数据与计算发展前沿 ›› 2026, Vol. 8 ›› Issue (2): 123-140.

CSTR: 32002.14.jfdc.CN10-1649/TP.2026.02.010

doi: 10.11871/jfdc.issn.2096-742X.2026.02.010

• 技术与应用 • 上一篇    下一篇

探索基于3D变换的后处理对3D对抗性点云迁移性的影响

何邦彦1,2(),李琦3,孙哲南3,王蕊1,2,*()   

  1. 1 中国科学院信息工程研究所北京 100085
    2 中国科学院大学网络空间安全学院北京 100190
    3 中国科学院自动化研究所模式识别实验室北京 100190
  • 收稿日期:2025-03-31 出版日期:2026-04-20 发布日期:2026-04-23
  • 通讯作者: *王蕊(E-mail: wangrui@iie.ac.cn
  • 作者简介:何邦彦,中国科学院信息工程研究所,博士研究生,研究方向为计算机视觉、对抗安全。
    本文承担工作为:方法的提出和实现、文献整理及论文撰写。
    HE Bangyan is a Ph.D. candidate at the Institute of Information Engineering, Chinese Academy of Sciences. He is a CCF student member. His research interests include computer vision and adversarial security.
    In this paper, he is mainly responsible for method proposal and implementation, literature compilation and paper writing.
    E-mail: hebangyan@iie.ac.cn|王蕊,中国科学院信息工程研究所,研究员,博士生导师,主要研究方向为人工智能安全、计算机视觉、深度学习、多媒体内容分析等。
    本文承担工作为:方法讨论、优化建议,及写作指导。
    WANG Rui is a researcher and doctoral supervisor at the Institute of Information Engineering, Chinese Academy of Sciences. Her main research interests include artificial intelligence security, computer vision, deep learning, multimedia content analysis, etc.
    In this paper, she is mainly responsible for method discussion, optimization suggestions, and writing guidance.
    E-mail: wangrui@iie.ac.cn
  • 基金资助:
    国家自然科学基金面上项目“细粒度图像语义理解关键技术研究”(62176253)

Exploring the Impact of 3D Transformation-Based Post-Processing on the Transferability of 3D Adversarial Point Clouds

HE Bangyan1,2(),LI Qi3,SUN Zhenan3,WANG Rui1,2,*()   

  1. 1 Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100085, China
    2 School of Cyberspace Security, University of Chinese Academy of Sciences, Beijing 100190, China
    3 NLPR & MAIS, Institute of Automation, Chinese Academy of Sciences, Beijing 100190, China
  • Received:2025-03-31 Online:2026-04-20 Published:2026-04-23

摘要:

【目的】 探究将3D变换作为后处理策略对3D对抗性点云迁移性的影响。【文献范围】通过查阅大量相关文献,研究涵盖了3D点云识别、3D对抗性点云以及3D变换等领域的成果。【应用背景】基于深度神经网络的3D点云识别模型,已在多种安全关键场景中广泛应用。然而,这类模型在面对对抗性攻击时的鲁棒性问题不容小觑。在此背景下,深入研究3D对抗性点云的迁移性,能够为构建更稳健、可靠的点云模型提供有力支持。这对于提升模型在实际应用中的安全性和可靠性,具有重要意义。【方法】 选用ModelNet40、ModelNet-C和ShapeNetPart三个基准数据集,选取旋转、缩放等七种3D变换操作,PointNet等五种点云模型架构,以及PointCAT、TRADES和MART三种对抗训练方法进行实验。并基于有效性分析,提出了组合优化策略。【结果】 实验结果表明,旋转操作在增强3D对抗性点云迁移性方面效果显著。尽管对抗训练降低了白盒攻击的成功率,但经过特定3D变换(如旋转)的3D对抗性点云仍能实现有效攻击。此外,不同的3D变换对不同模型的影响差异明显。本文提出的组合优化策略可进一步提升3D对抗性点云的迁移性。【局限】本文仅针对特定的数据集、变换操作、模型架构以及对抗训练方法进行,可能存在一定的局限性。【结论】 旋转操作对提升3D对抗性点云的迁移性最为明显;同时,现有对抗训练方法在面对3D变换后处理时存在局限性;此外,本文提出的组合优化策略可进一步提升3D对抗性点云的迁移性。

关键词: 3D点云识别, 对抗迁移性, 可信人工智能

Abstract:

[Purpose] To investigate the impact of 3D transformation as a post-processing strategy on the transferability of 3D adversarial point clouds. [Literature Review] By reviewing a large number of relevant literature, the research covers the achievements in the fields of 3D point cloud recognition, 3D adversarial point clouds, and 3D transformations. [Application Background] 3D point cloud recognition models based on deep neural networks have been widely applied in various safety-critical scenarios. However, the robustness issue of such models when facing adversarial attacks should not be underestimated. Against this backdrop, in-depth research on the transferability of 3D adversarial point clouds can provide strong support for the construction of more robust and reliable point cloud models. This is of great significance for enhancing the security and reliability of the models in practical applications. [Methods] Three benchmark datasets, namely ModelNet40, ModelNet-C, and ShapeNetPart, were selected. Seven 3D transformation operations such as rotation and scaling, five point cloud model architectures like PointNet, and three adversarial training methods including PointCAT, TRADES, and MART were employed for the experiments. Based on validity analysis, a combined optimization strategy was proposed. [Results] The experimental results demonstrate that the rotation operation has a significant effect on enhancing the transferability of 3D adversarial point clouds. Although adversarial training reduces the success rate of white-box attacks, 3D adversarial point clouds that have undergone specific 3D transformations (such as rotation) can still achieve effective attacks. Additionally, the impacts of different 3D transformations on various models vary significantly. The combined optimization strategy proposed in this paper can further improve the transferability of 3D adversarial point clouds. [Limitations] This paper only focuses on specific datasets, transformation operations, model architectures, and adversarial training methods, which may have certain limitations. [Conclusions] Rotation operations exert the most significant effect on improving the transferability of 3D adversarial point clouds. Meanwhile, existing adversarial training methods demonstrate limitations when coping with post-processing of 3D transformations. Furthermore, the combinatorial optimization strategy proposed in this paper can further enhance the transferability of 3D adversarial point clouds.

Key words: 3D point cloud recognition, adversarial transferability, trustworthy AI