{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:22:30Z","timestamp":1750220550382,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key Research and Development of China","award":["2017YFC1703503"],"award-info":[{"award-number":["2017YFC1703503"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972022, U1936212"],"award-info":[{"award-number":["61972022, U1936212"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1145\/3469877.3493596","type":"proceedings-article","created":{"date-parts":[[2022,1,10]],"date-time":"2022-01-10T18:27:21Z","timestamp":1641839241000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Towards Transferable 3D Adversarial Attack"],"prefix":"10.1145","author":[{"given":"Qiming","family":"Lu","sequence":"first","affiliation":[{"name":"Institute of Information Science, Beijing Key Laboratory of Advanced Information Science and Network Technology, Beijing Jiaotong University, CN"}]},{"given":"Shikui","family":"Wei","sequence":"additional","affiliation":[{"name":"Institute of Information Science, Beijing Key Laboratory of Advanced Information Science and Network Technology, Beijing Jiaotong University, CN"}]},{"given":"Haoyu","family":"Chu","sequence":"additional","affiliation":[{"name":"Institute of Information Science, Beijing Key Laboratory of Advanced Information Science and Network Technology, Beijing Jiaotong University, CN"}]},{"given":"Yao","family":"Zhao","sequence":"additional","affiliation":[{"name":"Institute of Information Science, Beijing Key Laboratory of Advanced Information Science and Network Technology, Beijing Jiaotong University, CN"}]}],"member":"320","published-online":{"date-parts":[[2022,1,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 35th International Conference on Machine Learning, ICML 2018, Vol.\u00a080","author":"Athalye Anish","year":"2018","unstructured":"Anish Athalye , Logan Engstrom , Andrew Ilyas , and Kevin Kwok . 2018 . Synthesizing Robust Adversarial Examples . In Proceedings of the 35th International Conference on Machine Learning, ICML 2018, Vol.\u00a080 . 284\u2013293. Anish Athalye, Logan Engstrom, Andrew Ilyas, and Kevin Kwok. 2018. Synthesizing Robust Adversarial Examples. In Proceedings of the 35th International Conference on Machine Learning, ICML 2018, Vol.\u00a080. 284\u2013293."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40994-3_25"},{"key":"e_1_3_2_1_3_1","volume-title":"Towards Evaluating the Robustness of Neural Networks. In 2017 IEEE Symposium on Security and Privacy. 39\u201357","author":"Carlini Nicholas","year":"2017","unstructured":"Nicholas Carlini and David\u00a0 A. Wagner . 2017 . Towards Evaluating the Robustness of Neural Networks. In 2017 IEEE Symposium on Security and Privacy. 39\u201357 . Nicholas Carlini and David\u00a0A. Wagner. 2017. Towards Evaluating the Robustness of Neural Networks. In 2017 IEEE Symposium on Security and Privacy. 39\u201357."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"e_1_3_2_1_5_1","volume-title":"Boosting Adversarial Attacks With Momentum. In 2018 IEEE Conference on Computer Vision and Pattern Recognition, CVPR","author":"Dong Yinpeng","year":"2018","unstructured":"Yinpeng Dong , Fangzhou Liao , Tianyu Pang , Hang Su , Jun Zhu , Xiaolin Hu , and Jianguo Li . 2018 . Boosting Adversarial Attacks With Momentum. In 2018 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2018. 9185\u20139193. Yinpeng Dong, Fangzhou Liao, Tianyu Pang, Hang Su, Jun Zhu, Xiaolin Hu, and Jianguo Li. 2018. Boosting Adversarial Attacks With Momentum. In 2018 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2018. 9185\u20139193."