• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

三维点云分类中的隐形迁移攻击与防御。

Imperceptible Transfer Attack and Defense on 3D Point Cloud Classification.

出版信息

IEEE Trans Pattern Anal Mach Intell. 2023 Apr;45(4):4727-4746. doi: 10.1109/TPAMI.2022.3193449. Epub 2023 Mar 7.

DOI:10.1109/TPAMI.2022.3193449
PMID:35877804
Abstract

Although many efforts have been made into attack and defense on the 2D image domain in recent years, few methods explore the vulnerability of 3D models. Existing 3D attackers generally perform point-wise perturbation over point clouds, resulting in deformed structures or outliers, which is easily perceivable by humans. Moreover, their adversarial examples are generated under the white-box setting, which frequently suffers from low success rates when transferred to attack remote black-box models. In this article, we study 3D point cloud attacks from two new and challenging perspectives by proposing a novel Imperceptible Transfer Attack (ITA): 1) Imperceptibility: we constrain the perturbation direction of each point along its normal vector of the neighborhood surface, leading to generated examples with similar geometric properties and thus enhancing the imperceptibility. 2) Transferability: we develop an adversarial transformation model to generate the most harmful distortions and enforce the adversarial examples to resist it, improving their transferability to unknown black-box models. Further, we propose to train more robust black-box 3D models to defend against such ITA attacks by learning more discriminative point cloud representations. Extensive evaluations demonstrate that our ITA attack is more imperceptible and transferable than state-of-the-arts and validate the superiority of our defense strategy.

摘要

尽管近年来在二维图像领域进行了许多攻击和防御的努力,但很少有方法探索三维模型的脆弱性。现有的三维攻击者通常对点云进行逐点的扰动,导致结构变形或出现异常点,这很容易被人类察觉。此外,他们的对抗样本是在白盒设置下生成的,当转移到攻击远程黑盒模型时,成功率通常较低。在本文中,我们从两个新的和具有挑战性的角度研究三维点云攻击,提出了一种新的不可察觉的传输攻击(ITA):1)不可察觉性:我们约束每个点的扰动方向沿着其邻域表面的法向量,从而生成具有相似几何性质的示例,从而提高不可察觉性。2)可转移性:我们开发了一种对抗变换模型来生成最有害的扭曲,并强制对抗样本抵抗这种扭曲,从而提高它们对未知黑盒模型的可转移性。此外,我们建议通过学习更具判别力的点云表示来训练更健壮的黑盒三维模型,以防御这种 ITA 攻击。广泛的评估表明,我们的 ITA 攻击比现有的方法更具不可察觉性和可转移性,并验证了我们防御策略的优越性。

相似文献

1
Imperceptible Transfer Attack and Defense on 3D Point Cloud Classification.三维点云分类中的隐形迁移攻击与防御。
IEEE Trans Pattern Anal Mach Intell. 2023 Apr;45(4):4727-4746. doi: 10.1109/TPAMI.2022.3193449. Epub 2023 Mar 7.
2
Diffusion Models for Imperceptible and Transferable Adversarial Attack.用于不可察觉和可转移对抗攻击的扩散模型
IEEE Trans Pattern Anal Mach Intell. 2025 Feb;47(2):961-977. doi: 10.1109/TPAMI.2024.3480519. Epub 2025 Jan 9.
3
Geometry-Aware Generation of Adversarial Point Clouds.基于几何感知的对抗式点云生成。
IEEE Trans Pattern Anal Mach Intell. 2022 Jun;44(6):2984-2999. doi: 10.1109/TPAMI.2020.3044712. Epub 2022 May 5.
4
Point Cloud Attacks in Graph Spectral Domain: When 3D Geometry Meets Graph Signal Processing.图谱域中的点云攻击:当三维几何与图信号处理相遇时
IEEE Trans Pattern Anal Mach Intell. 2024 May;46(5):3079-3095. doi: 10.1109/TPAMI.2023.3339130. Epub 2024 Apr 3.
5
DualFlow: Generating imperceptible adversarial examples by flow field and normalize flow-based model.双流:通过流场和基于归一化流的模型生成不可察觉的对抗样本。
Front Neurorobot. 2023 Feb 9;17:1129720. doi: 10.3389/fnbot.2023.1129720. eCollection 2023.
6
Remix: Towards the transferability of adversarial examples.对抗样本的可迁移性研究
Neural Netw. 2023 Jun;163:367-378. doi: 10.1016/j.neunet.2023.04.012. Epub 2023 Apr 18.
7
Erosion Attack: Harnessing Corruption To Improve Adversarial Examples.侵蚀攻击:利用腐败来改进对抗样本。
IEEE Trans Image Process. 2023;32:4828-4841. doi: 10.1109/TIP.2023.3251719. Epub 2023 Aug 29.
8
Local imperceptible adversarial attacks against human pose estimation networks.针对人体姿态估计网络的局部不可察觉对抗攻击。
Vis Comput Ind Biomed Art. 2023 Nov 21;6(1):22. doi: 10.1186/s42492-023-00148-1.
9
Enhancing robustness in video recognition models: Sparse adversarial attacks and beyond.增强视频识别模型的鲁棒性:稀疏对抗攻击及其他。
Neural Netw. 2024 Mar;171:127-143. doi: 10.1016/j.neunet.2023.11.056. Epub 2023 Nov 25.
10
Generalizable Black-Box Adversarial Attack With Meta Learning.基于元学习的可推广黑盒对抗攻击
IEEE Trans Pattern Anal Mach Intell. 2024 Mar;46(3):1804-1818. doi: 10.1109/TPAMI.2022.3194988. Epub 2024 Feb 6.

引用本文的文献

1
LPF-Defense: 3D adversarial defense based on frequency analysis.LPF-Defense:基于频率分析的 3D 对抗防御。
PLoS One. 2023 Feb 6;18(2):e0271388. doi: 10.1371/journal.pone.0271388. eCollection 2023.