2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2020
DOI: 10.1109/cvpr42600.2020.01373
|View full text |Cite
|
Sign up to set email alerts
|

Physically Realizable Adversarial Examples for LiDAR Object Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
111
3
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 178 publications
(115 citation statements)
references
References 2 publications
0
111
3
1
Order By: Relevance
“…Referring to the contour of 3D adversarial examples in References [12,13] we manually created a 3D object Oadv with irregular contours using a modeling tool. The shape of Oadv is similar to a cube with a side length of 50 cm, as shown in Figure 2.…”
Section: The Projection From 3d To 2dmentioning
confidence: 99%
See 2 more Smart Citations
“…Referring to the contour of 3D adversarial examples in References [12,13] we manually created a 3D object Oadv with irregular contours using a modeling tool. The shape of Oadv is similar to a cube with a side length of 50 cm, as shown in Figure 2.…”
Section: The Projection From 3d To 2dmentioning
confidence: 99%
“…18 Some researchers successfully attacked the LiDAR-based system by 3D adversarial examples. 12,13 The time difference between the laser and its reflection, which indirectly caused the point cloud data to change, was influenced by the objects. And eventually inducing the system to make wrong decisions during the postprocessing stage.…”
Section: Attacks Against the Lidar-based Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…The 3D-printed physical object can extend invisibility to its immediate neighboring objects. 11 By placing a 3D-printed adversarial example object on top of a vehicle, the vehicle becomes (partially) invisible to the targeted lidar detector system. › Real-world model stealing attacks:…”
Section: Toward Real-world Aml Attacksmentioning
confidence: 99%
“…Regarding data augmentation, there have been multiple approaches going from transformations of a real training set [ 11 , 12 , 13 , 14 , 15 , 16 ], to combinations of real and synthetic data [ 17 , 18 , 19 , 20 ], to purely synthetic data [ 21 , 22 , 23 ] and domain adaptation techniques [ 24 , 25 , 26 ]. In [ 12 ], the point clouds of previously labeled objects are added by concatenation at different positions into the training data in order to improve the training of the network.…”
Section: Introductionmentioning
confidence: 99%