{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:16:41Z","timestamp":1750220201047,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,7]],"date-time":"2022-08-07T00:00:00Z","timestamp":1659830400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003977","name":"Israel Science Foundation","doi-asserted-by":"publisher","award":["1083\/18"],"award-info":[{"award-number":["1083\/18"]}],"id":[{"id":"10.13039\/501100003977","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,8,7]]},"DOI":"10.1145\/3528233.3530710","type":"proceedings-article","created":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T13:56:43Z","timestamp":1658325403000},"page":"1-9","source":"Crossref","is-referenced-by-count":1,"title":["Random Walks for Adversarial Meshes"],"prefix":"10.1145","author":[{"given":"Amir","family":"Belder","sequence":"first","affiliation":[{"name":"Technion - Israel Institute of Technology, Israel"}]},{"given":"Gal","family":"Yefet","sequence":"additional","affiliation":[{"name":"Technion - Israel Institute of Technology, Israel"}]},{"given":"Ran","family":"Ben-Itzhak","sequence":"additional","affiliation":[{"name":"Technion - Israel Institute of Technology, Israel"}]},{"given":"Ayellet","family":"Tal","sequence":"additional","affiliation":[{"name":"Technion - Israel Institute of Technology, Israel"}]}],"member":"320","published-online":{"date-parts":[[2022,8,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Advances in Neural Information Processing Systems, H.\u00a0Larochelle, M.\u00a0Ranzato, R.\u00a0Hadsell, M.\u00a0F. Balcan, and H.\u00a0Lin (Eds.). Vol.\u00a033. Curran Associates","author":"Andriushchenko Maksym","year":"2020","unstructured":"Maksym Andriushchenko and Nicolas Flammarion . 2020. Understanding and Improving Fast Adversarial Training . In Advances in Neural Information Processing Systems, H.\u00a0Larochelle, M.\u00a0Ranzato, R.\u00a0Hadsell, M.\u00a0F. Balcan, and H.\u00a0Lin (Eds.). Vol.\u00a033. Curran Associates , Inc ., 16048\u201316059. https:\/\/proceedings.neurips.cc\/paper\/ 2020 \/file\/b8ce47761ed7b3b6f48b583350b7f9e4-Paper.pdf Maksym Andriushchenko and Nicolas Flammarion. 2020. Understanding and Improving Fast Adversarial Training. In Advances in Neural Information Processing Systems, H.\u00a0Larochelle, M.\u00a0Ranzato, R.\u00a0Hadsell, M.\u00a0F. Balcan, and H.\u00a0Lin (Eds.). Vol.\u00a033. Curran Associates, Inc., 16048\u201316059. https:\/\/proceedings.neurips.cc\/paper\/2020\/file\/b8ce47761ed7b3b6f48b583350b7f9e4-Paper.pdf"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACV51458.2022.00299"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40994-3_25"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00009"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134083"},{"key":"e_1_3_2_1_7_1","volume-title":"Sparse and Imperceivable Adversarial Attacks. In IEEE\/CVF International Conference on Computer Vision (ICCV).","author":"Croce Francesco","year":"2019","unstructured":"Francesco Croce and Matthias Hein . 2019 . Sparse and Imperceivable Adversarial Attacks. In IEEE\/CVF International Conference on Computer Vision (ICCV). Francesco Croce and Matthias Hein. 2019. Sparse and Imperceivable Adversarial Attacks. In IEEE\/CVF International Conference on Computer Vision (ICCV)."},{"key":"e_1_3_2_1_8_1","unstructured":"Micha\u00ebl Defferrard Xavier Bresson and Pierre Vandergheynst. 2016. Convolutional Neural Networks on Graphs with Fast Localized Spectral Filtering. CoRR abs\/1606.09375(2016). arXiv:1606.09375http:\/\/arxiv.org\/abs\/1606.09375  Micha\u00ebl Defferrard Xavier Bresson and Pierre Vandergheynst. 2016. Convolutional Neural Networks on Graphs with Fast Localized Spectral Filtering. CoRR abs\/1606.09375(2016). arXiv:1606.09375http:\/\/arxiv.org\/abs\/1606.09375"},{"key":"e_1_3_2_1_9_1","volume-title":"HotFlip: White-Box Adversarial Examples for Text Classification. In Annual Meeting of the Association for Computational Linguistics.","author":"Ebrahimi Javid","year":"2018","unstructured":"Javid Ebrahimi , Anyi Rao , Daniel Lowd , and Dejing Dou . 