumption that the lateral force on the vehicle does not exceed critical limits derived from physical constraints. The second is based on the assumption that the driver approaches a target speed derived… ▽ More

    Submitted 14 November, 2016; originally announced November 2016.

  7. arXiv:1611.03618  [pdf, other

    cs.CY cs.HC

    Smartphone-based Vehicle Telematics - A Ten-Year Anniversary

    Authors: Johan Wahlström, Isaac Skog, Peter Händel

    Abstract: Just like it has irrevocably reshaped social life, the fast growth of smartphone ownership is now beginning to revolutionize the driving experience and change how we think about automotive insurance, vehicle safety systems, and traffic research. This paper summarizes the first ten years of research in smartphone-based vehicle telematics, with a focus on user-friendly implementations and the challe… ▽ More

    Submitted 11 November, 2016; originally announced November 2016.