{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T21:55:48Z","timestamp":1757541348708},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,5]],"date-time":"2021-12-05T00:00:00Z","timestamp":1638662400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,5]],"date-time":"2021-12-05T00:00:00Z","timestamp":1638662400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,5]],"date-time":"2021-12-05T00:00:00Z","timestamp":1638662400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,5]]},"DOI":"10.1109\/dac18074.2021.9586275","type":"proceedings-article","created":{"date-parts":[[2021,11,8]],"date-time":"2021-11-08T18:30:34Z","timestamp":1636396234000},"page":"547-552","source":"Crossref","is-referenced-by-count":3,"title":["3D-Adv: Black-Box Adversarial Attacks against Deep Learning Models through 3D Sensors"],"prefix":"10.1109","author":[{"given":"Kaichen","family":"Yang","sequence":"first","affiliation":[]},{"given":"Xuan-Yi","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Yixin","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Tsung-Yi","family":"Ho","sequence":"additional","affiliation":[]},{"given":"Yier","family":"Jin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"49","article-title":"Commandersong: A systematic approach for practical adversarial voice recognition","author":"yuan","year":"2018","journal-title":"27th USENIX Security Symposium (USENIX Security 18)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00935"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2019.8803770"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339815"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5443"},{"key":"ref16","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2014","journal-title":"arXiv preprint arXiv 1412 6572"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref19","article-title":"Transferability in machine learning: from phenomena to black-box attacks using adversarial samples","author":"papernot","year":"2016","journal-title":"arXiv preprint arXiv 1605 07761"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3197517.3201301"},{"key":"ref3","first-page":"5099","article-title":"Pointnet++: Deep hierarchical feature learning on point sets in a metric space","author":"qi","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref6","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2013","journal-title":"arXiv preprint arXiv 1312 6199"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00985"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317761"},{"key":"ref7","first-page":"513","article-title":"Hidden voice commands","author":"carlini","year":"2016","journal-title":"25th USENIX Security Symposium ( USENIX Security 16)"},{"key":"ref2","first-page":"652","article-title":"Pointnet: Deep learning on point sets for 3d classification and segmentation","author":"qi","year":"2017","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2015.7353481"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317762"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"year":"0","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.04.014"},{"key":"ref23","first-page":"1912","article-title":"3d shapenets: A deep representation for volumetric shapes","author":"wu","year":"2015","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition"}],"event":{"name":"2021 58th ACM\/IEEE Design Automation Conference (DAC)","start":{"date-parts":[[2021,12,5]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2021,12,9]]}},"container-title":["2021 58th ACM\/IEEE Design Automation Conference (DAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9585997\/9586083\/09586275.pdf?arnumber=9586275","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:55:53Z","timestamp":1652187353000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9586275\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,5]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/dac18074.2021.9586275","relation":{},"subject":[],"published":{"date-parts":[[2021,12,5]]}}}