2018 . HotFlip: White-Box Adversarial Examples for Text Classification. In Annual Meeting of the Association for Computational Linguistics. Javid Ebrahimi, Anyi Rao, Daniel Lowd, and Dejing Dou. 2018. HotFlip: White-Box Adversarial Examples for Text Classification. In Annual Meeting of the Association for Computational Linguistics."},{"key":"e_1_3_2_1_10_1","volume-title":"GWCNN: A metric alignment layer for deep shape analysis. In Computer Graphics Forum, Vol.\u00a036. 49\u201357.","author":"Ezuz Danielle","year":"2017","unstructured":"Danielle Ezuz , Justin Solomon , Vladimir\u00a0 G Kim , and Mirela Ben-Chen . 2017 . GWCNN: A metric alignment layer for deep shape analysis. In Computer Graphics Forum, Vol.\u00a036. 49\u201357. Danielle Ezuz, Justin Solomon, Vladimir\u00a0G Kim, and Mirela Ben-Chen. 2017. GWCNN: A metric alignment layer for deep shape analysis. In Computer Graphics Forum, Vol.\u00a036. 49\u201357."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33018279"},{"key":"e_1_3_2_1_12_1","volume-title":"Explaining and Harnessing Adversarial Examples. In International Conference on Learning Representations. http:\/\/arxiv.org\/abs\/1412","author":"Goodfellow Ian","year":"2015","unstructured":"Ian Goodfellow , Jonathon Shlens , and Christian Szegedy . 2015 . Explaining and Harnessing Adversarial Examples. In International Conference on Learning Representations. http:\/\/arxiv.org\/abs\/1412 .6572 Ian Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. In International Conference on Learning Representations. http:\/\/arxiv.org\/abs\/1412.6572"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58610-2_15"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3306346.3322959","article-title":"Meshcnn: a network with an edge","volume":"38","author":"Hanocka Rana","year":"2019","unstructured":"Rana Hanocka , Amir Hertz , Noa Fish , Raja Giryes , Shachar Fleishman , and Daniel Cohen-Or . 2019 . Meshcnn: a network with an edge . ACM Transactions on Graphics (TOG) 38 , 4 (2019), 1 \u2013 12 . Rana Hanocka, Amir Hertz, Noa Fish, Raja Giryes, Shachar Fleishman, and Daniel Cohen-Or. 2019. Meshcnn: a network with an edge. ACM Transactions on Graphics (TOG) 38, 4 (2019), 1\u201312.","journal-title":"ACM Transactions on Graphics (TOG)"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3414685.3417806"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2019.8803770"},{"key":"e_1_3_2_1_17_1","volume-title":"International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=rJzIBfZAb","author":"Madry Aleksander","year":"2018","unstructured":"Aleksander Madry , Aleksandar Makelov , Ludwig Schmidt , Dimitris Tsipras , and Adrian Vladu . 2018 . Towards Deep Learning Models Resistant to Adversarial Attacks . In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=rJzIBfZAb Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2018. Towards Deep Learning Models Resistant to Adversarial Attacks. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=rJzIBfZAb"},{"volume-title":"Computer Graphics Forum, Vol.\u00a039","author":"Mariani Giorgio","key":"e_1_3_2_1_18_1","unstructured":"Giorgio Mariani , Luca Cosmo , Alexander\u00a0 M Bronstein , and Emanuele Rodola . 2020. Generating Adversarial Surfaces via Band-Limited Perturbations . In Computer Graphics Forum, Vol.\u00a039 . Wiley Online Library , 253\u2013264. Giorgio Mariani, Luca Cosmo, Alexander\u00a0M Bronstein, and Emanuele Rodola. 2020. Generating Adversarial Surfaces via Band-Limited Perturbations. In Computer Graphics Forum, Vol.\u00a039. Wiley Online Library, 253\u2013264."},{"key":"e_1_3_2_1_19_1","volume-title":"Primal-Dual Mesh Convolutional Neural Networks. In Conference on Neural Information Processing Systems (NeurIPS). https:\/\/github.com\/MIT-SPARK\/PD-MeshNet","author":"Milano Francesco","year":"2020","unstructured":"Francesco Milano , Antonio Loquercio , Antoni Rosinol , Davide Scaramuzza , and Luca Carlone . 2020 . Primal-Dual Mesh Convolutional Neural Networks. In Conference on Neural Information Processing Systems (NeurIPS). https:\/\/github.com\/MIT-SPARK\/PD-MeshNet Francesco Milano, Antonio Loquercio, Antoni Rosinol, Davide Scaramuzza, and Luca Carlone. 