{"id":"https://openalex.org/W3204265546","doi":"https://doi.org/10.1145/3477244.3477611","title":"Generative strategy based backdoor attacks to 3D point clouds","display_name":"Generative strategy based backdoor attacks to 3D point clouds","publication_year":2021,"publication_date":"2021-09-30","ids":{"openalex":"https://openalex.org/W3204265546","doi":"https://doi.org/10.1145/3477244.3477611","mag":"3204265546"},"language":"en","primary_location":{"id":"doi:10.1145/3477244.3477611","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3477244.3477611","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 International Conference on Embedded Software","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054813950","display_name":"Xiangyu Wen","orcid":"https://orcid.org/0000-0002-7327-7786"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiangyu Wen","raw_affiliation_strings":["University of Electronic Science &amp; Technology of China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science &amp; Technology of China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101460603","display_name":"Wei Jiang","orcid":"https://orcid.org/0000-0001-6181-3900"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Jiang","raw_affiliation_strings":["University of Electronic Science &amp; Technology of China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science &amp; Technology of China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082893987","display_name":"Jinyu Zhan","orcid":"https://orcid.org/0000-0002-0214-7124"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinyu Zhan","raw_affiliation_strings":["University of Electronic Science &amp; Technology of China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science &amp; Technology of China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047808228","display_name":"Chen Bian","orcid":"https://orcid.org/0000-0002-6867-8788"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chen Bian","raw_affiliation_strings":["University of Electronic Science &amp; Technology of China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science &amp; Technology of China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019374620","display_name":"Ziwei Song","orcid":"https://orcid.org/0000-0003-1782-0227"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ziwei Song","raw_affiliation_strings":["University of Electronic Science &amp; Technology of China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science &amp; Technology of China","institution_ids":["https://openalex.org/I150229711"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5054813950"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":0.2719,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.63761222,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"23","last_page":"24"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9722999930381775,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10036","display_name":"Advanced Neural Network Applications","score":0.9577999711036682,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9953891634941101},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7491637468338013},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6050392389297485},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5659686326980591},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5489689111709595},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.532001793384552},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.4823964834213257},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.46702340245246887},{"id":"https://openalex.org/keywords/training","display_name":"Training (meteorology)","score":0.46242111921310425},{"id":"https://openalex.org/keywords/point-cloud","display_name":"Point cloud","score":0.4389268159866333},{"id":"https://openalex.org/keywords/retraining","display_name":"Retraining","score":0.43830031156539917},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4333949685096741},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.4306895434856415},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4171040654182434},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07467421889305115}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9953891634941101},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7491637468338013},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6050392389297485},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5659686326980591},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5489689111709595},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.532001793384552},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.4823964834213257},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.46702340245246887},{"id":"https://openalex.org/C2777211547","wikidata":"https://www.wikidata.org/wiki/Q17141490","display_name":"Training (meteorology)","level":2,"score":0.46242111921310425},{"id":"https://openalex.org/C131979681","wikidata":"https://www.wikidata.org/wiki/Q1899648","display_name":"Point cloud","level":2,"score":0.4389268159866333},{"id":"https://openalex.org/C2778712577","wikidata":"https://www.wikidata.org/wiki/Q3505966","display_name":"Retraining","level":2,"score":0.43830031156539917},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4333949685096741},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.4306895434856415},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4171040654182434},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07467421889305115},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C153294291","wikidata":"https://www.wikidata.org/wiki/Q25261","display_name":"Meteorology","level":1,"score":0.0},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C155202549","wikidata":"https://www.wikidata.org/wiki/Q178803","display_name":"International trade","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3477244.3477611","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3477244.3477611","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 International Conference on Embedded Software","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3648329846","display_name":null,"funder_award_id":"62072076","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7867289217","display_name":null,"funder_award_id":"2018YFE0126300","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W2555618208","https://openalex.org/W2942091739","https://openalex.org/W2962818872"],"related_works":["https://openalex.org/W4320031223","https://openalex.org/W3015678314","https://openalex.org/W4281902577","https://openalex.org/W4200629851","https://openalex.org/W3009072493","https://openalex.org/W4386185023","https://openalex.org/W4317672133","https://openalex.org/W3140988292","https://openalex.org/W4386080799","https://openalex.org/W4309417370"],"abstract_inverted_index":{"3D":[0,20,42,99],"deep":[1,21,43],"learning":[2,44],"has":[3],"been":[4],"applied":[5,105],"in":[6,80,111],"safety-critical":[7],"scenarios,":[8],"e.g.,":[9],"autonomous":[10],"driving.":[11],"Several":[12,50],"works":[13],"have":[14],"raised":[15],"the":[16,25,46,70,78,81,97,116],"security":[17],"problems":[18],"of":[19,27,72,114],"learnings":[22],"mainly":[23],"from":[24],"perspective":[26],"adversarial":[28],"attacks.":[29],"In":[30],"this":[31],"paper,":[32],"we":[33],"propose":[34],"a":[35],"novel":[36],"backdoor":[37,58,61],"attack":[38],"method":[39],"to":[40,57,76,106],"threaten":[41],"without":[45],"original":[47,117],"training":[48,85,102,118],"data.":[49,121],"neurons":[51],"are":[52,63],"selected":[53],"and":[54,69,101,120],"made":[55],"sensitive":[56],"triggers.":[59],"The":[60],"triggers":[62],"generated":[64,90,98],"by":[65,91],"reversing":[66],"neural":[67],"network,":[68],"shape":[71],"which":[73,109],"is":[74,104,110],"constrained":[75],"map":[77],"objects":[79],"physical":[82],"world.":[83],"Sufficient":[84],"data":[86,103],"can":[87],"be":[88],"also":[89],"reverse":[92],"engineering.":[93],"Finally,":[94],"retraining":[95],"with":[96],"trigger":[100],"inject":[107],"backdoors,":[108],"no":[112],"need":[113],"accessing":[115],"process":[119]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
