IterativeSalienceOcclusion
Code Repository to check robustness of 3D Deep Learning (Volumetric and PointNet) to occlusion attacks
view repo
Understanding the spatial arrangement and nature of real-world objects is of paramount importance to many complex engineering tasks, including autonomous navigation. Deep learning has revolutionized state-of-the-art performance for tasks in 3D environments; however, relatively little is known about the robustness of these approaches in an adversarial setting. The lack of comprehensive analysis makes it difficult to justify deployment of 3D deep learning models in real-world, safety-critical applications. In this work, we develop an algorithm for analysis of pointwise robustness of neural networks that operate on 3D data. We show that current approaches presented for understanding the resilience of state-of-the-art models vastly overestimate their robustness. We then use our algorithm to evaluate an array of state-of-the-art models in order to demonstrate their vulnerability to occlusion attacks. We show that, in the worst case, these networks can be reduced to 0 the occupied input space.
READ FULL TEXT VIEW PDF
Deep learning defines a new data-driven programming paradigm that constr...
read it
While deep neural networks have been achieving state-of-the-art performa...
read it
With deep neural networks providing state-of-the-art machine learning mo...
read it
Deep learning defines a new data-driven programming paradigm that constr...
read it
Deep Learning NLP domain lacks procedures for the analysis of model
robu...
read it
Deep Networks have been shown to provide state-of-the-art performance in...
read it
In this paper we establish rigorous benchmarks for image classifier
robu...
read it
Code Repository to check robustness of 3D Deep Learning (Volumetric and PointNet) to occlusion attacks
Over the past several years, the machine learning community has worked to adapt the success of deep 2D vision algorithms to the 3D setting. Though initially slow to reach the performance level of its 2D counterpart, recent advances have increased the accuracy of 3D deep learning pipelines by around 18% on the ModelNet10 and ModelNet40 benchmarks
[30]. Now that 3D deep learning algorithms are able to achieve remarkable performance on standard benchmarks (currently topping out at 95% accuracy), there have been many encouraging attempts to adapt these models to real-time, safety-critical scenarios such as landing zone detection for airborne drones [15] and object recognition and classification for autonomous vehicles [20, 31, 3]. In spite of the recent developments, the robustness of these pipelines remains poorly understood.The rapidly growing literature on the robustness (or lack thereof) of 2D vision algorithms casts doubt on the stability of their 3D relatives. In this work, we demonstrate the lack of robustness of 3D deep learning to adversarial occlusion, despite the results of random input occlusion suggesting that they are relatively invariant to perturbation. Developing comprehensive testing methods for these systems is of paramount importance given that misclassification of pedestrians (which is demonstrated in Figure 1) as plants can induce poor planning by autonomous vehicles, an issue highlighted by a fatality in the real world [9].
In the past few years, many methods for crafting adversarial examples have emerged [25, 13, 19, 28], including several frameworks for verification of safety [12, 11]. In contrast to studies of weaknesses in deep learning models for image recognition due to their susceptibility to adversarial examples, very little work has been done to understand the robustness of 3D deep learning pipelines. This is in part because the data representation schemes utilized by 3D deep learning algorithms are not amenable to many current robustness analysis tools (see discussion in Section 2.2). By unifying the structure of foundational 3D deep learning pipelines, we solve this problem and lay the groundwork for future methods of safety testing and verification for these systems.
The value of understanding the robustness of 3D deep learning pipelines not only stems from their potential use in safety-critical systems (such as self-driving cars) but also the very noisy and unpredictable nature of collecting 3D data. Rarely will models receive full information about an object they are trying to recognize; rather, they will receive a single-angle, partially-occluded view of an object. In this work, we formalize a framework for moving towards an understanding of the performance of a wide spectrum of 3D deep learning algorithms. The efficient algorithm we propose could easily be used to further understand and improve the robustness and performance of future 3D deep learning algorithms. To this end, we offer several novel contributions to the study of 3D deep learning:
We present a unified view of volumetric and order-invariant 3D deep learning pipelines to exploit sensitivities to small changes in their inputs.