2020. Primal-Dual Mesh Convolutional Neural Networks. In Conference on Neural Information Processing Systems (NeurIPS). https:\/\/github.com\/MIT-SPARK\/PD-MeshNet"},{"key":"e_1_3_2_1_20_1","volume-title":"Practical black-box attacks against deep learning systems using adversarial examples. arXiv preprint arXiv:1602.02697 1, 2","author":"Papernot Nicolas","year":"2016","unstructured":"Nicolas Papernot , Patrick McDaniel , Ian Goodfellow , Somesh Jha , Z\u00a0Berkay Celik , and Ananthram Swami . 2016. Practical black-box attacks against deep learning systems using adversarial examples. arXiv preprint arXiv:1602.02697 1, 2 ( 2016 ), 3. Nicolas Papernot, Patrick McDaniel, Ian Goodfellow, Somesh Jha, Z\u00a0Berkay Celik, and Ananthram Swami. 2016. Practical black-box attacks against deep learning systems using adversarial examples. arXiv preprint arXiv:1602.02697 1, 2 (2016), 3."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00323"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00445"},{"key":"e_1_3_2_1_24_1","unstructured":"Mingjie Sun Jian Tang Huichen Li Bo Li Chaowei Xiao Yao Chen and Dawn Song. 2018. Data poisoning attack against unsupervised node embedding methods. arXiv preprint arXiv:1810.12881(2018).  Mingjie Sun Jian Tang Huichen Li Bo Li Chaowei Xiao Yao Chen and Dawn Song. 2018. Data poisoning attack against unsupervised node embedding methods. arXiv preprint arXiv:1810.12881(2018)."},{"key":"e_1_3_2_1_25_1","volume-title":"International Conference on Learning Representations. http:\/\/arxiv.org\/abs\/1312","author":"Szegedy Christian","year":"2014","unstructured":"Christian Szegedy , Wojciech Zaremba , Ilya Sutskever , Joan Bruna , Dumitru Erhan , Ian Goodfellow , and Rob Fergus . 2014 . Intriguing properties of neural networks . In International Conference on Learning Representations. http:\/\/arxiv.org\/abs\/1312 .6199 Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2014. Intriguing properties of neural networks. In International Conference on Learning Representations. http:\/\/arxiv.org\/abs\/1312.6199"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5443"},{"key":"e_1_3_2_1_27_1","unstructured":"Remco\u00a0C Veltkamp Stefan van Jole Hassen Drira Boulbaba\u00a0Ben Amor Mohamed Daoudi Huibin Li Liming Chen Peter Claes Dirk Smeets Jeroen Hermans 2011. SHREC\u201911 Track: 3D Face Models Retrieval.. In 3DOR. 89\u201395.  Remco\u00a0C Veltkamp Stefan van Jole Hassen Drira Boulbaba\u00a0Ben Amor Mohamed Daoudi Huibin Li Liming Chen Peter Claes Dirk Smeets Jeroen Hermans 2011. SHREC\u201911 Track: 3D Face Models Retrieval.. In 3DOR. 89\u201395."},{"key":"e_1_3_2_1_28_1","volume-title":"Gray-box Adversarial Training. In European Conference on Computer Vision (ECCV).","author":"Vivek S.","year":"2018","unstructured":"B.\u00a0 S. Vivek , Konda\u00a0Reddy Mopuri , and R.\u00a0 Venkatesh Babu . 2018 . Gray-box Adversarial Training. In European Conference on Computer Vision (ECCV). B.\u00a0S. Vivek, Konda\u00a0Reddy Mopuri, and R.\u00a0Venkatesh Babu. 2018. Gray-box Adversarial Training. In European Conference on Computer Vision (ECCV)."},{"volume-title":"Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing. 2153\u20132162. https:\/\/doi.org\/10.18653\/v1\/D19-1221","author":"Wallace Eric","key":"e_1_3_2_1_29_1","unstructured":"Eric Wallace , Shi Feng , Nikhil Kandpal , Matt Gardner , and Sameer Singh . 2019. Universal Adversarial Triggers for Attacking and Analyzing NLP . In Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing. 2153\u20132162. https:\/\/doi.org\/10.18653\/v1\/D19-1221 Eric Wallace, Shi Feng, Nikhil Kandpal, Matt Gardner, and Sameer Singh. 2019. Universal Adversarial Triggers for Attacking and Analyzing NLP. In Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing. 2153\u20132162. https:\/\/doi.org\/10.18653\/v1\/D19-1221"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01204"},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the IEEE conference on computer vision and pattern recognition. 1912\u20131920","author":"Wu Zhirong","year":"2015","unstructured":"Zhirong Wu , Shuran Song , Aditya Khosla , Fisher Yu , Linguang Zhang , Xiaoou Tang , and Jianxiong Xiao . 2015 . 3d shapenets: A deep representation for volumetric shapes . In Proceedings of the IEEE conference on computer vision and pattern recognition. 