2
2024ǯ04·î15Æü 08:21 ITmedia NEWS
¡¡Áá°ðÅÄÂç³Ø¤È»º¶Èµ»½ÑÁí¹ç¸¦µæ½ê¤Ë½ê°¤¹¤ë¸¦µæ¼Ô¤é¤¬È¯É½¤·¤¿ÏÀʸ¡ÖDeGhost: Unmasking Phantom Intrusions in Autonomous Recognition Systems¡×¤Ï¡¢¥×¥í¥¸¥§¥¯¥¿¡¼¤ÇÅê±Æ¤¹¤ë¿Í¤ä¼Ö¤Ê¤É¤ÇʪÂÎǧ¼±¥·¥¹¥Æ¥à¤òµ½¤¯¤³¤È¤¬¤Ç¤¤ë¤«¤òʬÀϤ·¡¢Âбþ¼êË¡¤òÄó°Æ¤·¤¿¸¦µæÊó¹ð¤Ç¤¢¤ë¡£
¡¡¼«Æ°±¿Å¾¼Ö¤ä¥É¥í¡¼¥ó¤Ê¤É¤Î¼«Î§¥·¥¹¥Æ¥à¤Ï¡¢ÊªÂÎǧ¼±¥·¥¹¥Æ¥à¤òÍѤ¤¤Æ¼þ°Ï¤Î´Ä¶¤òǧ¼±¤·¡¢Å¬ÀÚ¤ÊÆ°ºî¤ò¹Ô¤Ã¤Æ¤¤¤ë¡£¤·¤«¤·¡¢¤³¤ÎʪÂÎǧ¼±µ»½Ñ¤Ë¤Ï¡Ö¸¸±Æ¹¶·â¡×¡ÊPhantom Attack¡Ë¤È¸Æ¤Ð¤ì¤ë¿·¤¿¤ÊÀȼåÀ¤¬Â¸ºß¤¹¤ë¡£
¡¡¸¸±Æ¹¶·â¤È¤Ï¡¢¥×¥í¥¸¥§¥¯¥¿¡¼¤ò»È¤Ã¤Æ¿Í¤ä¼Ö¤Ê¤É¤ÎʪÂΤòÌϤ·¤¿±ÇÁü¤òÅê±Æ¤·¡¢¼«Î§¥·¥¹¥Æ¥à¤ÎʪÂÎǧ¼±µ¡Ç½¤Ëº®Íð¤ò°ú¤µ¯¤³¤¹¹¶·â¼êË¡¤Ç¤¢¤ë¡£¹¶·â¼Ô¤Ï¡¢¤³¤¦¤·¤¿±ÇÁü¤ò¹ª¤ß¤ËÁàºî¤¹¤ë¤³¤È¤Ç¡¢¼ÂºÝ¤ÎʪÂΤȤ½¤Î¥×¥í¥¸¥§¥¯¥¿¡¼¤Çºî¤é¤ì¤¿¸¸±Æ¤ò¶èÊ̤Ǥ¤Ê¤¯¤µ¤»¡¢¼«Î§¥·¥¹¥Æ¥à¤òµ½¤¡¢°Õ¿Þ¤·¤¿Æ°ºî¤ò¹Ô¤ï¤»¤ë¤³¤È¤¬¤Ç¤¤ë¡£
¡¡Î㤨¤Ð¡¢Êâ¹Ô¼Ô¤òǧ¼±¤·¤ÆÄä»ß¤¹¤ë¼«Æ°±¿Å¾¼Ö¤ä¡¢¥Ñ¥È¥í¡¼¥ëÍѤÎAI¥É¥í¡¼¥ó¤òµ½¤¡¢¼ÂºÝ¤Ë¤Ï¸ºß¤·¤Ê¤¤¿Í´Ö¤òǧ¼±¤µ¤»¤ë¤³¤È¤Ç¡¢Í½´ü¤»¤Ì¸íÆ°ºî¤¬°ú¤µ¯¤³¤µ¤ì¤ë¥ê¥¹¥¯¤¬¤¢¤ë¡£
|
|
¡¡¤³¤Î¸¦µæ¤Ç¤Ï¡¢»ÔÈÎ¤Î¥É¥í¡¼¥ó¤ò»ÈÍѤ·¤Æ¼Â¾Ú¼Â¸³¤ò¹Ô¤¤¡¢¸¸±Æ¹¶·â¤Î¼Â¸½²ÄǽÀ¤òÄêÎÌŪ¤Ëɾ²Á¤·¤¿¡£¶ñÂÎŪ¤Ë¤Ï¡ÖDJI Mavic Air¥É¥í¡¼¥ó¡×¤È¤½¤ÎActiveTrackµ¡Ç½¤ò»È¤Ã¤¿¥Ö¥é¥Ã¥¯¥Ü¥Ã¥¯¥¹¥¢¥×¥í¡¼¥Á¡¢¤â¤¦°ì¤Ä¤Ï¥ª¡¼¥×¥ó¥½¡¼¥¹¤Î¡ÖTello¥É¥í¡¼¥ó¡×¤ÈYOLOv3ʪÂÎǧ¼±¤òÁȤ߹ç¤ï¤»¤¿¥Û¥ï¥¤¥È¥Ü¥Ã¥¯¥¹¥¢¥×¥í¡¼¥Á¤ò¼Â»Ü¤·¤¿¡£
