{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T16:55:04Z","timestamp":1775580904183,"version":"3.50.1"},"reference-count":50,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","license":[{"start":{"date-parts":[[2025,3,5]],"date-time":"2025-03-05T00:00:00Z","timestamp":1741132800000},"content-version":"vor","delay-in-days":63,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["ietresearch.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["IET Computer Vision"],"published-print":{"date-parts":[[2025,1]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>\n                    Recent studies have shown that deep neural networks are vulnerable to adversarial attacks. In the field of 3D point cloud classification, transfer\u2010based black\u2010box attack strategies have been explored to address the challenge of limited knowledge about the model in practical scenarios. However, existing approaches typically rely excessively on network structure, resulting in poor transferability of the generated adversarial examples. To address the above problem, the authors propose\n                    <jats:italic>AEattack<\/jats:italic>\n                    , an adversarial attack method capable of generating highly transferable adversarial examples. Specifically, AEattack employs an autoencoder (AE) to extract features from the point cloud data and reconstruct the adversarial point cloud based on these features. Notably, the AE does not require pre\u2010training, and its parameters are jointly optimised using a loss function during the process of generating adversarial point clouds. The method makes the generated adversarial point cloud not overly dependent on the network structure, but more concerned with the data distribution. Moreover, this design endows AEattack with a broader potential for application. Extensive experiments on the ModelNet40 dataset show that AEattack is capable of generating highly transferable adversarial point clouds, with up to 61.8% improvement in transferability compared to state\u2010of\u2010the\u2010art adversarial attacks.\n                  <\/jats:p>","DOI":"10.1049\/cvi2.70008","type":"journal-article","created":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T11:51:23Z","timestamp":1741693883000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Generating Transferable Adversarial Point Clouds via Autoencoders for 3D Object Classification"],"prefix":"10.1049","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-8013-206X","authenticated-orcid":false,"given":"Mengyao","family":"Xu","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology Anhui University  Hefei China"}]},{"given":"Hai","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology Anhui University  Hefei China"}]},{"given":"Chonghao","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology Anhui University  Hefei China"}]},{"given":"Yuanjun","family":"Zou","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology Anhui University  Hefei China"}]},{"given":"Chenchu","family":"Xu","sequence":"additional","affiliation":[{"name":"Artificial Intelligence Institute Anhui University  Hefei China"},{"name":"Information Materials and Intelligent Sensing Laboratory of Anhui Province Anhui University  Hefei China"}]},{"given":"Yanping","family":"Zhang","sequence":"additional","affiliation":[{"name":"Artificial Intelligence Institute Anhui University  Hefei China"},{"name":"Information Materials and Intelligent Sensing Laboratory of Anhui Province Anhui University  Hefei China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3811-6995","authenticated-orcid":false,"given":"Fulan","family":"Qian","sequence":"additional","affiliation":[{"name":"Artificial Intelligence Institute Anhui University  Hefei China"},{"name":"Information Materials and Intelligent Sensing Laboratory of Anhui Province Anhui University  Hefei China"}]}],"member":"265","published-online":{"date-parts":[[2025,3,5]]},"reference":[{"key":"e_1_2_11_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.691"},{"key":"e_1_2_11_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2017.8206060"},{"key":"e_1_2_11_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/QoMEX48832.2020.9123121"},{"key":"e_1_2_11_5_1","first-page":"3809","volume-title":"International Conference on Machine Learning","author":"Goyal A.","year":"2021"},{"key":"e_1_2_11_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00985"},{"key":"e_1_2_11_7_1","first-page":"23192","article-title":"Pointnext: Revisiting Pointnet++ With Improved Training and Scaling Strategies","volume":"35","author":"Qian G.","year":"2022","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_2_11_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00563"},{"key":"e_1_2_11_9_1","article-title":"Rethinking Network Design and Local Geometry in Point Cloud: A Simple Residual Mlp Framework","author":"Ma X.","year":"2022","journal-title":"arXiv preprint"},{"key":"e_1_2_11_10_1","article-title":"Intriguing Properties of Neural Networks","author":"Szegedy C.","year":"2013","journal-title":"arXiv