{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T19:17:13Z","timestamp":1771615033654,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":41,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819606016","type":"print"},{"value":"9789819606023","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,11,25]],"date-time":"2024-11-25T00:00:00Z","timestamp":1732492800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,25]],"date-time":"2024-11-25T00:00:00Z","timestamp":1732492800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0602-3_17","type":"book-chapter","created":{"date-parts":[[2024,11,24]],"date-time":"2024-11-24T03:46:58Z","timestamp":1732420018000},"page":"310-326","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Eidos: Efficient, Imperceptible Adversarial 3D Point Clouds"],"prefix":"10.1007","author":[{"given":"Hanwei","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Luo","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Qisong","family":"He","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Renjue","family":"Li","sequence":"additional","affiliation":[]},{"given":"Ronan","family":"Sicre","sequence":"additional","affiliation":[]},{"given":"Xiaowei","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Holger","family":"Hermanns","sequence":"additional","affiliation":[]},{"given":"Lijun","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,25]]},"reference":[{"key":"17_CR1","unstructured":"Athalye, A., Carlini, N., Wagner, D.: Obfuscated gradients give a false sense of security: circumventing defenses to adversarial examples. In: International Conference on Machine Learning, pp. 274\u2013283. PMLR (2018)"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 39\u201357. IEEE (2017)","DOI":"10.1109\/SP.2017.49"},{"key":"17_CR3","doi-asserted-by":"publisher","unstructured":"Duan, Y., Zheng, Y., Lu, J., Zhou, J., Tian, Q.: Structural relational reasoning of point clouds. In: 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 949\u2013958 (2019). https:\/\/doi.org\/10.1109\/CVPR.2019.00104","DOI":"10.1109\/CVPR.2019.00104"},{"key":"17_CR4","unstructured":"EU: The artificial intelligence act (2023). https:\/\/artificialintelligenceact.eu"},{"key":"17_CR5","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv:1412.6572 (2014)"},{"key":"17_CR6","unstructured":"Guo, C., Gardner, J., You, Y., Wilson, A.G., Weinberger, K.: Simple black-box adversarial attacks. In: International Conference on Machine Learning, pp. 2484\u20132493. PMLR (2019)"},{"key":"17_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/978-3-030-58610-2_15","volume-title":"Computer Vision \u2013 ECCV 2020","author":"A Hamdi","year":"2020","unstructured":"Hamdi, A., Rojas, S., Thabet, A., Ghanem, B.: AdvPC: transferable adversarial perturbations on 3d point clouds. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020, Part XII. LNCS, vol. 12357, pp. 241\u2013257. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58610-2_15"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Hu, Q., Liu, D., Hu, W.: Exploring the devil in graph spectral domain for 3d point cloud attacks. arXiv preprint arXiv:2202.07261 (2022)","DOI":"10.1007\/978-3-031-20062-5_14"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Huang, Q., Dong, X., Chen, D., Zhou, H., Zhang, W., Yu, N.: Shape-invariant 3d adversarial point clouds. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 15335\u201315344 (2022)","DOI":"10.1109\/CVPR52688.2022.01490"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Kim, J., Hua, B.S., Nguyen, T., Yeung, S.K.: Minimal adversarial examples for deep learning on 3d point clouds. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 7797\u20137806 (2021)","DOI":"10.1109\/ICCV48922.2021.00770"},{"key":"17_CR11","unstructured":"Kurakin, A., Goodfellow, I., Bengio, S.: Adversarial examples in the physical world. arXiv:1607.02533 (2016)"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Liu, D., Yu, R., Su, H.: Extending adversarial attacks and defenses to deep 3d point cloud classifiers. In: 2019 IEEE International Conference on Image Processing (ICIP), pp. 2279\u20132283. IEEE (2019)","DOI":"10.1109\/ICIP.2019.8803770"},{"key":"17_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-030-66415-2_6","volume-title":"Computer Vision \u2013 ECCV 2020 Workshops","author":"D Liu","year":"2020","unstructured":"Liu, D., Yu, R., Su, H.: Adversarial shape perturbations on 3d point clouds. In: Bartoli, A., Fusiello, A. (eds.) ECCV 2020, Part I. LNCS, vol. 12535, pp. 88\u2013104. