SOTAVerified

Flying Adversarial Patches: Manipulating the Behavior of Deep Learning-based Autonomous Multirotors

2023-05-22Code Available0· sign in to hype

Pia Hanfeld, Marina M. -C. Höhne, Michael Bussmann, Wolfgang Hönig

Code Available — Be the first to reproduce this paper.

Reproduce

Code

Abstract

Autonomous flying robots, e.g. multirotors, often rely on a neural network that makes predictions based on a camera image. These deep learning (DL) models can compute surprising results if applied to input images outside the training domain. Adversarial attacks exploit this fault, for example, by computing small images, so-called adversarial patches, that can be placed in the environment to manipulate the neural network's prediction. We introduce flying adversarial patches, where an image is mounted on another flying robot and therefore can be placed anywhere in the field of view of a victim multirotor. For an effective attack, we compare three methods that simultaneously optimize the adversarial patch and its position in the input image. We perform an empirical validation on a publicly available DL model and dataset for autonomous multirotors. Ultimately, our attacking multirotor would be able to gain full control over the motions of the victim multirotor.

Tasks

Reproductions