iBA: Backdoor Attack on 3D Point Cloud via Reconstructing Itself

被引:0
作者
Bian, Yuhao [1 ]
Tian, Shengjing [2 ]
Liu, Xiuping [1 ]
机构
[1] Dalian Univ Technol, Sch Math Sci, Dalian 116024, Liaoning, Peoples R China
[2] China Univ Min & Technol, Sch Econ & Management, Xuzhou 221116, Jiangsu, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Point cloud compression; Three-dimensional displays; Image reconstruction; Solid modeling; Smoothing methods; Manuals; Training; Backdoor attack; 3D point cloud; shape classification;
D O I
10.1109/TIFS.2024.3452630
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The widespread deployment of deep neural networks (DNNs) for 3D point cloud processing contrasts sharply with their vulnerability to security breaches, particularly backdoor attacks. Studying these attacks is crucial for raising security awareness and mitigating potential risks. However, the irregularity of 3D data and the heterogeneity of 3D DNNs pose unique challenges. Existing methods frequently fail against basic point cloud preprocessing or require intricate manual design. Exploring simple, imperceptible, effective, and difficult-to-defend triggers in 3D point clouds remains challenging. To address this issue, we propose iBA, a novel solution utilizing a folding-based auto-encoder (AE). By leveraging united reconstruction losses, iBA enhances both effectiveness and imperceptibility. Its data-driven nature eliminates the need for complex manual design, while the AE core imparts significant nonlinearity and sample specificity to the trigger, rendering traditional preprocessing techniques ineffective. Additionally, a trigger smoothing module based on spherical harmonic transformation (SHT) allows for controllable intensity. We also discuss potential countermeasures and the possibility of physical deployment for iBA as an extensive reference. Both quantitative and qualitative results demonstrate the effectiveness of our method, achieving state-of-the-art attack success rates (ASR) across a variety of victim models, even with defensive measures in place. iBA's imperceptibility is validated with multiple metrics as well.
引用
收藏
页码:7994 / 8008
页数:15
相关论文
共 63 条
  • [1] Agarap AF, 2018, arXiv, DOI [10.48550/arXiv.1803.08375, DOI 10.48550/ARXIV.1803.08375]
  • [2] Amer M., 2013, P ACM SIGKDD WORKSH, P8, DOI DOI 10.1145/2500853.2500857
  • [3] Balta H., 2018, IFAC-PapersOnLine, V51, P348, DOI DOI 10.1016/J.IFACOL.2018.11.566
  • [4] Barrow H.G., 1977, P 5 INT JOINT C ART, P659
  • [5] The ball-pivoting algorithm for surface reconstruction
    Bernardini, F
    Mittleman, J
    Rushmeier, H
    Silva, C
    Taubin, G
    [J]. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, 1999, 5 (04) : 349 - 359
  • [6] Chen XY, 2017, Arxiv, DOI arXiv:1712.05526
  • [7] MBA: Backdoor Attacks Against 3D Mesh Classifier
    Fan, Linkun
    He, Fazhi
    Si, Tongzhen
    Fan, Rubin
    Ye, Chuanlong
    Li, Bing
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 2127 - 2142
  • [8] Fan LK, 2022, Arxiv, DOI arXiv:2211.16192
  • [9] Feng L., 2024, Comput. J., V67, P1879
  • [10] A decision-theoretic generalization of on-line learning and an application to boosting
    Freund, Y
    Schapire, RE
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1997, 55 (01) : 119 - 139