Out of Sight, Out of Track: Adversarial Attacks on Propagation-based Multi-Object Trackers via Query State Manipulation

arXiv cs.CV / 4/2/2026

💬 OpinionSignals & Early TrendsIdeas & Deep AnalysisModels & Research

Key Points

  • The paper identifies that Tracking-by-Query-Propagation (TBP) multi-object tracking systems, while enabling end-to-end long-range temporal modeling, have previously underexplored vulnerabilities that can be exploited by adversarial attacks.
  • It proposes FADE, an attack framework with two targeted strategies: Temporal Query Flooding to exhaust a tracker’s query budget and force valid tracks to end, and Temporal Memory Corruption to break temporal links and erase learned identity cues.
  • The work includes a differentiable optimization pipeline that makes the attack more physically realizable by using simulations of perception sensor spoofing.
  • Experiments on MOT17 and MOT20 show FADE substantially degrades state-of-the-art TBP trackers, leading to many identity switches and frequent track terminations.
  • The results suggest propagation- and memory-based MOT architectures may require new robustness measures against temporally consistent and sensor-driven adversarial perturbations.

Abstract

Recent Tracking-by-Query-Propagation (TBP) methods have advanced Multi-Object Tracking (MOT) by enabling end-to-end (E2E) pipelines with long-range temporal modeling. However, this reliance on query propagation introduces unexplored architectural vulnerabilities to adversarial attacks. We present FADE, a novel attack framework designed to exploit these specific vulnerabilities. FADE employs two attack strategies targeting core TBP mechanisms: (i) Temporal Query Flooding: Generates spurious temporally consistent track queries to exhaust the tracker's limited query budget, forcing it to terminate valid tracks. (ii) Temporal Memory Corruption: Directly attacks the query updater's memory by severing temporal links via state de-correlation and erasing the learned feature identity of matched tracks. Furthermore, we introduce a differentiable pipeline to optimize these attacks for physical-world realizability by leveraging simulations of advanced perception sensor spoofing. Experiments on MOT17 and MOT20 benchmarks demonstrate that FADE is highly effective against state-of-the-art TBP trackers, causing significant identity switches and track terminations.