We develop a novel algorithm to craft adversarial examples and provide guarantees about quality and existence of misclassifications.
We use our algorithm to give a systematic occlusion analysis of the robustness of 3D deep learning algorithms that employ volumetric and point-cloud representations.^{1}^{1}1Code for all experiments in this paper can be found at https://github.com/matthewwicker/IterativeSalienceOcclusion
We begin by briefly covering the the pertinent background for both 3D deep learning and the robustness analysis of deep learning algorithms. Following preliminaries, we formalize the problem of evaluating pointwise robustness under adversarial occlusion. After stating the problem, we give an algorithm that can operate in both the white-box and black-box settings. Further, we prove that this algorithm can give guarantees about the existence of adversarial examples. Finally, we use the algorithm to attack several state-of-the-art models in 3D deep learning.
In this section we aim to give an overview of the field of 3D deep learning as well as the state of the art of robustness analysis for deep learning algorithms.
The current renaissance of 3D deep learning methods can be attributed to both the wide availability of cheap sensors for collecting 3D data and the release of large standard datasets of 3D objects [5, 30, 4]. Thanks to these datasets, 3D deep learning has enjoyed increased attention from machine learning practitioners. This has lead to an impressive leap in performance on standard benchmarks. Much of this progress can be attributed to novel data representation schemes, detailed below.
Volumetric Representations One of the first methods for deep 3D shape classification called ShapeNet [30]
achieved 77% accuracy by representing data in a volumetric fashion. Volumetric representation of 3D shapes involves passing in a discretized 3D tensor (typically a cube), where the value of each entry in the 3D tensor represents the probability that an object inhabits that space. ShapeNet was surpassed by another network utilizing a volumetric approach to shape classification named
VoxNet [16], which, utilizing computationally expensive 3D convolutions, was able to achieve 83% classification accuracy on the ModelNet benchmarks.Volumetric approaches have continued to find success outside the standard object recognition tasks and have been used in both landing site recognition for drones [15] and in the classification of already localized objects in 3D driving scenes [31].
Multi-View Representations Multi-View networks take in a full 3D model of an object and from the model generate a series of 2D RGB images which are fed into 2D vision algorithms in order to arrive at a classification. Multi-view approaches in object classification [24] have remained consistently state-of-the-art in terms of accuracy. However, the use of these networks in real-time scene and object recognition is non-trivial, and in some cases impossible, due to their inherent need for full 3D information of objects for classification.
Point-cloud representation The recent seminal work by Qi et. al. [21] (extended in [27] and [22]
) uses neural networks to learn a point-set function that directly takes inputs from sensors (point clouds) and is able to classify them without the need for expensive operations such as conversion to more inflated domains (as is the case with volumetric and multi-view representation schemes) or 3D convolutions. These networks are able to achieve similar or better classification accuracy when compared to volumetric approaches, and their efficiency is unmatched.
PointNets have been successful in a myriad of different classification and segmentation tasks. Perhaps most interesting for this work is their use in the recognition of objects in scenes taken from self-driving cars [20]. Previous work in point cloud recognition was completed without deep learning in [26].
In this work we do not consider multi-view representations. Firstly, multi-view representations convert 3D data to a collection of 2D images, thus making them compatible with existing methods for robustness analysis of image classifiers (e.g. [19, 2, 25, 13]). Further, multi-view networks require full 3D information about an object under consideration which is rarely available when operating in a real-time scenario. ^{2}^{2}2Despite using the term multi-view, [3] is really referring to a fusion of multi-modal views, not multiple unimodal views. The difficulty with the simultaneous analysis of these approaches is their vastly different architectural composition. In order to rectify this, we will unify both approaches under the following framework (which holds true for volumetric and order-invariant network architectures):
Data Latent Translation Pooling FCN
where FCN stands for fully connected network and refers to a neural network with potentially several layers of neurons which are fully connected. The specifics of this unifying framework for 3D deep learning will be presented in detail in Section
3 and examples of different representations [16, 21] are given in Figure 2.The phenomenon of adversarial examples has provoked a growing concern about the safety of deep learning algorithms. In general we can split methods for crafting adversarial examples into classes based on the threat model (i.e. setting of the adversary, see [18] for a thorough treatment) and properties of the examples found.
