Reproducibility Study on Adversarial Attacks Against Robust Transformer Trackers

TMLR Paper2251 Authors

17 Feb 2024 (modified: 22 Apr 2024)Under review for TMLREveryoneRevisionsBibTeX
Abstract: New transformer networks have been integrated into object tracking pipelines and have demonstrated strong performance on the latest benchmarks. This paper focuses on understanding how transformer trackers behave under adversarial attacks and how different attacks perform on tracking datasets as their parameters change. We conducted a series of experiments to evaluate the effectiveness of existing adversarial attacks on object trackers with transformer and non-transformer backbones. We experimented on 7 different trackers, including 3 that are transformer-based, and 4 which leverage other architectures. These trackers are tested against 4 recent attack methods to assess their performance and robustness on VOT2022ST, UAV123 and GOT10k datasets. Our empirical study focuses on evaluating adversarial robustness of object trackers based on bounding box versus binary mask predictions, and attack methods at different levels of perturbations. Interestingly, our study found that altering the perturbation level may not significantly affect the overall object tracking results after the attack. Similarly, the sparsity and imperceptibility of the attack perturbations may remain stable against perturbation level shifts. By applying a specific attack on all transformer trackers, we show that new transformer trackers having a stronger cross-attention modeling achieve a greater adversarial robustness on tracking datasets, such as VOT2022ST and GOT10k. Our results also indicate the necessity for new attack methods to effectively tackle the latest types of transformer trackers.
Submission Length: Long submission (more than 12 pages of main content)
Changes Since Last Submission: 1. Modified Section 1: Introduction 2. Modified Section 2: “Related Works” by adding sub-section 2.1: “Visual Object Tracker” to review object trackers and sub-section 2.2: “Adversarial Attacks Against Trackers” to explain the attack methods for object trackers. 3. Added a new section, Section 3.3: “Transferability” to explain the attacks applicability 4. Modified Section 3: “Object Trackers and Adversarial Attacks”, to include the explanations of mathematical formulas and underlying concepts for object trackers and adversarial attacks. 5. Added a new Section 4.4 entitled “Transformer versus non-transformer trackers” to explain our new experiment. We applied a set of attacks against all transformer trackers in our study and several non-transformer trackers to assess the role of transformer backbones in comparison to other backbones in adversarial robustness of object trackers. 6. Added a new Section entitled “Discussion” to thoroughly analyze the obtained results of all experiments individually and in combination with other experiments. 7. Modified “Abstract” and “Conclusion” to reflect our revised manuscript more clearly.
Assigned Action Editor: ~Jonathan_Scarlett1
Submission Number: 2251
Loading