1912\u20131920 . Zhirong Wu, Shuran Song, Aditya Khosla, Fisher Yu, Linguang Zhang, Xiaoou Tang, and Jianxiong Xiao. 2015. 3d shapenets: A deep representation for volumetric shapes. In Proceedings of the IEEE conference on computer vision and pattern recognition. 1912\u20131920."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00935"},{"key":"e_1_3_2_1_33_1","volume-title":"MeshAdv: Adversarial Meshes for Visual Recognition. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR).","author":"Xiao Chaowei","year":"2019","unstructured":"Chaowei Xiao , Dawei Yang , Bo Li , Jia Deng , and Mingyan Liu . 2019 . MeshAdv: Adversarial Meshes for Visual Recognition. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR). Chaowei Xiao, Dawei Yang, Bo Li, Jia Deng, and Mingyan Liu. 2019. MeshAdv: Adversarial Meshes for Visual Recognition. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)."},{"key":"e_1_3_2_1_34_1","volume-title":"Improving Transferability of Adversarial Examples With Input Diversity. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR).","author":"Xie Cihang","year":"2019","unstructured":"Cihang Xie , Zhishuai Zhang , Yuyin Zhou , Song Bai , Jianyu Wang , Zhou Ren , and Alan\u00a0 L. Yuille . 2019 . Improving Transferability of Adversarial Examples With Input Diversity. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR). Cihang Xie, Zhishuai Zhang, Yuyin Zhou, Song Bai, Jianyu Wang, Zhou Ren, and Alan\u00a0L. Yuille. 2019. Improving Transferability of Adversarial Examples With Input Diversity. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)."},{"key":"e_1_3_2_1_35_1","unstructured":"D. Yang Chaowei Xiao B. Li Jia Deng and M. Liu. 2018. Realistic Adversarial Examples in 3D Meshes. ArXiv abs\/1810.05206(2018).  D. Yang Chaowei Xiao B. Li Jia Deng and M. Liu. 2018. Realistic Adversarial Examples in 3D Meshes. ArXiv abs\/1810.05206(2018)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Philip Yao Andrew So Tingting Chen and Hao Ji. 2020. On multiview robustness of 3d adversarial attacks. In Practice and Experience in Advanced Research Computing. 372\u2013378.  Philip Yao Andrew So Tingting Chen and Hao Ji. 2020. On multiview robustness of 3d adversarial attacks. In Practice and Experience in Advanced Research Computing. 372\u2013378.","DOI":"10.1145\/3311790.3396652"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Hengtong Zhang Tianhang Zheng Jing Gao Chenglin Miao Lu Su Yaliang Li and Kui Ren. 2019. Data poisoning attack against knowledge graph embedding. arXiv preprint arXiv:1904.12052(2019).  Hengtong Zhang Tianhang Zheng Jing Gao Chenglin Miao Lu Su Yaliang Li and Kui Ren. 2019. Data poisoning attack against knowledge graph embedding. arXiv preprint arXiv:1904.12052(2019).","DOI":"10.24963\/ijcai.2019\/674"},{"key":"e_1_3_2_1_38_1","unstructured":"Jinlai Zhang Lyujie Chen Binbin Liu Bo Ouyang Qizhi Xie Jihong Zhu and Yanmei Meng. 2021. 3D Adversarial Attacks Beyond Point Cloud. CoRR abs\/2104.12146(2021). arXiv:2104.12146https:\/\/arxiv.org\/abs\/2104.12146  Jinlai Zhang Lyujie Chen Binbin Liu Bo Ouyang Qizhi Xie Jihong Zhu and Yanmei Meng. 2021. 3D Adversarial Attacks Beyond Point Cloud. CoRR abs\/2104.12146(2021). arXiv:2104.12146https:\/\/arxiv.org\/abs\/2104.12146"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00128"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.586"}],"event":{"name":"SIGGRAPH '22: Special Interest Group on Computer Graphics and Interactive Techniques Conference","sponsor":["SIGGRAPH ACM Special Interest Group on Computer Graphics and Interactive Techniques"],"location":"Vancouver BC Canada","acronym":"SIGGRAPH '22"},"container-title":["Special Interest Group on Computer Graphics and Interactive Techniques Conference Proceedings"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3528233.3530710","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:49Z","timestamp":1750186969000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3528233.3530710"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,7]]},"references-count":40,"alternative-id":["10.1145\/3528233.3530710","10.1145\/3528233"],"URL":"https:\/\/doi.org\/10.1145\/3528233.3530710","relation":{},"subject":[],"published":{"date-parts":[[2022,8,7]]}}}