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00444"},{"key":"e_1_3_2_1_7_1","volume-title":"Rich Feature Hierarchies for Accurate Object Detection and Semantic Segmentation. In 2014 IEEE Conference on Computer Vision and Pattern Recognition, CVPR","author":"Girshick B.","year":"2014","unstructured":"Ross\u00a0 B. Girshick , Jeff Donahue , Trevor Darrell , and Jitendra Malik . 2014 . Rich Feature Hierarchies for Accurate Object Detection and Semantic Segmentation. In 2014 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2014. 580\u2013587. Ross\u00a0B. Girshick, Jeff Donahue, Trevor Darrell, and Jitendra Malik. 2014. Rich Feature Hierarchies for Accurate Object Detection and Semantic Segmentation. In 2014 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2014. 580\u2013587."},{"key":"e_1_3_2_1_8_1","volume-title":"Deep Residual Learning for Image Recognition. In 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR","author":"He Kaiming","year":"2016","unstructured":"Kaiming He , Xiangyu Zhang , Shaoqing Ren , and Jian Sun . 2016 . Deep Residual Learning for Image Recognition. In 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016. 770\u2013778. Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep Residual Learning for Image Recognition. In 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016. 770\u2013778."},{"volume-title":"Computer Vision - ECCV 2016 - 14th European Conference, Vol.\u00a09908. 630\u2013645.","author":"He Kaiming","key":"e_1_3_2_1_9_1","unstructured":"Kaiming He , Xiangyu Zhang , Shaoqing Ren , and Jian Sun . 2016. Identity Mappings in Deep Residual Networks . In Computer Vision - ECCV 2016 - 14th European Conference, Vol.\u00a09908. 630\u2013645. Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Identity Mappings in Deep Residual Networks. In Computer Vision - ECCV 2016 - 14th European Conference, Vol.\u00a09908. 630\u2013645."},{"key":"e_1_3_2_1_10_1","volume-title":"ImageNet Classification with Deep Convolutional Neural Networks. In Advances in Neural Information Processing Systems 25: 26th Annual Conference on Neural Information Processing Systems","author":"Krizhevsky Alex","year":"2012","unstructured":"Alex Krizhevsky , Ilya Sutskever , and Geoffrey\u00a0 E. Hinton . 2012 . ImageNet Classification with Deep Convolutional Neural Networks. In Advances in Neural Information Processing Systems 25: 26th Annual Conference on Neural Information Processing Systems 2012.1106\u20131114. Alex Krizhevsky, Ilya Sutskever, and Geoffrey\u00a0E. Hinton. 2012. ImageNet Classification with Deep Convolutional Neural Networks. In Advances in Neural Information Processing Systems 25: 26th Annual Conference on Neural Information Processing Systems 2012.1106\u20131114."},{"key":"e_1_3_2_1_11_1","volume-title":"5th International Conference on Learning Representations, ICLR","author":"Kurakin Alexey","year":"2017","unstructured":"Alexey Kurakin , Ian\u00a0 J. Goodfellow , and Samy Bengio . 2017 . Adversarial Machine Learning at Scale . In 5th International Conference on Learning Representations, ICLR 2017. Alexey Kurakin, Ian\u00a0J. Goodfellow, and Samy Bengio. 2017. Adversarial Machine Learning at Scale. In 5th International Conference on Learning Representations, ICLR 2017."},{"key":"e_1_3_2_1_12_1","volume-title":"Nesterov Accelerated Gradient and Scale Invariance for Adversarial Attacks. In 8th International Conference on Learning Representations, ICLR","author":"Lin Jiadong","year":"2020","unstructured":"Jiadong Lin , Chuanbiao Song , Kun He , Liwei Wang , and John\u00a0 E. Hopcroft . 2020 . Nesterov Accelerated Gradient and Scale Invariance for Adversarial Attacks. In 8th International Conference on Learning Representations, ICLR 2020. Jiadong Lin, Chuanbiao Song, Kun He, Liwei Wang, and John\u00a0E. Hopcroft. 