{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T19:08:43Z","timestamp":1767035323982,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T00:00:00Z","timestamp":1698278400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China","award":["U20A20177"],"award-info":[{"award-number":["U20A20177"]}]},{"name":"National Natural Science Foundation of China","award":["62202186"],"award-info":[{"award-number":["62202186"]}]},{"name":"Hubei Province Key R&D Technology Special Innovation Project","award":["2021BAA032"],"award-info":[{"award-number":["2021BAA032"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,26]]},"DOI":"10.1145\/3581783.3612456","type":"proceedings-article","created":{"date-parts":[[2023,10,27]],"date-time":"2023-10-27T07:27:30Z","timestamp":1698391650000},"page":"666-675","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["PointCRT: Detecting Backdoor in 3D Point Cloud via Corruption Robustness"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0042-9045","authenticated-orcid":false,"given":"Shengshan","family":"Hu","sequence":"first","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-6664-2888","authenticated-orcid":false,"given":"Wei","family":"Liu","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1735-2024","authenticated-orcid":false,"given":"Minghui","family":"Li","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0551-1200","authenticated-orcid":false,"given":"Yechao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-7677-2310","authenticated-orcid":false,"given":"Xiaogeng","family":"Liu","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-3057-827X","authenticated-orcid":false,"given":"Xianlong","family":"Wang","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9330-2662","authenticated-orcid":false,"given":"Leo Yu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Deakin University, Geelong, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3431-2021","authenticated-orcid":false,"given":"Junhui","family":"Hou","sequence":"additional","affiliation":[{"name":"City University of Hong Kong, Kowloon Tong, China"}]}],"member":"320","published-online":{"date-parts":[[2023,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Shapenet: An information-rich 3D model repository. arXiv preprint arXiv:1512.03012","author":"Chang Angel X.","year":"2015","unstructured":"Angel X. Chang, Thomas Funkhouser, Leonidas Guibas, Pat Hanrahan, Qixing Huang, Zimo Li, Silvio Savarese, Manolis Savva, Shuran Song, Hao Su, et al. 2015. Shapenet: An information-rich 3D model repository. arXiv preprint arXiv:1512.03012 (2015)."},{"key":"e_1_3_2_1_2_1","unstructured":"Bryant Chen Wilka Carvalho Nathalie Baracaldo Heiko Ludwig Ben Edwards Taesung Lee Ian Molloy and B. Srivastava. 2018. Detecting backdoor attacks on deep neural networks by activation clustering. arXiv preprint arXiv:1811.03728 (2018)."},{"key":"e_1_3_2_1_3_1","volume-title":"SentiNet: Detecting physical attacks against deep learning systems. arXiv preprint arXiv:1812.00292","author":"Chou Edward","year":"2018","unstructured":"Edward Chou, Florian Tram\u00e8r, Giancarlo Pellegrino, and Dan Boneh. 2018. SentiNet: Detecting physical attacks against deep learning systems. arXiv preprint arXiv:1812.00292 (2018)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01617"},{"key":"e_1_3_2_1_5_1","volume-title":"Be careful with rotation: A uniform backdoor pattern for 3D shape. arXiv preprint arXiv:2211.16192","author":"Fan Linkun","year":"2022","unstructured":"Linkun Fan, Fazhi He, Qingchen Guo, Wei Tang, Xiaolin Hong, and Bing Li. 2022. Be careful with rotation: A uniform backdoor pattern for 3D shape. arXiv preprint arXiv:2211.16192 (2022)."},{"key":"e_1_3_2_1_6_1","volume-title":"Imperceptible and robust backdoor attack in 3D point cloud. arXiv preprint arXiv:2208.08052","author":"Gao Kuofeng","year":"2022","unstructured":"Kuofeng Gao, Jiawang Bai, Baoyuan Wu, Mengxi Ya, and Shutao Xia. 2022. Imperceptible and robust backdoor attack in 3D point cloud. arXiv preprint arXiv:2208.08052 (2022)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359790"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-020-00257-z"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 2021 International Conference on Machine Learning (ICML'21)","volume":"139","author":"Goyal Ankit","year":"2021","unstructured":"Ankit Goyal, Hei Law, Bowei Liu, Alejandro Newell, and Jia Deng. 2021. Revisiting point cloud shape classification with a simple and effective baseline. In Proceedings of the 2021 International Conference on Machine Learning (ICML'21), Vol. 139. 3809--3820."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909068"},{"key":"e_1_3_2_1_11_1","volume-title":"2023 a. A Comprehensive Evaluation Framework for Deep Model Robustness. Pattern Recognition","author":"Guo Jun","year":"2023","unstructured":"Jun Guo, Wei Bao, Jiakai Wang, Yuqing Ma, Xinghai Gao, Gang Xiao, Aishan Liu, Jian Dong, Xianglong Liu, and Wenjun Wu. 2023 a. A Comprehensive Evaluation Framework for Deep Model Robustness. Pattern Recognition (2023)."