22 research outputs found
3DHacker: Spectrum-based Decision Boundary Generation for Hard-label 3D Point Cloud Attack
With the maturity of depth sensors, the vulnerability of 3D point cloud
models has received increasing attention in various applications such as
autonomous driving and robot navigation. Previous 3D adversarial attackers
either follow the white-box setting to iteratively update the coordinate
perturbations based on gradients, or utilize the output model logits to
estimate noisy gradients in the black-box setting. However, these attack
methods are hard to be deployed in real-world scenarios since realistic 3D
applications will not share any model details to users. Therefore, we explore a
more challenging yet practical 3D attack setting, \textit{i.e.}, attacking
point clouds with black-box hard labels, in which the attacker can only have
access to the prediction label of the input. To tackle this setting, we propose
a novel 3D attack method, termed \textbf{3D} \textbf{H}ard-label
att\textbf{acker} (\textbf{3DHacker}), based on the developed decision boundary
algorithm to generate adversarial samples solely with the knowledge of class
labels. Specifically, to construct the class-aware model decision boundary,
3DHacker first randomly fuses two point clouds of different classes in the
spectral domain to craft their intermediate sample with high imperceptibility,
then projects it onto the decision boundary via binary search. To restrict the
final perturbation size, 3DHacker further introduces an iterative optimization
strategy to move the intermediate sample along the decision boundary for
generating adversarial point clouds with smallest trivial perturbations.
Extensive evaluations show that, even in the challenging hard-label setting,
3DHacker still competitively outperforms existing 3D attacks regarding the
attack performance as well as adversary quality.Comment: Accepted by ICCV 202
Recommended from our members
Effects of plastic debris on the biofilm bacterial communities in lake water
Increasing discharge of plastic debris into aquatic ecosystems and the worsening ecological risks have received growing attention. Once released, plastic debris could serve as a new substrate for microbes in waters. The complex relationship between plastics and biofilms has aroused great interest. To confirm the hypothesis that the presence of plastic in water affects the composition of biofilm in natural state, in situ biofilm culture experiments were conducted in a lake for 40 days. The diversity of biofilm attached on natural (cobble stones (CS) and wood) and plastic substrates (Polyethylene terephthalate (PET) and Polymethyl methacrylate (PMMA)) were compared, and the community structure and composition were also analyzed. Results from high-throughput sequencing of 16S rRNA showed that the diversity and species richness of biofilm bacterial communities on natural substrate (observed species of 1353~1945, Simpson index of 0.977~0.989 and Shannon–Wiener diversity index of 7.42~8.60) were much higher than those on plastic substrates (observed species of 900~1146, Simpson index of 0.914~0.975 and Shannon–Wiener diversity index of 5.47~6.99). The NMDS analyses were used to confirm the taxonomic significance between different samples, and Anosim (p = 0.001, R = 0.892) and Adonis (p = 0.001, R = 808, F = 11.19) demonstrated that this classification was statistically rigorous. Different dominant bacterial communities were found on plastic and natural substrates. Alphaproteobacterial, Betaproteobacteria and Synechococcophycideae dominated on the plastic substrate, while Gammaproteobacteria, Phycisphaerae and Planctomycetia played the main role on the natural substrates. The bacterial community structure of the two substrates also showed significant difference which is consistent with previous studies using other polymer types. Our results shed light on the fact that plastic debris can serve as a new habitat for biofilm colonization, unlike natural substrates, pathogens and plastic-degrading microorganisms selectively attached to plastic substrates, which affected the bacterial community structure and composition in aquatic environment. This study provided a new insight into understanding the potential impacts of plastics serving as a new habitat for microbial communities in freshwater environments. Future research should focus on the potential impacts of plastic-attached biofilms in various aquatic environments and the whole life cycle of plastics (i.e., from plastic fragments to microplastics) and also microbial flock characteristics using microbial plastics in the natural environment should also be addressed
Practical whole-system provenance capture