2020. Nesterov Accelerated Gradient and Scale Invariance for Adversarial Attacks. In 8th International Conference on Learning Representations, ICLR 2020."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298965"},{"key":"e_1_3_2_1_14_1","volume-title":"6th International Conference on Learning Representations, ICLR","author":"Madry Aleksander","year":"2018","unstructured":"Aleksander Madry , Aleksandar Makelov , Ludwig Schmidt , Dimitris Tsipras , and Adrian Vladu . 2018 . Towards Deep Learning Models Resistant to Adversarial Attacks . In 6th International Conference on Learning Representations, ICLR 2018. OpenReview.net. Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2018. Towards Deep Learning Models Resistant to Adversarial Attacks. In 6th International Conference on Learning Representations, ICLR 2018. OpenReview.net."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"e_1_3_2_1_16_1","volume-title":"The Limitations of Deep Learning in Adversarial Settings. In IEEE European Symposium on Security and Privacy, EuroS&P","author":"Papernot Nicolas","year":"2016","unstructured":"Nicolas Papernot , Patrick\u00a0 D. McDaniel , Somesh Jha , Matt Fredrikson , Z.\u00a0 Berkay Celik , and Ananthram Swami . 2016 . The Limitations of Deep Learning in Adversarial Settings. In IEEE European Symposium on Security and Privacy, EuroS&P 2016. 372\u2013387. Nicolas Papernot, Patrick\u00a0D. McDaniel, Somesh Jha, Matt Fredrikson, Z.\u00a0Berkay Celik, and Ananthram Swami. 2016. The Limitations of Deep Learning in Adversarial Settings. In IEEE European Symposium on Security and Privacy, EuroS&P 2016. 372\u2013387."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/0041-5553(64)90137-5"},{"key":"e_1_3_2_1_18_1","volume-title":"Accelerating 3D Deep Learning with PyTorch3D. arXiv:2007.08501","author":"Ravi Nikhila","year":"2020","unstructured":"Nikhila Ravi , Jeremy Reizenstein , David Novotny , Taylor Gordon , Wan-Yen Lo , Justin Johnson , and Georgia Gkioxari . 2020. Accelerating 3D Deep Learning with PyTorch3D. arXiv:2007.08501 ( 2020 ). Nikhila Ravi, Jeremy Reizenstein, David Novotny, Taylor Gordon, Wan-Yen Lo, Justin Johnson, and Georgia Gkioxari. 2020. Accelerating 3D Deep Learning with PyTorch3D. arXiv:2007.08501 (2020)."},{"key":"e_1_3_2_1_19_1","volume-title":"Real-Time Object Detection. In 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR","author":"Redmon Joseph","year":"2016","unstructured":"Joseph Redmon , Santosh\u00a0Kumar Divvala , Ross\u00a0 B. Girshick , and Ali Farhadi . 2016 . You Only Look Once: Unified , Real-Time Object Detection. In 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016. 779\u2013788. Joseph Redmon, Santosh\u00a0Kumar Divvala, Ross\u00a0B. Girshick, and Ali Farhadi. 2016. You Only Look Once: Unified, Real-Time Object Detection. In 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016. 779\u2013788."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v31i1.11231"},{"key":"e_1_3_2_1_21_1","volume-title":"Rethinking the Inception Architecture for Computer Vision. In 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR","author":"Szegedy Christian","year":"2016","unstructured":"Christian Szegedy , Vincent Vanhoucke , Sergey Ioffe , Jonathon Shlens , and Zbigniew Wojna . 2016 . Rethinking the Inception Architecture for Computer Vision. In 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016. 2818\u20132826. Christian Szegedy, Vincent Vanhoucke, Sergey Ioffe, Jonathon Shlens, and Zbigniew Wojna. 2016. Rethinking the Inception Architecture for Computer Vision. In 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016. 2818\u20132826."