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 2022 International Conference on Learning Representations (ICLR'22)","author":"Guo Junfeng","year":"2022","unstructured":"Junfeng Guo, Ang Li, and Cong Liu. 2022. AEVA: Black-box backdoor detection using adversarial extreme value analysis. In Proceedings of the 2022 International Conference on Learning Representations (ICLR'22)."},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the 2023 International Conference on Learning Representations (ICLR'23)","author":"Guo Junfeng","year":"2023","unstructured":"Junfeng Guo, Yiming Li, Xun Chen, Hanqing Guo, Lichao Sun, and Cong Liu. 2023 b. SCALE-UP: An efficient black-box input-level backdoor detection via analyzing scaled prediction consistency. In Proceedings of the 2023 International Conference on Learning Representations (ICLR'23), ."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41095-021-0229-5"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58610-2_15"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i1.25166"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3548272"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01490"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01486"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01618"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the 32nd International Conference on Neural Information Processing Systems (NeurIPS'18)","author":"Li Yangyan","year":"2018","unstructured":"Yangyan Li, Rui Bu, Mingchao Sun, Wei Wu, Xinhan Di, and Baoquan Chen. 2018. PointCNN: Convolution on ?-transformed points. In Proceedings of the 32nd International Conference on Neural Information Processing Systems (NeurIPS'18). Curran Associates Inc., 828--838."},{"key":"e_1_3_2_1_23_1","volume-title":"Rethinking the trigger of backdoor attack. arXiv preprint arXiv:2004.04692","author":"Li Yiming","year":"2020","unstructured":"Yiming Li, Tongqing Zhai, Baoyuan Wu, Yong Jiang, Zhifeng Li, and Shutao Xia. 2020. Rethinking the trigger of backdoor attack. arXiv preprint arXiv:2004.04692 (2020)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2021.104370"},{"key":"e_1_3_2_1_25_1","volume-title":"Imperceptible transfer attack and defense on 3D point cloud classification","author":"Liu Daizong","year":"2023","unstructured":"Daizong Liu and Wei Hu. 2023. Imperceptible transfer attack and defense on 3D point cloud classification. IEEE transactions on pattern analysis and machine intelligence, Vol. 45, 4 (2023), 4727--4746."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2019.8803770"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00612"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_13"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01570"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413875"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298925"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2020.1003324"},{"volume-title":"Proceedings of the 2017 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR'17)","author":"Qi C.","key":"e_1_3_2_1_33_1","unstructured":"C. Qi, Hao Su, Kaichun Mo, and Leonidas J. Guibas. 2017a. PointNet: Deep learning on point sets for 3D classification and segmentation. In Proceedings of the 2017 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR'17). 77--85."},{"volume-title":"Proceedings of the 31st International Conference on Neural Information Processing Systems (NeurIPS'17)","author":"Qi C.","key":"e_1_3_2_1_34_1","unstructured":"C. Qi, L. Yi, Hao Su, and Leonidas J. Guibas. 2017b. PointNet: Deep hierarchical feature learning on point sets in a metric space. In Proceedings of the 31st International Conference on Neural Information Processing Systems (NeurIPS'17). 5105--5114."},{"key":"e_1_3_2_1_35_1","volume-title":"Benchmarking and analyzing point cloud classification under corruptions. arXiv preprint arXiv:2202.03377","author":"Ren Jiawei","year":"2022","unstructured":"Jiawei Ren, Liang Pan, and Ziwei Liu. 2022. Benchmarking and analyzing point cloud classification under corruptions. arXiv preprint arXiv:2202.03377 (2022)."},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the 34st International Conference on Neural Information Processing Systems (NeurIPS'21)","author":"Sun Jiachen","year":"2021","unstructured":"Jiachen Sun, Yulong Cao, Christopher Bongsoo Choy, Zhiding Yu, Anima Anandkumar, Zhuoqing Morley Mao, and Chaowei Xiao. 2021. Adversarially robust 3D point cloud recognition using self-supervisions. In Proceedings of the 34st International Conference on Neural Information Processing Systems (NeurIPS'21). 15498--15512."