Attacks are split into white-box algorithms and black-box algorithms depending on what facets of the model an adversary has access to. We say that an algorithm with access to the inputs, outputs, weights and architecture of a model is a white-box method as it can look inside of the model to determine a best attack. A black-box attack, on the other hand, is only able to query the model under scrutiny, or in some extreme cases the algorithm may only have access to input-output pairs.
Algorithms can be further decomposed based on what kind of guarantees they are able to provide about the adversarial example they craft; if an algorithm is able to guarantee that it finds a minimal adversarial example or can guarantee that an adversarial example does not exist if it cannot find one, then we consider it a verification algorithm, as opposed to heuristic search algorithms which make no guarantees about the quality or existence of any adversarial examples that are crafted.
In our review of these methods, we seek to only give a brief summary of pertinent works rather than providing an exhaustive treatment of the field.
White-box Heuristic Algorithms One of the first explorations of adversarial examples was reported in [25], which framed the discovery of adversarial examples as a constrained optimization problem in the norm. This was followed by [8] which improved upon the L-BFGS algorithm proposed in [25] and expanded the attack to the metric. The current state of the art in white-box attack methods, however, is CW-attacks [2], which uses a different optimization problem to generate more refined (i.e. more similar to the original input) adversarial examples.
White-box Verification Algorithms
An early attempt at verifying neural networks uses a simplification of the classifier as a linear system and formulates the verification procedure as the potential solution to a set of linear constraints. More recent work has expanded this approach successfully to rectified linear units by employing an extension of the simplex method to solve the system of equations
[12]. Other methods use different iterative refinements in order to find adversarial examples or prove that none exist. An early attempt in this vein (DLV) uses a multi-path search through the connections of the network to exhaustively explore a region around the input through finite discretisation [11]. Another white-box verification approach employs global optimisation [23].Black-box Algorithms One of the first black-box methods for discovering adversarial examples involved training a surrogate model and then applying a white-box attack on the surrogate model [18]. This approach relies on the transfer of the attack from the surrogate to the real model, but this was shown to be empirically effective. Further, iterative approaches to verification of neural networks have also been done in the black-box setting, such as [28], which uses exhaustive input layer explorations to formulate optimal attacks on images. This method was refined and improved in [29] by exploiting Lipschitz continuity.
To the best of our knowledge, the work on robustness of 3D deep learning pipelines has focused entirely on randomized occlusion. In [21], they make a specific claim of robustness that stems from the existence of a critical set. In this work we will generalize the idea of a critical set to volumetric networks and will reverse their claim to show that, while in theory critical sets may offer robustness, in practice they are actually a weak point that can be exploited. Further discussion appears in Section 5.
In this section we formalize the ideas and notation that will allow us to analyze the robustness of 3D deep learning pipelines.
