Recent research efforts on 3D point cloud semantic segmentation (PCSS) have achieved outstanding performance by adopting deep CNN (convolutional neural networks) and GCN (graph convolutional networks). However, the robustness of these complex models has not been systematically analyzed. Given that PCSS has been applied in many safety-critical applications (e.g., autonomous driving, geological sensing), it is important to fill this knowledge gap, in particular, how these models are affected under adversarial samples. While adversarial attacks against point clouds have been studied, we found many questions remain about the robustness of PCSS. For instance, all the prior attacks perturb the point coordinates of a point cloud, but the features associated with a point are also leveraged by some PCSS models, and whether they are good targets to attack is unknown yet. We present a comparative study of PCSS robustness in this work. In particular, we formally define the attacker's objective under targeted attack and non-targeted attack and develop new attacks considering a variety of options, including feature-based and coordinate-based, norm-bounded and norm-unbounded, etc. We conduct evaluations with different combinations of attack options on two datasets (S3DIS and Semantic3D) and three PCSS models (PointNet++, DeepGCNs, and RandLA-Net). We found all of the PCSS models are vulnerable under both targeted and non-targeted attacks, and attacks against point features like color are more effective. With this study, we call the attention of the research community to develop new approaches to harden PCSS models against adversarial attacks.
翻译:最近对3D点云文断层(PCSS)的研究工作取得了杰出的成绩,采用了深重CNN(革命神经网络)和GCN(革命网络),然而,这些复杂模型的强健性尚未得到系统分析。鉴于PCSS应用在许多安全关键应用(如自主驱动、地质遥感)中,因此,必须填补这一知识差距,特别是这些模型在对抗性样本下如何受到影响。虽然研究了对点云的对抗性攻击,但我们仍发现许多关于PCSS的强健性的问题。例如,所有以前的攻击都绕过点云的点坐标,但一些PCSS模型也利用了与点相关的特征,而它们是否是攻击的好目标。我们对此工作对PCSS的强健性进行了比较研究。我们正式界定了攻击者在目标攻击和非目标性攻击下的目标,并且考虑到各种选项,包括基于特征和协调的、规范性和规范性攻击的点,例如,我们用两种目标网络网络的网络攻击,我们用两种目标进行了不同的数据组合,而S-DVS(我们用两种目标攻击的网络和深层次的网络模型,三种不同的数据组合),我们用的是S-CD-BIS 和PL3 找到了三种攻击的系统攻击模式,我们用三种不同的数据模型和C-BER的三种不同的数据模型进行了不同的选择。