Login / Signup
MirrorAttack: Backdoor Attack on 3D Point Cloud with a Distorting Mirror.
Yuhao Bian
Shengjing Tian
Xiuping Liu
Published in:
CoRR (2024)
Keyphrases
</>
countermeasures
field of view
denial of service attacks
attack graphs
dos attacks
database
knowledge base
lightweight
authentication protocol
attack graph
key exchange protocol