With the development of deep 3D tracking models and their broad prospects for safety-critical applications, adversarial robustness, i.e., the ability of deep models to resist malicious adversarial attacks, has become ...
详细信息
With the development of deep 3D tracking models and their broad prospects for safety-critical applications, adversarial robustness, i.e., the ability of deep models to resist malicious adversarial attacks, has become an important research topic. Previous works generate adversarial examples by tampering with points of the input point cloud indiscriminately. Consequently, they suffer from high computing costs and limited attack performance caused by the trade-off between imperceptibility and adversarial strength. In this paper, we propose a novel adversarial attack against 3D object tracking, which is guided by an occlusion-based explainability method to target points crucial for the predictions in the search area and results in a significant deviation between the predictions and the ground truth. Specifically, an attribution map is generated to reveal the importance of points to the model decision, which is achieved by measuring the variations of tracking performance under subsets generated by the downsampling strategy. To facilitate the generation of attribution maps, the downsampling strategy considers prior knowledge of 3D trackers, which assigns higher sampling probabilities to points with potentially higher contributions enclosed by bounding boxes. Multi-scale fusion is also leveraged to integrate the sensitivity of the model to local regions of varying sizes. Considering the requirement of imperceptibility on adversarial attacks, a hard geometric constraint is imposed on the targeted critical points, which produces perturbations with the property of surface invariance. Furthermore, in contrast to existing works devoted to spatial information manipulation only, multiple loss functions are developed to guide the perturbation generation, where the predicted motions of the tracking target representing the spatial-temporal information unique to the tracking task are distorted to deceive 3D trackers. Extensive experiments conducted on public benchmarks and 3D tracker
The Industrial Internet of Things (IIoT) involves the real-time gathering of information from physical devices and technologies for improved perception and management. To ensure information transmission security, an e...
The Industrial Internet of Things (IIoT) involves the real-time gathering of information from physical devices and technologies for improved perception and management. To ensure information transmission security, an efficient and secure cryptography scheme is needed, especially for devices under resource constraints. In this paper, a heterogeneous signcryption (HSC) scheme is designed to meet security requirements in the IIoT environment. This construction employs a heterogeneous system, with the sender using certificateless cryptography (CLC) to effectively solve the key escrow problem in identity-based cryptography (IBC) and the certificate management problem in public key infrastructure (PKI). The receiver, on the other hand, uses IBC to settle the certificate management issue in PKI. The scheme supports formal security proof in the random oracle model (ROM). Furthermore, the detailed performance analysis demonstrates that the scheme has advantages in terms of energy consumption and computation overhead, making it suitable for the IIoT environment.
Deep learning(DL) systems exhibit multiple behavioral characteristics such as correctness, robustness, and fairness. Ensuring that these behavioral characteristics function properly is crucial for maintaining the accu...
详细信息
The effective utilization of multimodal data is currently a prominent research focus in remote sensing. Hyperspectral image (HSI) and light detection and ranging (LiDAR) image can provide unique and complementary info...
详细信息
Spiking neural networks (SNNs) exhibit superior energy efficiency but suffer from limited performance. In this paper, we consider SNNs as ensembles of temporal subnetworks that share architectures and weights, and hig...
详细信息
GPT is widely recognized as one of the most versatile and powerful large language models, excelling across diverse domains. However, its significant computational demands often render it economically unfeasible for in...
详细信息
Depth model-based behavior estimation of human skeletal points is widely used in the field of behavior recognition. In order to improve the accuracy of behavior recognition, the complexity and computation of the desig...
详细信息
Although artificial intelligence and virtual reality technology have been rapidly popularized, current human-computer interaction systems still have challenges such as network latency, data synchronization, and natura...
详细信息
Quad meshes are essential in geometric modeling and computational mechanics. Although learning-based methods for triangle mesh demonstrate considerable advancements, quad mesh generation remains less explored due to t...
详细信息
In this paper, design and modeling of an all-optical 2×1 multiplexer based on 2D photonic crystals and artificial neural networks (ANNs) are presented. The proposed structure aims to maximize the difference betwe...
详细信息
暂无评论