{"id":905,"date":"2021-10-25T04:30:00","date_gmt":"2021-10-24T19:30:00","guid":{"rendered":"https:\/\/devneko.jp\/wordpress\/?p=905"},"modified":"2021-10-25T04:30:00","modified_gmt":"2021-10-24T19:30:00","slug":"point-cloud-%e5%88%86%e9%a1%9e%e5%99%a8%e3%81%ab%e5%af%be%e3%81%99%e3%82%8b%e6%94%bb%e6%92%83%ef%bc%88%e3%83%90%e3%83%83%e3%82%af%e3%83%89%e3%82%a2%ef%bc%89%e6%a4%9c%e5%87%ba","status":"publish","type":"post","link":"https:\/\/devneko.jp\/wordpress\/?p=905","title":{"rendered":"Point Cloud \u5206\u985e\u5668\u306b\u5bfe\u3059\u308b\u653b\u6483\uff08\u30d0\u30c3\u30af\u30c9\u30a2\uff09\u691c\u51fa"},"content":{"rendered":"\n<ul class=\"wp-block-list\"><li><strong>Detecting Backdoor Attacks Against Point Cloud Classifiers\u00a0<\/strong>[34.1]<br>\u30dd\u30a4\u30f3\u30c8\u30af\u30e9\u30a6\u30c9(PC)\u5206\u985e\u5668\u306b\u5bfe\u3059\u308b\u6700\u521d\u306eBA\u304c\u63d0\u6848\u3055\u308c\u3001\u81ea\u5f8b\u904b\u8ee2\u3092\u542b\u3080\u591a\u304f\u306e\u91cd\u8981\u306a\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u306b\u5bfe\u3059\u308b\u65b0\u305f\u306a\u8105\u5a01\u304c\u751f\u307e\u308c\u305f\u3002 \u672c\u7a3f\u3067\u306f,PC\u5206\u985e\u5668\u304c\u30c8\u30ec\u30fc\u30cb\u30f3\u30b0\u30bb\u30c3\u30c8\u306b\u30a2\u30af\u30bb\u30b9\u3059\u308b\u3053\u3068\u306a\u304f,\u30d0\u30c3\u30af\u30c9\u30a2\u653b\u6483\u3067\u3042\u308b\u304b\u3069\u3046\u304b\u3092\u63a8\u5b9a\u3059\u308b\u30ea\u30d0\u30fc\u30b9\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0\u30c7\u30a3\u30d5\u30a7\u30f3\u30b9\u3092\u63d0\u6848\u3059\u308b\u3002 \u672c\u7814\u7a76\u306e\u6709\u52b9\u6027\u3092,PC\u7528\u30d9\u30f3\u30c1\u30de\u30fc\u30afModeNet40\u30c7\u30fc\u30bf\u30bb\u30c3\u30c8\u3067\u5b9f\u8a3c\u3057\u305f\u3002<br><a href=\"http:\/\/arxiv.org\/abs\/2110.10354v1\">\u8ad6\u6587<\/a>\u00a0\u00a0<a href=\"https:\/\/fugumt.com\/fugumt\/paper_check\/2110.10354v1\">\u53c2\u8003\u8a33\uff08\u30e1\u30bf\u30c7\u30fc\u30bf\uff09<\/a>\u00a0\u00a0<a href=\"https:\/\/fugumt.com\/fugumt\/paper\/translated\/2110.10354.pdf.html\">\u53c2\u8003\u8a33\uff08\u5168\u6587\uff09<\/a>\u00a0\u00a0(Wed, 20 Oct 2021 03:12:06 GMT)<ul><li>\u69d8\u3005\u306a\u5834\u6240\u3067\u6d3b\u7528\u304c\u9032\u307f\u3064\u3064\u3042\u308b\u30dd\u30a4\u30f3\u30c8\u30af\u30e9\u30a6\u30c9\u5206\u985e\u5668\u3078\u306e\u30d0\u30c3\u30af\u30c9\u30a2\u653b\u6483\u691c\u51fa\u3002\u8ad6\u6587\u306e\u6307\u6458\u901a\u308a\u3001\u753b\u50cf\u5206\u985e\u3067\u306f\u3088\u304f\u898b\u308b\u304c\u30dd\u30a4\u30f3\u30c8\u30af\u30e9\u30a6\u30c9\u5206\u985e\u306b\u5bfe\u3059\u308b\u7814\u7a76\u306f\u3042\u307e\u308a\u898b\u306a\u3044\u6c17\u304c\u3059\u308b\u3002\u305d\u3057\u3066\u753b\u50cf\u3067\u6709\u52b9\u306a\u9632\u5fa1\u65b9\u6cd5\u304cPoint Cloud\u306b\u5bfe\u3057\u3066\u6709\u52b9\u3068\u306f\u9650\u3089\u306a\u3044\u3068\u3044\u3046\u306e\u306f\u76f4\u611f\u7684\u306b\u3082\u305d\u306e\u901a\u308a\u3067\u91cd\u8981\u306a\u7814\u7a76\u3060\u3068\u601d\u3046\u3002<ul><li>RED \uff08 reverse-engineering defense\uff09\u306f\u3046\u307e\u304f\u6a5f\u68b0\u7ffb\u8a33\u3067\u304d\u3066\u3044\u306a\u3044\u30fb\u30fb\u30fb\u3002<\/li><\/ul><\/li><\/ul><\/li><\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Detecting Backdoor Attacks Against Point Cloud Classifiers\u00a0[34.1]\u30dd\u30a4\u30f3\u30c8\u30af\u30e9\u30a6\u30c9(PC)\u5206\u985e\u5668\u306b\u5bfe\u3059\u308b\u6700\u521d\u306eBA\u304c\u63d0\u6848\u3055\u308c\u3001\u81ea\u5f8b\u904b\u8ee2\u3092\u542b\u3080\u591a\u304f\u306e\u91cd\u8981\u306a\u30a2\u30d7 &hellip; <a href=\"https:\/\/devneko.jp\/wordpress\/?p=905\" class=\"more-link\"><span class=\"screen-reader-text\">&#8220;Point Cloud \u5206\u985e\u5668\u306b\u5bfe\u3059\u308b\u653b\u6483\uff08\u30d0\u30c3\u30af\u30c9\u30a2\uff09\u691c\u51fa&#8221; \u306e<\/span>\u7d9a\u304d\u3092\u8aad\u3080<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[44,304,336],"class_list":["post-905","post","type-post","status-publish","format-standard","hentry","category-arxiv","tag-backdoor","tag-point-cloud","tag-reverse-engineering-defense"],"_links":{"self":[{"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/905","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=905"}],"version-history":[{"count":0,"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/905\/revisions"}],"wp:attachment":[{"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=905"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=905"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=905"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}