preprint"},{"key":"e_1_2_11_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00443"},{"key":"e_1_2_11_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-66415-2_2"},{"key":"e_1_2_11_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00498"},{"key":"e_1_2_11_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00641"},{"key":"e_1_2_11_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3589000"},{"key":"e_1_2_11_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00935"},{"key":"e_1_2_11_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00168"},{"key":"e_1_2_11_18_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5443"},{"key":"e_1_2_11_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2020.3044712"},{"issue":"4","key":"e_1_2_11_20_1","first-page":"4727","article-title":"Imperceptible Transfer Attack and Defense on 3d Point Cloud Classification","volume":"45","author":"Liu D.","year":"2022","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"e_1_2_11_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58610-2_15"},{"key":"e_1_2_11_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3171659"},{"key":"e_1_2_11_23_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i1.25154"},{"key":"e_1_2_11_24_1","first-page":"1711","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"Shi W.","year":"2020"},{"key":"e_1_2_11_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/mgrs.2019.2937630"},{"key":"e_1_2_11_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00526"},{"key":"e_1_2_11_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01298"},{"key":"e_1_2_11_28_1","article-title":"Vehicle Detection From 3d Lidar Using Fully Convolutional Network","author":"Li B.","year":"2016","journal-title":"arXiv preprint"},{"key":"e_1_2_11_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.114"},{"key":"e_1_2_11_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2015.7353481"},{"key":"e_1_2_11_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.28"},{"key":"e_1_2_11_32_1","first-page":"652","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","author":"Qi C. R.","year":"2017"},{"key":"e_1_2_11_33_1","first-page":"5099","article-title":"PointNet++: Deep Hierarchical Feature Learning on Point Sets in a Metric Space","volume":"30","author":"Qi C. R.","year":"2017","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_2_11_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3326362"},{"key":"e_1_2_11_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00319"},{"key":"e_1_2_11_36_1","first-page":"5998","article-title":"Attention Is All You Need","volume":"30","author":"Vaswani A.","year":"2017","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_2_11_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00356"},{"key":"e_1_2_11_38_1","first-page":"68","article-title":"Stand\u2010Alone Self\u2010Attention in Vision Models","volume":"32","author":"Parmar N.","year":"2019","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_2_11_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01595"},{"key":"e_1_2_11_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41095\u2010021\u20100229\u20105"},{"key":"e_1_2_11_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"e_1_2_11_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"e_1_2_11_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"e_1_2_11_44_1","first-page":"15335","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"Huang Q.","year":"2022"},{"key":"e_1_2_11_45_1","first-page":"1912","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","author":"Wu Z.","year":"2015"},{"key":"e_1_2_11_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00167"},{"key":"e_1_2_11_47_1","article-title":"Adam: A Method for Stochastic Optimization","author":"Kingma D. P.","year":"2014","journal-title":"arXiv preprint"},{"key":"e_1_2_11_48_1","article-title":"Improving Transferability of 3d Adversarial Attacks With Scale and Shear Transformations","author":"Zhang J.","year":"2022","journal-title":"arXiv preprint"},{"key":"e_1_2_11_49_1","article-title":"Adversarial Attack and Defense on Point Sets","author":"Yang J.","year":"2019","journal-title":"arXiv preprint"},{"key":"e_1_2_11_50_1","first-page":"2790","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","author":"Yu L.","year":"2018"},{"key":"e_1_2_11_51_1","first-page":"1961","volume-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","author":"Zhou H.","year":"2019"}],"container-title":["IET Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/cvi2.70008","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T17:31:11Z","timestamp":1767029471000},"score":1,"resource":{"primary":{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/10.1049\/cvi2.70008"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":50,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["10.1049\/cvi2.70008"],"URL":"https:\/\/doi.org\/10.1049\/cvi2.70008","archive":["Portico"],"relation":{},"ISSN":["1751-9632","1751-9640"],"issn-type":[{"value":"1751-9632","type":"print"},{"value":"1751-9640","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1]]},"assertion":[{"value":"2024-07-24","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-02-08","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e70008"}}