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-66415-2_6"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Liu, Y., Fan, B., Meng, G., Lu, J., Xiang, S., Pan, C.: Densepoint: learning densely contextual representation for efficient point cloud processing. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 5239\u20135248 (2019)","DOI":"10.1109\/ICCV.2019.00534"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Maturana, D., Scherer, S.: Voxnet: a 3d convolutional neural network for real-time object recognition. In: 2015 IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS), pp. 922\u2013928. IEEE (2015)","DOI":"10.1109\/IROS.2015.7353481"},{"key":"17_CR16","unstructured":"Miao, Y., Dong, Y., Zhu, J., Gao, X.S.: Isometric 3d adversarial examples in the physical world. arXiv preprint arXiv:2210.15291 (2022)"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Jha, S., Fredrikson, M., Celik, Z.B., Swami, A.: The limitations of deep learning in adversarial settings. In: 2016 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 372\u2013387. IEEE (2016)","DOI":"10.1109\/EuroSP.2016.36"},{"key":"17_CR18","unstructured":"Qi, C.R., Su, H., Mo, K., Guibas, L.J.: Pointnet: deep learning on point sets for 3d classification and segmentation. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 652\u2013660 (2017)"},{"key":"17_CR19","unstructured":"Qi, C.R., Yi, L., Su, H., Guibas, L.J.: Pointnet++: Deep hierarchical feature learning on point sets in a metric space. In: Advances in Neural Information Processing Systems, vol. 30 (2017)"},{"issue":"11","key":"17_CR20","doi-asserted-by":"publisher","first-page":"927","DOI":"10.1016\/j.robot.2008.08.005","volume":"56","author":"RB Rusu","year":"2008","unstructured":"Rusu, R.B., Marton, Z.C., Blodow, N., Dolha, M., Beetz, M.: Towards 3d point cloud based object maps for household environments. Robot. Auton. Syst. 56(11), 927\u2013941 (2008)","journal-title":"Robot. Auton. Syst."},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Shi, Z., Chen, Z., Xu, Z., Yang, W., Yu, Z., Huang, L.: Shape prior guided attack: sparser perturbations on 3d point clouds. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a036, pp. 8277\u20138285 (2022)","DOI":"10.1609\/aaai.v36i8.20802"},{"key":"17_CR22","doi-asserted-by":"publisher","first-page":"15951","DOI":"10.1007\/s11042-018-6912-6","volume":"78","author":"RD Singh","year":"2019","unstructured":"Singh, R.D., Mittal, A., Bhatia, R.K.: 3d convolutional neural network for object recognition: a review. Multimedia Tools Appl. 78, 15951\u201315995 (2019)","journal-title":"Multimedia Tools Appl."},{"issue":"6","key":"17_CR23","doi-asserted-by":"publisher","first-page":"5158","DOI":"10.1109\/JIOT.2022.3222159","volume":"10","author":"K Tang","year":"2022","unstructured":"Tang, K., et al.: Rethinking perturbation directions for imperceptible adversarial attacks on point clouds. IEEE Internet Things J. 10(6), 5158\u20135169 (2022)","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"17_CR24","first-page":"1186633","volume":"2022","author":"K Tang","year":"2022","unstructured":"Tang, K., et al.: Normalattack: curvature-aware shape deformation along normals for imperceptible point cloud attack. Secur. Commun. Netw. 2022(1), 1186633 (2022)","journal-title":"Secur. Commun. Netw."},{"key":"17_CR25","doi-asserted-by":"crossref","unstructured":"Tsai, T., Yang, K., Ho, T.Y., Jin, Y.: Robust adversarial objects against deep learning models. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a034, pp. 954\u2013962 (2020)","DOI":"10.1609\/aaai.v34i01.5443"},{"issue":"5","key":"17_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3326362","volume":"38","author":"Y Wang","year":"2019","unstructured":"Wang, Y., Sun, Y., Liu, Z., Sarma, S.E., Bronstein, M.M., Solomon, J.M.: Dynamic graph CNN for learning on point clouds. ACM Trans. Graph. (tog) 38(5), 1\u201312 (2019)","journal-title":"ACM Trans. Graph. (tog)"},{"issue":"4","key":"17_CR27","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004)","journal-title":"IEEE Trans. Image Process."