An adversarial point cloud generation method, storage medium and terminal

A point cloud generation and adversarial technology, applied in neural learning methods, biological neural network models, instruments, etc., can solve problems such as ignoring point cloud topology and achieve the effect of reducing recognition accuracy

Active Publication Date: 2022-06-24
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, existing adversarial attack methods ignore the topology of point clouds

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An adversarial point cloud generation method, storage medium and terminal
  • An adversarial point cloud generation method, storage medium and terminal
  • An adversarial point cloud generation method, storage medium and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings. Obviously, the described embodiments are a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0036] The terminology used in this application is for the purpose of describing particular embodiments only and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a," "the," and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It will also be understood that the term "and / or" as used herein refers to and includes any and all possible combinations of one or more of the associated liste...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for generating an adversarial point cloud, a storage medium and a terminal. The method includes the following steps: destroying the topological structure of an input point cloud to generate an adversarial point cloud. The present invention adopts the method of changing and destroying the topological structure of the input point cloud, and then forms holes on the surface of the point cloud to generate the confrontation point cloud; selectively destroys the topological structure of the point cloud and discards the key topology of the point cloud, which will Greatly reduce the recognition accuracy of the model, and mislead the model to output wrong results; this method is superior to existing adversarial attacks in reducing the recognition accuracy of the model.

Description

technical field [0001] The invention relates to the field of adversarial point cloud generation, in particular to an adversarial point cloud generation method, a storage medium and a terminal. Background technique [0002] Point cloud is an important form of 3D data representation, which can be obtained directly from 3D acquisition devices. In recent years, deep neural networks (DNNs) have been successfully applied to point cloud data processing, the most popular of which are PointNet and its variant PointNet++. They extract features from raw point clouds in an end-to-end manner and have been applied in classification, segmentation, detection, and tracking scenes, achieving good performance. Recent studies have found that DNNs are vulnerable to adversarial attacks that can mislead deep networks by making imperceptible modifications to the original data. Existing spoofing attack algorithms mainly focus on the 2D attack domain. Recent studies have found that 3D point cloud ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06T17/20G06N3/04G06N3/08
CPCG06T17/20G06N3/08G06N3/047
Inventor 张静玉江春华蔡木目心张梓豪周慧王旭鹏
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products