},{"key":"e_1_3_2_1_37_1","volume-title":"Zhuoqing Morley Mao, and Chaowei Xiao","author":"Sun Jiachen","year":"2022","unstructured":"Jiachen Sun, Weili Nie, Zhiding Yu, Zhuoqing Morley Mao, and Chaowei Xiao. 2022a. PointDP: Diffusion-driven purification against adversarial attacks on 3D point cloud recognition. arXiv preprint arXiv:2208.09801 (2022)."},{"key":"e_1_3_2_1_38_1","volume-title":"Benchmarking robustness of 3D point cloud recognition against common corruptions. arXiv preprint arXiv:2201.12296","author":"Sun Jiachen","year":"2022","unstructured":"Jiachen Sun, Qingzhao Zhang, Bhavya Kailkhura, Zhiding Yu, Chaowei Xiao, and Zhuoqing Morley Mao. 2022b. Benchmarking robustness of 3D point cloud recognition against common corruptions. arXiv preprint arXiv:2201.12296 (2022)."},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the 30th USENIX Security Symposium (USENIX Security'21)","author":"Tang Di","year":"2021","unstructured":"Di Tang, XiaoFeng Wang, Haixu Tang, and Kehuan Zhang. 2021. Demon in the variant: Statistical analysis of DNNs for robust backdoor contamination detection. In Proceedings of the 30th USENIX Security Symposium (USENIX Security'21). USENIX Association, 1541--1558."},{"key":"e_1_3_2_1_40_1","volume-title":"Poisoning MorphNet for clean-label backdoor attack to point clouds. arXiv preprint arXiv:2105.04839","author":"Tian Guiyu","year":"2021","unstructured":"Guiyu Tian, Wenhao Jiang, Wei Liu, and Yadong Mu. 2021. Poisoning MorphNet for clean-label backdoor attack to point clouds. arXiv preprint arXiv:2105.04839 (2021)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2022.3159784"},{"volume-title":"Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP'19)","author":"Wang Bolun","key":"e_1_3_2_1_42_1","unstructured":"Bolun Wang, Yuanshun Yao, Shawn Shan, Huiying Li, Bimal Viswanath, Haitao Zheng, and Ben Y. Zhao. 2019b. Neural cleanse: Identifying and mitigating backdoor attacks in neural networks. In Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP'19). 707--723."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01397"},{"volume-title":"Acm Transactions On Graphics (TOG'19)","author":"Wang Yue","key":"e_1_3_2_1_44_1","unstructured":"Yue Wang, Yongbin Sun, Ziwei Liu, Sanjay E Sarma, Michael M Bronstein, and Justin M Solomon. 2019a. Dynamic graph cnn for learning on point clouds. In Acm Transactions On Graphics (TOG'19), Vol. 38. 1--12."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.3044712"},{"key":"e_1_3_2_1_46_1","volume-title":"Guibas","author":"Wu Ziyi","year":"2020","unstructured":"Ziyi Wu, Yueqi Duan, He Wang, Qingnan Fan, and Leonidas J. Guibas. 2020. IF-Defense: 3D adversarial point cloud defense via implicit function based restoration. arXiv preprint arXiv:2010.05272 (2020)."},{"key":"e_1_3_2_1_47_1","volume-title":"Proceedings of the 2015 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR'15)","author":"Wu Zhirong","year":"2015","unstructured":"Zhirong Wu, Shuran Song, Aditya Khosla, Fisher Yu, Linguang Zhang, Xiaoou Tang, and Jianxiong Xiao. 2015. 3d shapenets: A deep representation for volumetric shapes. In Proceedings of the 2015 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR'15). 1912--1920."},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR'19)","author":"Xiang Chong","year":"2018","unstructured":"Chong Xiang, C. Qi, and Bo Li. 2018. Generating 3D adversarial point clouds. In Proceedings of the 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR'19). 9128--9136."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00750"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9747194"},{"key":"e_1_3_2_1_51_1","volume-title":"Adversarial attack and defense on point sets. arXiv preprint arXiv:1902.10899","author":"Yang Jiancheng","year":"2019","unstructured":"Jiancheng Yang, Qiang Zhang, Rongyao Fang, Bingbing Ni, Jinxian Liu, and Qi Tian. 2019. Adversarial attack and defense on point sets. arXiv preprint arXiv:1902.10899 (2019)."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00128"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00168"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00205"}],"event":{"name":"MM '23: The 31st ACM International Conference on Multimedia","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Ottawa ON Canada","acronym":"MM '23"},"container-title":["Proceedings of the 31st ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3581783.3612456","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3581783.3612456","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:09:19Z","timestamp":1755821359000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3581783.3612456"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,26]]},"references-count":54,"alternative-id":["10.1145\/3581783.3612456","10.1145\/3581783"],"URL":"https:\/\/doi.org\/10.1145\/3581783.3612456","relation":{},"subject":[],"published":{"date-parts":[[2023,10,26]]},"assertion":[{"value":"2023-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}