¡¡¤½¤Î·ë²Ì¡¢Åê±Æ¤µ¤ì¤¿¿Íʪ¤ò¥É¥í¡¼¥ó¤¬ÄÉÀפ¹¤ëÍͻҤò³Îǧ¤Ç¤¡¢¸¸±Æ¹¶·â¤¬¸½¼ÂŪ¤Ê¶¼°Ò¤Ç¤¢¤ë¤³¤È¤ò¼Â¾Ú¤·¤¿¡£¤Þ¤¿Åê±Æ¤È¥É¥í¡¼¥ó´Ö¤Îµ÷Î¥¤¬Ä¹¤¯¤Ê¤ë¤Û¤É¡¢¤Þ¤¿¿åÊ¿³Ñ¤¬Â礤¯¤Ê¤ë¤Û¤É¡¢¹¶·â¤ÎÀ®¸ùΨ¤¬Äã²¼¤¹¤ëÃ諤âÆÀ¤é¤ì¤¿¡£
¡¡¤³¤Î¶¼°Ò¤ËÂй³¤¹¤ë¤¿¤á¡¢¸¦µæ¥Á¡¼¥à¤Ï¿¼Áسؽ¬¤òÍѤ¤¤¿Âкö¼êË¡¡ÖDeGhost¡×¤òÄó°Æ¡£DeGhost¤Ï¡¢¸¡½Ð¤µ¤ì¤¿ÊªÂΤ¬¼Âʪ¤«Åê±Æ¤«¤òȽÊ̤¹¤ë¿¼Áسؽ¬¥â¥Ç¥ë¤Ç¤¢¤ë¡£DeGhost¤ÎÀǽ¤òɾ²Á¤¹¤ë¤¿¤á¡¢¤µ¤Þ¤¶¤Þ¤Ê¥×¥í¥¸¥§¥¯¥¿¡¼¤ÈÅê±ÆÌÌ¡Ê¥³¥ó¥¯¥ê¡¼¥È¡¢Çò¤¤ÊÉ¡¢ÌÚÈÄ¡¢¿¢ºÏ¡¢¥¬¥é¥¹Ì̤ʤɡˤòÁȤ߹ç¤ï¤»¤¿Â¿ÍͤʴĶ¥»¥Ã¥È¤Ç¥Æ¥¹¥È¤ò¹Ô¤Ã¤¿¡£
¡¡¼Â¸³¤Ë¤ª¤¤¤Æ¡¢¹¤¯»È¤ï¤ì¤ëʪÂÎǧ¼±¥â¥Ç¥ë¤Ç¤¢¤ëYOLO¥·¥ê¡¼¥º¡¢Faster R-CNN¡¢CenterNet¤Ê¤É¤ÎʪÂθ¡½Ð¥·¥¹¥Æ¥à¤ËÂФ·¤Æɾ²Á¤·¤¿·ë²Ì¡¢Ì¤ÃΤδĶ¤ò´Þ¤á¤Æ¹â¤¤ÀºÅ٤Ǹ¸±Æ¹¶·â¤ò¸¡½Ð¤Ç¤¤ë¤³¤È¤ò¼¨¤·¤¿¡£¤Þ¤¿¡¢¥ê¥¢¥ë¥¿¥¤¥àÀǽ¤Îɾ²Á¤Ç¤â¡¢1ÉÃÅö¤¿¤êÌó33¥Õ¥ì¡¼¥à¤Î½èÍý¤¬²Äǽ¤Ç¡¢¼ÂÍѾ彽ʬ¤Ê®Å٤Ǥ¢¤ë¤³¤È¤ò³Îǧ¤·¤¿¡£
¡¡Source and Image Credits: H. Oyama, R. Iijima, T. Mori, ¡ÈDeGhost: Unmasking Phantom Intrusions in Autonomous Recognition Systems,¡É Proceedings of the 9th IEEE European Symposium on Security and Privacy¡ÊEuro S&P 2024¡Ë, July 2024
|
|
¡¡¢¨2014ǯ¤«¤éÀèü¥Æ¥¯¥Î¥í¥¸¡¼¤Î¸¦µæ¤òÏÀʸñ°Ì¤Çµ»ö¤Ë¤·¤Æ¤¤¤ëWeb¥á¥Ç¥£¥¢¡ÖSeamless¡×¡Ê¥·¡¼¥à¥ì¥¹¡Ë¤ò¼çºË¤¹¤ë»³²¼Íµµ£»á¤¬¼¹É®¡£¿·µ¬À¤Î¹â¤¤²Ê³ØÏÀʸ¤ò»³²¼»á¤¬¥Ô¥Ã¥¯¥¢¥Ã¥×¤·¡¢²òÀ⤹¤ë¡£X¡§ ¡÷shiropen2
|
|
|
|
Copyright(C) 2024 ITmedia Inc. All rights reserved. µ»ö¡¦¼Ì¿¿¤Î̵ÃÇžºÜ¤ò¶Ø¤¸¤Þ¤¹¡£
·ÇºÜ¾ðÊó¤ÎÃøºî¸¢¤ÏÄ󶡸µ´ë¶È¤Ëµ¢Â°¤·¤Þ¤¹¡£
2¤Ä¤Ëʬ¤«¤ì¤¿¹½Â¤¤Î¥µ¥É¥ëÏÃÂê¡Ê¼Ì¿¿¡§¤Í¤È¤é¤Ü¡Ë72
Å´Æ»¥Þ¥Ë¥¢¤Î¥Æ¥¹¥ÈÄÁ²óÅúÈ¿¶Á¡Ê¼Ì¿¿¡§J¥¿¥¦¥ó¥Í¥Ã¥È¡Ë84