We take a neural network to be a function with domain and co-domain
. An input or object is a set of vectors
where . For the remainder of this paper, we will assume the domain to be a set of such sets, . Moreover, we will define to be the set of possible classes for each object. The output of the network with respect to is given as , for some . Further, we will represent the network assigned probability (or confidence) that belongs to a class as . Finally, we use to denote the cardinality (i.e. number of unique elements) of a set (where elements belong to ).In Section 2.1, we referenced the fact that almost all deep 3D classification algorithms can be broken down into two functions, one which translates the input to a latent representation, and another which classifies based on that latent representation.^{3}^{3}3Note that this is explicitly done in [21] in order to gain an order-invariant input. We will take the latent translation of an input to be represented by where
is the result of a max pooling operation on the
-dimensional latent vector (specifics are given below). After this latent translation, we use to represent the output of the max pooled latent vector from an FCN . In summary, this means we break down the original neural network, , into a composition of functions, .PointNets As discussed in Section 2.1, PointNets are designed to work on raw point cloud data. Formally, the input to a PointNet, , is (as in our preliminaries) a set of points from normalized to the unit cube. One major challenge with dealing with this kind of data is the fact that there are possible orderings of a single input. As such, PointNets must be symmetric functions (i.e. order invariant). This is achieved using the latent translation of the data. In essence, each component of the input, (a point in ), is passed through a series of translations to higher dimensions followed by a convolution operation. In the original PointNet paper, [21], each point was translated into
via a CNN (convolutional neural network) and then this 64-dimensional vector was subjected to a 1D convolution operation. A similar procedure was repeated until the network arrived at
-many 1024-dimensional latent vectors, at which point all 1024-dimensional vectors are max pooled into a single representative 1024-dimensional latent vector, . The process we just described will (as previously mentioned) be referred to as . The original PointNet architecture is presented in Figure 2.Volumetric Networks When compared to PointNets, volumetric networks have a much more canonical latent vector translation. The first step in a volumetric network, given that the input is a set of vectors from , is the translation into a voxelized cube (described in Section 2.1). In the case of VoxNet [16], the input cube is passed through a three-dimensional convolution operator to produce different filters for the cube; this is repeated a number of times and then the resulting series of -many cubes is passed into a fully connected network. As such, we take the flattened version of the -many scaled down cubes to be the output of the latent translation . Of course, straightforward convolutional neural networks are not the only kind of volumetric network that have been studied. Many popular forms of 2D CNNs have been scaled directly up to 3D. An example of the decomposition of a volumetric 3D pipeline can also be seen in Figure 2.
Given our decomposition of 3D deep learning pipelines into latent translations and fully connected networks (FCNs), it seems straightforward to simply attack the FCN with standard robustness analysis techniques and then project the latent vector back into the ambient space. Unfortunately, almost all current methods of crafting adversarial examples are inappropriate for safety testing of 3D deep learning pipelines. The most popular methods of generating adversarial examples use either the or norm. Optimization with respect to these kinds of manipulations encourages a change in all (or almost all) of the components of an input by some small value . This is inappropriate for the volumetric representation because each component of the input represents the probability that that component is inhabited, and assigning every non-inhabited point in a scene probability of having an occupying object is unrealistic. Further, in the case of a point-cloud representation scheme, using a blanket manipulation of every point in the input (in a different direction) has the potential to take the input outside of the natural data manifold, that is to say, that if is non-negligible, then we may corrupt the underlying structure of the input that makes it recognizable to humans. Examples of this phenomenon exist in natural images for moderate values of [6], and because point clouds are much more difficult for humans to recognize without manipulation, it seems that a blanket change to all points would, in practice, render many point clouds unrecognizable to humans.
Taking this as the case, we turn to -norm optimized attack algorithms. An -norm attack simply optimizes for the number of changes made to the input. We note that the cardinality operator allows a subset of the manipulations allowed by the norm. This prioritizes maintaining the underlying structure of the point cloud while allowing for occlusions, introduction of spurious features, and a handful of shifts in data positions. In the next section we will detail the formalization of the problem of crafting adversarial examples with adversarial occlusion on 3D data.
In tasks such as 2D pedestrian recognition and facial recognition, occlusion has been studied under several different models
[14, 17]. Occluded inputs are valuable to consider when evaluating the safety of a decision making network as it is not always the case that pedestrians, vehicles, or objects of interest will be in complete and plain view. These occlusions may not always be natural, however. In fact, it is often the case that data (point clouds) from sensors exhibit stochasticity. As such, it is imperative to model the cases in which some parts of the data might be missing.Because the point-cloud and volumetric domains are less rich than the image domain, there is no way to directly utilize pre-developed models of occlusion. In lieu of this, we simply define an occlusion of to be some and set up an optimization to find the minimum occlusion defined as:
(1) |
Of course, where we have an point input there are possible occlusions that could possibly satisfy this objective. In order to cut down this search space we will use the notion of a latent translation to define a critical point set, (abbrev. ), which is a concept introduced in [21]. We again distinguish our use of the critical set by noting that in this work we generalize it to volumetric networks and use it explicitly to display model weakness rather than to hypothesize robustness:
(2) |
where we define to be the values of that do not include . That is, a value exists in the critical point set if and only if its removal from the input impacts the latent representation of the input. For we know that if by virtue of the max pooling layer. Further, we know that for , if where represents the activation value of the input voxel after convolution^{4}^{4}4Note that multiple ’s will map to the same as a result of the down-sampling associated with the convolution operator. and represents the pooling neighborhood of the last layer of the latent translation prior to the flattening and fully-connected network.