},{"key":"e_1_3_2_1_22_1","volume-title":"2nd International Conference on Learning Representations.","author":"Szegedy Christian","year":"2014","unstructured":"Christian Szegedy , Wojciech Zaremba , Ilya Sutskever , Joan Bruna , Dumitru Erhan , Ian\u00a0 J. Goodfellow , and Rob Fergus . 2014 . Intriguing properties of neural networks . In 2nd International Conference on Learning Representations. Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian\u00a0J. Goodfellow, and Rob Fergus. 2014. Intriguing properties of neural networks. In 2nd International Conference on Learning Representations."},{"key":"e_1_3_2_1_23_1","volume-title":"Ensemble Adversarial Training: Attacks and Defenses. In 6th International Conference on Learning Representations, ICLR","author":"Tram\u00e8r Florian","year":"2018","unstructured":"Florian Tram\u00e8r , Alexey Kurakin , Nicolas Papernot , Ian\u00a0 J. Goodfellow , Dan Boneh , and Patrick\u00a0 D. McDaniel . 2018 . Ensemble Adversarial Training: Attacks and Defenses. In 6th International Conference on Learning Representations, ICLR 2018. Florian Tram\u00e8r, Alexey Kurakin, Nicolas Papernot, Ian\u00a0J. Goodfellow, Dan Boneh, and Patrick\u00a0D. McDaniel. 2018. Ensemble Adversarial Training: Attacks and Defenses. In 6th International Conference on Learning Representations, ICLR 2018."},{"key":"e_1_3_2_1_24_1","unstructured":"Xiaosen Wang Jiadong Lin Han Hu Jingdong Wang and Kun He. 2021. Boosting Adversarial Transferability through Enhanced Momentum. arxiv:2103.10609\u00a0[cs.CV]  Xiaosen Wang Jiadong Lin Han Hu Jingdong Wang and Kun He. 2021. Boosting Adversarial Transferability through Enhanced Momentum. arxiv:2103.10609\u00a0[cs.CV]"},{"key":"e_1_3_2_1_25_1","volume-title":"MeshAdv: Adversarial Meshes for Visual Recognition. In IEEE Conference on Computer Vision and Pattern Recognition, CVPR","author":"Xiao Chaowei","year":"2019","unstructured":"Chaowei Xiao , Dawei Yang , Bo Li , Jia Deng , and Mingyan Liu . 2019 . MeshAdv: Adversarial Meshes for Visual Recognition. In IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2019. 6898\u20136907. Chaowei Xiao, Dawei Yang, Bo Li, Jia Deng, and Mingyan Liu. 2019. MeshAdv: Adversarial Meshes for Visual Recognition. In IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2019. 6898\u20136907."},{"key":"e_1_3_2_1_26_1","volume-title":"Adversarial Attacks Beyond the Image Space. In IEEE Conference on Computer Vision and Pattern Recognition, CVPR","author":"Zeng Xiaohui","year":"2019","unstructured":"Xiaohui Zeng , Chenxi Liu , Yu-Siang Wang , Weichao Qiu , Lingxi Xie , Yu-Wing Tai , Chi-Keung Tang , and Alan\u00a0 L. Yuille . 2019 . Adversarial Attacks Beyond the Image Space. In IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2019. 4302\u20134311. Xiaohui Zeng, Chenxi Liu, Yu-Siang Wang, Weichao Qiu, Lingxi Xie, Yu-Wing Tai, Chi-Keung Tang, and Alan\u00a0L. Yuille. 2019. Adversarial Attacks Beyond the Image Space. In IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2019. 4302\u20134311."}],"event":{"name":"MMAsia '21: ACM Multimedia Asia","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Gold Coast Australia","acronym":"MMAsia '21"},"container-title":["ACM Multimedia Asia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3469877.3493596","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3469877.3493596","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:16Z","timestamp":1750195696000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3469877.3493596"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":26,"alternative-id":["10.1145\/3469877.3493596","10.1145\/3469877"],"URL":"https:\/\/doi.org\/10.1145\/3469877.3493596","relation":{},"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"2022-01-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}