Search papers, labs, and topics across Lattice.
The paper introduces MVIG attack, a novel adversarial attack framework against collaborative perception (CP) systems that leverages a mutual view information graph (MVIG) to capture vulnerability knowledge disclosed by different defensive CP systems. MVIG attack uses temporal graph learning to generate evolving fabrication risk maps and entropy-aware vulnerability search to optimize attack location, timing, and persistence. Experiments on OPV2V and Adv-OPV2V datasets demonstrate that MVIG attack significantly reduces the success rates of state-of-the-art defenses, highlighting security vulnerabilities in CP systems.
A novel adversarial attack, MVIG, can reduce the success rate of state-of-the-art defenses in collaborative perception systems by up to 62%, revealing critical security gaps.
Collaborative perception (CP) enables data sharing among connected and autonomous vehicles (CAVs) to enhance driving safety. However, CP systems are vulnerable to adversarial attacks where malicious agents forge false objects via feature-level perturbations. Current defensive systems use threshold-based consensus verification by comparing collaborative and ego detection results. Yet, these defenses remain vulnerable to more sophisticated attack strategies that could exploit two critical weaknesses: (i) lack of robustness against attacks with systematic timing and target region optimization, and (ii) inadvertent disclosure of vulnerability knowledge through implicit confidence information in shared collaboration data. In this paper, we propose MVIG attack, a novel adaptive adversarial CP framework learning to capture vulnerability knowledge disclosed by different defensive CP systems from a unified mutual view information graph (MVIG) representation. Our approach combines MVIG representation with temporal graph learning to generate evolving fabrication risk maps and employs entropy-aware vulnerability search to optimize attack location, timing and persistence, enabling adaptive attacks with generalizability across various defensive configurations. Extensive evaluations on OPV2V and Adv-OPV2V datasets demonstrate that MVIG attack reduces defense success rates by up to 62\% against state-of-the-art defenses while achieving 47\% lower detection for persistent attacks at 29.9 FPS, exposing critical security gaps in CP systems. Code will be released at https://github.com/yihangtao/MVIG.git