Stealthy Porn: Understanding Real-World Adversarial Images for Illicit Online Promotion
Kan Yuan, Di Tang, Xiaojing Liao, XiaoFeng Wang, Xuan Feng, Yi Chen, Menghan Sun, Haoran Lu, Kehuan Zhang
Stealthy Porn: Understanding Real-World Adversarial Images for - - PowerPoint PPT Presentation
Stealthy Porn: Understanding Real-World Adversarial Images for Illicit Online Promotion Yuan, Di Tang , Xiaojing Liao, XiaoFeng Wang, Xuan Feng, Kan Yi Chen, Menghan Sun, Haoran Lu, Kehuan Zhang A C ASE IN THE W ILD Sexual stream t.cn
Kan Yuan, Di Tang, Xiaojing Liao, XiaoFeng Wang, Xuan Feng, Yi Chen, Menghan Sun, Haoran Lu, Kehuan Zhang
Sexual stream t.cn
Sina’s URL shortener service
p*.z*.s*.com
SoHu redirector
s*.top landing domain Illicit content detector
Evade
I am so attractive, and always on photos to catch the eyes.
I am yovr need
Adversarial Examples Corrupted Images
I am yovr need
I am yovr need
Two common characters:
I am yovr need
✤ Promotional content. ✤ less obfuscated explicit content
I
image type promotional content explicit content evasiveness
APPIs
I
image type promotional content explicit content evasiveness
APPIs
I
image type promotional content explicit content evasiveness
APPIs
Text: PiexlLink QRcode: ZBar, ZXing, BoofCV WeChat
Text: QRcode: PiexlLink
I
image type promotional content explicit content evasiveness
APPIs
ResNet-50 Explicit
I
image type promotional content explicit content evasiveness
APPIs
Tieba, Weibo)
✤ Visual pattern. ✤ Promotional content. ✤ Distribution channels.
Original Blur Noise Rotation Occlusion Texture Color manipulation Transparentization
➤ 45 and 135 degrees are effective
➤ 45 and 135 degrees are effective
➤ Less noising is enough
➤ 45 and 135 degrees are effective
➤ Less noising is enough
➤ Green is evasive colour
Compromised accounts: rarely post comment only on hot microblog Dedicated accounts: > 30 posts/day with meaningless sentences
0% 15% 30% 45% 60% Compromised Dedicated
Visual pattern. Harden current models. Promotional content. Regularize promotion channel. Distribution channels. Secure accounts.
✤ APPIs are prevalent ✤ Understanding criminal goal and ecosystem behind
adversarial images
✤ Hardening machine learning model against APPI attack
deserves further studies