{"id":7669,"date":"2024-10-18T21:55:37","date_gmt":"2024-10-18T21:55:37","guid":{"rendered":"https:\/\/www.tun.com\/home\/?p=7669"},"modified":"2024-10-18T21:55:38","modified_gmt":"2024-10-18T21:55:38","slug":"study-reveals-ai-in-remote-sensing-is-highly-susceptible-to-attacks","status":"publish","type":"post","link":"https:\/\/www.tun.com\/home\/study-reveals-ai-in-remote-sensing-is-highly-susceptible-to-attacks\/","title":{"rendered":"Study Reveals AI in Remote Sensing is Highly Susceptible to Attacks"},"content":{"rendered":"\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-uagb-blockquote uagb-block-e7eb3fc3 uagb-blockquote__skin-border uagb-blockquote__stack-img-none\"><blockquote class=\"uagb-blockquote\"><div class=\"uagb-blockquote__content\">Scientists uncover significant vulnerabilities in AI models utilized in remote sensing, highlighting the need for improved robustness to ensure reliable performance in crucial applications like disaster response.<\/div><footer><div class=\"uagb-blockquote__author-wrap uagb-blockquote__author-at-left\"><\/div><\/footer><\/blockquote><\/div>\n\n\n\n<div class=\"wp-block-group is-content-justification-space-between is-nowrap is-layout-flex wp-container-core-group-is-layout-0dfbf163 wp-block-group-is-layout-flex\"><div style=\"font-size:16px;\" class=\"has-text-align-left wp-block-post-author\"><div class=\"wp-block-post-author__content\"><p class=\"wp-block-post-author__name\">The University Network<\/p><\/div><\/div>\n\n\n<div class=\"wp-block-uagb-social-share uagb-social-share__outer-wrap uagb-social-share__layout-horizontal uagb-block-ee584a31\">\n<div class=\"wp-block-uagb-social-share-child uagb-ss-repeater uagb-ss__wrapper uagb-block-ec619ce7\"><span class=\"uagb-ss__link\" data-href=\"https:\/\/www.facebook.com\/sharer.php?u=\" tabindex=\"0\" role=\"button\" aria-label=\"facebook\"><span class=\"uagb-ss__source-wrap\"><span class=\"uagb-ss__source-icon\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M504 256C504 119 393 8 256 8S8 119 8 256c0 123.8 90.69 226.4 209.3 245V327.7h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.28c-30.8 0-40.41 19.12-40.41 38.73V256h68.78l-11 71.69h-57.78V501C413.3 482.4 504 379.8 504 256z\"><\/path><\/svg><\/span><\/span><\/span><\/div>\n\n\n\n<div class=\"wp-block-uagb-social-share-child uagb-ss-repeater uagb-ss__wrapper uagb-block-32d99934\"><span class=\"uagb-ss__link\" data-href=\"https:\/\/twitter.com\/share?url=\" tabindex=\"0\" role=\"button\" aria-label=\"twitter\"><span class=\"uagb-ss__source-wrap\"><span class=\"uagb-ss__source-icon\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M389.2 48h70.6L305.6 224.2 487 464H345L233.7 318.6 106.5 464H35.8L200.7 275.5 26.8 48H172.4L272.9 180.9 389.2 48zM364.4 421.8h39.1L151.1 88h-42L364.4 421.8z\"><\/path><\/svg><\/span><\/span><\/span><\/div>\n\n\n\n<div class=\"wp-block-uagb-social-share-child uagb-ss-repeater uagb-ss__wrapper uagb-block-1d136f14\"><span class=\"uagb-ss__link\" data-href=\"https:\/\/www.linkedin.com\/shareArticle?url=\" tabindex=\"0\" role=\"button\" aria-label=\"linkedin\"><span class=\"uagb-ss__source-wrap\"><span class=\"uagb-ss__source-icon\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M416 32H31.9C14.3 32 0 46.5 0 64.3v383.4C0 465.5 14.3 480 31.9 480H416c17.6 0 32-14.5 32-32.3V64.3c0-17.8-14.4-32.3-32-32.3zM135.4 416H69V202.2h66.5V416zm-33.2-243c-21.3 0-38.5-17.3-38.5-38.5S80.9 96 102.2 96c21.2 0 38.5 17.3 38.5 38.5 0 21.3-17.2 38.5-38.5 38.5zm282.1 243h-66.4V312c0-24.8-.5-56.7-34.5-56.7-34.6 0-39.9 27-39.9 54.9V416h-66.4V202.2h63.7v29.2h.9c8.9-16.8 30.6-34.5 62.9-34.5 67.2 0 79.7 44.3 79.7 101.9V416z\"><\/path><\/svg><\/span><\/span><\/span><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p>A recent study by researchers from Northwestern Polytechnical University and The Hong Kong Polytechnic University has exposed concerning vulnerabilities in artificial intelligence models used for remote object detection and image classification. These weaknesses could impact essential applications such as environmental monitoring, government intelligence and disaster management.<\/p>\n\n\n\n<p>The team, led by Shaohui Mei, a professor at the School of Electronic Information at Northwestern Polytechnical University, performed a comprehensive review of existing research on deep learning (DL) models to evaluate their robustness against various disturbances. <\/p>\n\n\n\n<p>Their findings, <a href=\"https:\/\/spj.science.org\/doi\/10.34133\/remotesensing.0219\" title=\"\">published<\/a> in the Journal of Remote Sensing, reveal that these AI models are susceptible to both physical and digital attacks.