Data provenance describes how data came to be in its present form. It includes data sources and the transformations that have been applied to them. Data provenance has many uses, from forensics and security to aiding the reproducibility of scientific experiments. We present CamFlow, a whole-system provenance capture mechanism that integrates easily into a PaaS offering. While there have been several prior whole-system provenance systems that captured a comprehensive, systemic and ubiquitous record of a system’s behavior, none have been widely adopted. They either A) impose too much overhead, B) are designed for long-outdated kernel releases and are hard to port to current systems, C) generate too much data, or D) are designed for a single system. CamFlow addresses these shortcoming by: 1) leveraging the latest kernel design advances to achieve efficiency; 2) using a self-contained, easily maintainable implementation relying on a Linux Security Module, NetFilter, and other existing kernel facilities; 3) providing a mechanism to tailor the captured provenance data to the needs of the application; and 4) making it easy to integrate provenance across distributed systems. The provenance we capture is streamed and consumed by tenant-built auditor applications. We illustrate the usability of our implementation by describing three such applications: demonstrating compliance with data regulations; performing fault/intrusion detection; and implementing data loss prevention. We also show how CamFlow can be leveraged to capture meaningful provenance without modifying existing applications.Engineering and Applied Science
Evaluation of a Hybrid Approach for Efficient Provenance Storage
Provenance is the metadata that describes the history of objects. Provenance provides new functionality in a variety of areas, including experimental documentation, debugging, search, and security. As a result, a number of groups have built systems to capture provenance. Most of these systems focus on provenance collection, a few systems focus on building applications that use the provenance, but all of these systems ignore an important aspect: efficient long-term storage of provenance. In this article, we first analyze the provenance collected from multiple workloads and characterize the properties of provenance with respect to long-term storage. We then propose a hybrid scheme that takes advantage of the graph structure of provenance data and the inherent duplication in provenance data. Our evaluation indicates that our hybrid scheme, a combination of Web graph compression (adapted for provenance) and dictionary encoding, provides the best trade-off in terms of compression ratio, compression time, and query performance when compared to other compression schemes
Plausible 3D Human Hand Modeling for Virtual Ergonomic Assessments of Handheld Product : Construction, Contact simulation and Variational Modeling
Immunoinformatic Identification of Multiple Epitopes of gp120 Protein of HIV-1 to Enhance the Immune Response against HIV-1 Infection
Acquired Immunodeficiency Syndrome is caused by the Human Immunodeficiency Virus (HIV), and a significant number of fatalities occur annually. There is a dire need to develop an effective vaccine against HIV-1. Understanding the structural proteins of viruses helps in designing a vaccine based on immunogenic peptides. In the current experiment, we identified gp120 epitopes using bioinformatic epitope prediction tools, molecular docking, and MD simulations. The Gb-1 peptide was considered an adjuvant. Consecutive sequences of GTG, GSG, GGTGG, and GGGGS linkers were used to bind the B cell, Cytotoxic T Lymphocytes (CTL), and Helper T Lymphocytes (HTL) epitopes. The final vaccine construct consisted of 315 amino acids and is expected to be a recombinant protein of approximately 35.49 kDa. Based on docking experiments, molecular dynamics simulations, and tertiary structure validation, the analysis of the modeled protein indicates that it possesses a stable structure and can interact with Toll-like receptors. The analysis demonstrates that the proposed vaccine can provoke an immunological response by activating T and B cells, as well as stimulating the release of IgA and IgG antibodies. This vaccine shows potential for HIV-1 prophylaxis. The in-silico design suggests that multiple-epitope constructs can be used as potentially effective immunogens for HIV-1 vaccine development
Oasis: An active storage framework for object storage platform
The network bottleneck incurred by big data process and transfer has increasingly become a severe problem in today's data center and cloud. Exploring and exploiting the advantages of both the scalable object storage architecture and intelligent active storage technology are one of the ways to address this challenge. In this paper, we present the design and performance evaluation of Oasis, an active storage framework for object-based storage platform such as Seagate Kinetic. The basic idea behind Oasis is to leverage the OSD's processing capability to run data intensive applications locally. In contrast with previous work, Oasis has the following advantages. First, Oasis enables users to transparently process the OSD object and supports different processing granularity. Second, Oasis can ensure the integrity of execution code using signature scheme and provide the access control for the code execution in the OSD by enhancing the existing OSD security protocol. Third, Oasis can partition the computation task between host and OSD dynamically according to the OSD workload status. Our work on Oasis can be integrated into Kinetic object storage platform seamlessly. Experimental results on widely-used real world applications demonstrate the performance and efficiency of our system