Login / Signup

MirrorAttack: Backdoor Attack on 3D Point Cloud with a Distorting Mirror.

Yuhao BianShengjing TianXiuping Liu
Published in: CoRR (2024)
Keyphrases
  • countermeasures
  • field of view
  • denial of service attacks
  • attack graphs
  • dos attacks
  • database
  • knowledge base
  • lightweight
  • authentication protocol
  • attack graph
  • key exchange protocol