<\/p>\n\n\n\n<p>&#8220;We sought to address the lack of comprehensive studies on the robustness of deep learning models used in remote sensing tasks, particularly focusing on image classification and object detection. Our aim was to understand the vulnerabilities of these models to various types of noise, especially adversarial noise, and to systematically evaluate their natural and adversarial robustness,\u201d Mei said in a <a href=\"https:\/\/www.eurekalert.org\/news-releases\/1061655\" title=\"\">news release<\/a>.<\/p>\n\n\n\n<p>The study investigated the impact of natural noise \u2014 like rain, snow and fog \u2014 and adversarial attacks, such as the Fast Gradient Sign Method (FGSM), on the performance of various DL models. They also examined potential physical manipulations, such as attaching patches to objects to deceive the AI systems.<\/p>\n\n\n\n<p>&#8220;Deep learning models, despite their powerful capabilities in remote sensing applications, are susceptible to different kinds of disturbances, including adversarial attacks. It is crucial for developers and users of these technologies to be aware of these vulnerabilities and to work towards improving model robustness to ensure reliable performance in real-world conditions,\u201d co-author Jiawei Lian, a graduate student at the School of Electronic Information at Northwestern Polytechnical University, said in the news release.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Their analysis demonstrated several key insights:<\/p>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Training an adversarial attack is similar to training a neural network and is influenced by factors like training data and optimization strategies.<\/li>\n\n\n\n<li>Weak detectors, like YOLOv2, are more easily targeted, whereas more robust models show better resilience.<\/li>\n\n\n\n<li>Techniques such as &#8220;momentum&#8221; and &#8220;dropout&#8221; can enhance the effectiveness of attacks.<\/li>\n\n\n\n<li>Physical attacks, such as placing patches in critical areas, can be as effective as digital attacks.<\/li>\n<\/ul>\n\n\n\n<p>The team aims to refine their benchmarking framework and conduct more extensive tests to further improve the robustness and security of DL models in remote sensing. Their ultimate goal is to enhance the reliability of these technologies in crucial applications, such as environmental monitoring, disaster response and urban planning.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A recent study by researchers from Northwestern Polytechnical University and The Hong Kong Polytechnic University has exposed concerning vulnerabilities in artificial intelligence models used for remote object detection and image classification. These weaknesses could impact essential applications such as environmental monitoring, government intelligence and disaster management. The team, led by Shaohui Mei, a professor at [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"single-no-separators","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[8],"tags":[],"class_list":["post-7669","post","type-post","status-publish","format-standard","hentry","category-ai"],"acf":[],"aioseo_notices":[],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"The University Network","author_link":"https:\/\/www.tun.com\/home\/author\/funky_junkie\/"},"uagb_comment_info":0,"uagb_excerpt":"A recent study by researchers from Northwestern Polytechnical University and The Hong Kong Polytechnic University has exposed concerning vulnerabilities in artificial intelligence models used for remote object detection and image classification. These weaknesses could impact essential applications such as environmental monitoring, government intelligence and disaster management. The team, led by Shaohui Mei, a professor at&hellip;","_links":{"self":[{"href":"https:\/\/www.tun.com\/home\/wp-json\/wp\/v2\/posts\/7669","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tun.com\/home\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tun.com\/home\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tun.com\/home\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tun.com\/home\/wp-json\/wp\/v2\/comments?post=7669"}],"version-history":[{"count":4,"href":"https:\/\/www.tun.com\/home\/wp-json\/wp\/v2\/posts\/7669\/revisions"}],"predecessor-version":[{"id":7922,"href":"https:\/\/www.tun.com\/home\/wp-json\/wp\/v2\/posts\/7669\/revisions\/7922"}],"wp:attachment":[{"href":"https:\/\/www.tun.com\/home\/wp-json\/wp\/v2\/media?parent=7669"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tun.com\/home\/wp-json\/wp\/v2\/categories?post=7669"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tun.com\/home\/wp-json\/wp\/v2\/tags?post=7669"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}