{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T19:09:39Z","timestamp":1767035379929,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,9,30]],"date-time":"2021-09-30T00:00:00Z","timestamp":1632960000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2018YFE0126300"],"award-info":[{"award-number":["2018YFE0126300"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072076"],"award-info":[{"award-number":["62072076"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,9,30]]},"DOI":"10.1145\/3477244.3477611","type":"proceedings-article","created":{"date-parts":[[2021,9,30]],"date-time":"2021-09-30T17:06:05Z","timestamp":1633021565000},"page":"23-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Generative strategy based backdoor attacks to 3D point clouds"],"prefix":"10.1145","author":[{"given":"Xiangyu","family":"Wen","sequence":"first","affiliation":[{"name":"University of Electronic Science &amp; Technology of China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wei","family":"Jiang","sequence":"additional","affiliation":[{"name":"University of Electronic Science &amp; Technology of China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jinyu","family":"Zhan","sequence":"additional","affiliation":[{"name":"University of Electronic Science &amp; Technology of China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chen","family":"Bian","sequence":"additional","affiliation":[{"name":"University of Electronic Science &amp; Technology of China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ziwei","family":"Song","sequence":"additional","affiliation":[{"name":"University of Electronic Science &amp; Technology of China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2021,9,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Xiaozhi Chen Huimin Ma Ji Wan Bo Li and Tian Xia. 2017. Multi-view 3D Object Detection Network for Autonomous Driving. In CVPR. 6526--6534.  Xiaozhi Chen Huimin Ma Ji Wan Bo Li and Tian Xia. 2017. Multi-view 3D Object Detection Network for Autonomous Driving. In CVPR. 6526--6534.","DOI":"10.1109\/CVPR.2017.691"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909068"},{"key":"e_1_3_2_1_3_1","volume-title":"PointBA: Towards Backdoor Attacks in 3D Point Cloud. arXiv preprint arXiv:2103.16074","author":"Li Xinke","year":"2021","unstructured":"Xinke Li , Zhiru Chen , Yue Zhao , Zekun Tong , Yabang Zhao , Andrew Lim , and Joey Tianyi Zhou . 2021. PointBA: Towards Backdoor Attacks in 3D Point Cloud. arXiv preprint arXiv:2103.16074 ( 2021 ). Xinke Li, Zhiru Chen, Yue Zhao, Zekun Tong, Yabang Zhao, Andrew Lim, and Joey Tianyi Zhou. 2021. PointBA: Towards Backdoor Attacks in 3D Point Cloud. arXiv preprint arXiv:2103.16074 (2021)."},{"key":"e_1_3_2_1_4_1","volume-title":"Guibas","author":"Qi Charles Ruizhongtai","year":"2017","unstructured":"Charles Ruizhongtai Qi , Hao Su , Kaichun Mo , and Leonidas J . Guibas . 2017 . PointNet: Deep Learning on Point Sets for 3D Classification and Segmentation. In CVPR. 77--85. Charles Ruizhongtai Qi, Hao Su, Kaichun Mo, and Leonidas J. Guibas. 2017. PointNet: Deep Learning on Point Sets for 3D Classification and Segmentation. In CVPR. 77--85."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Chong Xiang Charles R. Qi and Bo Li. 2019. Generating 3D Adversarial Point Clouds. In CVPR. 9136--9144.  Chong Xiang Charles R. Qi and Bo Li. 2019. Generating 3D Adversarial Point Clouds. In CVPR. 9136--9144.","DOI":"10.1109\/CVPR.2019.00935"},{"key":"e_1_3_2_1_6_1","volume-title":"A Backdoor Attack against 3D Point Cloud Classifiers. arXiv preprint arXiv:2104.05808","author":"Xiang Zhen","year":"2021","unstructured":"Zhen Xiang , David J. Miller , Siheng Chen , Xi Li , and George Kesidis . 2021. A Backdoor Attack against 3D Point Cloud Classifiers. arXiv preprint arXiv:2104.05808 ( 2021 ). Zhen Xiang, David J. Miller, Siheng Chen, Xi Li, and George Kesidis. 2021. A Backdoor Attack against 3D Point Cloud Classifiers. arXiv preprint arXiv:2104.05808 (2021)."}],"event":{"name":"ESWEEK '21: Seventeenth Embedded Systems Week","sponsor":["SIGBED ACM Special Interest Group on Embedded Systems","SIGDA ACM Special Interest Group on Design Automation","SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing","IEEE CAS","IEEE Council on Electronic Design Automation (CEDA)"],"location":"Virtual Event","acronym":"ESWEEK '21"},"container-title":["Proceedings of the 2021 International Conference on Embedded Software"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3477244.3477611","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3477244.3477611","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:32Z","timestamp":1750191512000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3477244.3477611"}},"subtitle":["work-in-progress"],"short-title":[],"issued":{"date-parts":[[2021,9,30]]},"references-count":6,"alternative-id":["10.1145\/3477244.3477611","10.1145\/3477244"],"URL":"https:\/\/doi.org\/10.1145\/3477244.3477611","relation":{},"subject":[],"published":{"date-parts":[[2021,9,30]]},"assertion":[{"value":"2021-09-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}