},{"key":"17_CR28","unstructured":"Wen, Y., Lin, J., Chen, K., Chen, C., Jia, K.: Geometry-aware generation of adversarial point clouds. arXiv preprint arXiv:1912.11171 (2019)"},{"key":"17_CR29","doi-asserted-by":"crossref","unstructured":"Wicker, M., Kwiatkowska, M.: Robustness of 3d deep learning in an adversarial setting. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 11767\u201311775 (2019)","DOI":"10.1109\/CVPR.2019.01204"},{"key":"17_CR30","unstructured":"Wu, Z., et al.: 3d shapenets: a deep representation for volumetric shapes. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1912\u20131920 (2015)"},{"key":"17_CR31","doi-asserted-by":"crossref","unstructured":"Xiang, C., Qi, C.R., Li, B.: Generating 3d adversarial point clouds. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9136\u20139144 (2019)","DOI":"10.1109\/CVPR.2019.00935"},{"key":"17_CR32","first-page":"12288","volume":"33","author":"J Yang","year":"2020","unstructured":"Yang, J., Jiang, Y., Huang, X., Ni, B., Zhao, C.: Learning black-box attackers with transferable priors and query feedback. Adv. Neural. Inf. Process. Syst. 33, 12288\u201312299 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"17_CR33","unstructured":"Yang, J., Zhang, Q., Fang, R., Ni, B., Liu, J., Tian, Q.: Adversarial attack and defense on point sets. arXiv preprint arXiv:1902.10899 (2019)"},{"key":"17_CR34","doi-asserted-by":"crossref","unstructured":"Yang, J., et al.: Modeling point clouds with self-attention and gumbel subset sampling. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 3323\u20133332 (2019)","DOI":"10.1109\/CVPR.2019.00344"},{"issue":"1","key":"17_CR35","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13635-020-0101-7","volume":"2020","author":"H Zhang","year":"2020","unstructured":"Zhang, H., Avrithis, Y., Furon, T., Amsaleg, L.: Smooth adversarial examples. EURASIP J. Inf. Secur. 2020(1), 1\u201312 (2020)","journal-title":"EURASIP J. Inf. Secur."},{"key":"17_CR36","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1109\/TIFS.2020.3021899","volume":"16","author":"H Zhang","year":"2020","unstructured":"Zhang, H., Avrithis, Y., Furon, T., Amsaleg, L.: Walking on the edge: fast, low-distortion adversarial examples. IEEE Trans. Inf. Forensics Secur. 16, 701\u2013713 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"17_CR37","unstructured":"Zhang, J., et al.: 3d adversarial attacks beyond point cloud. arXiv preprint arXiv:2104.12146 (2021)"},{"key":"17_CR38","unstructured":"Zheng, T., Chen, C., Ren, K., et\u00a0al.: Learning saliency maps for adversarial point-cloud generation. arXiv preprint arXiv:1812.01687 (2018)"},{"key":"17_CR39","doi-asserted-by":"crossref","unstructured":"Zheng, T., Chen, C., Yuan, J., Li, B., Ren, K.: Pointcloud saliency maps. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 1598\u20131606 (2019)","DOI":"10.1109\/ICCV.2019.00168"},{"key":"17_CR40","doi-asserted-by":"crossref","unstructured":"Zhou, H., et al.: LG-GAN: label guided adversarial network for flexible targeted attack of point cloud based deep networks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 10356\u201310365 (2020)","DOI":"10.1109\/CVPR42600.2020.01037"},{"key":"17_CR41","doi-asserted-by":"crossref","unstructured":"Zhou, H., Chen, K., Zhang, W., Fang, H., Zhou, W., Yu, N.: Dup-net: denoiser and upsampler network for 3d adversarial point clouds defense. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 1961\u20131970 (2019)","DOI":"10.1109\/ICCV.2019.00205"}],"container-title":["Lecture Notes in Computer Science","Dependable Software Engineering. Theories, Tools, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0602-3_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,24]],"date-time":"2024-11-24T04:20:25Z","timestamp":1732422025000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0602-3_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,25]]},"ISBN":["9789819606016","9789819606023"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0602-3_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,25]]},"assertion":[{"value":"25 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SETTA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Dependable Software Engineering: Theories, Tools, and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hong Kong","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"setta2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/setta2024.cs.cityu.edu.hk\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}