Both of these formulations require us to use the vector which implies that the method needs white-box access to the network in order to find adversarial examples; however, we will later prove that, by exploiting our knowledge of 3D deep learning approaches, our attack algorithm can indeed work in the black-box setting.
Iterative Salience Occlusion Given the above ability to calculate the critical point set, we propose the following simple algorithm to randomly explore and iteratively refine an occlusion attack.
Within the ISO algorithm we take the Rank function to be some way of computing and ordering the critical point set based on the saliency and assume that Rank never returns the same permutation twice until it has exhausted all other options. All operations within the algorithm use standard set-theoretic notation.
Our algorithm has several properties that make it ideal as a method for evaluating worst-case occlusion. Firstly, the algorithm is anytime, meaning that the algorithm can terminate given any user defined termination condition, which we encode as a boolean function , an input to the algorithm. The function can encode adversarial goals including confidence reduction (), crafting adversarial examples (), or crafting targeted adversarial examples (). One may also change the algorithm slightly so that it returns the best adversarial example it has found in a specified amount of time.
In addition to being anytime, we can show that, in the case of PointNet architectures, this algorithm (which is currently white-box) can operate in the black-box setting.
Given an input and a PointNet network , we can compute the critical set in a black-box setting, given that all weights in are non-zero.
For each we can determine if it exists in the critical set by removing from and checking the final output of the network. If , then, by definition, the output will change due to the elimination of its contribution to . If then the output will not change because will not change. ∎
Finally, this algorithm has the strength of being a verification approach, meaning that it provides guarantees about both (1) finding an adversarial example if one exists and (2) finding an adversarial example that satisfies Equation 1 if one exists. Below we show that, if we set such that it returns true if and only if all possible permutations have been checked, then Equation 1 must be satisfied.
Given an input and a neural network that satisfies our framework, we can show that the ISO algorithm will find the optimal adversarial example that satisfies Eq. 1.
First, if there exists that is an adversarial example, we must find it by exhaustive search. This is because the Rank function will allow us to check all possible manipulation orders of the critical set and we set the function such that the algorithm will not terminate until this is the case. Next, we know that for each manipulation order that is checked we must yield the smallest possible subset for that order because of the iterative refinement on lines 11-13 of the algorithm (any points unnecessarily removed will be added back in). This means that if an adversarial example exists we will find it, and any example we find must be minimal. ∎
Given the strengths of the ISO algorithm, we will use it to show that, in almost all cases, random occlusion vastly overestimates the robustness of 3D deep learning pipelines. This discovery exacerbates the need for further study in the development of robust 3D deep learning algorithms and methods to check their safety.
In order to study the effectiveness of the proposed algorithm on both point-cloud and volumetric representations, we retrained both the VoxNet [16] and PointNet [21] network architectures on the ModelNet10 and ModelNet40 benchmarks [30] as well as on 3D objects extracted from the LIDAR sensor of the KITTI self-driving car [7]
(see Appendix). In all cases, the networks were trained for 50 epochs according to the training details provided in the respective papers. Using the pre-defined test-train split from ModelNet, all trained networks achieved accuracy within 4% of the reported accuracy on the test set.
After training each network, we sampled 200 objects from the test set in order to evaluate the robustness of each model. In the case of ModelNet10, the networks were tested with a time cutoff of 2 seconds to find an adversarial example, and in the case of ModelNet40 the ISO algorithm was given a 5 second cutoff. On the other hand, the random occlusion algorithm was simply given a random permutation of the data and removed the data in that random order until a misclassification was found, at which point it would report the number of points it needed to remove. As we can see in Figures 6.a and 7.a, the results reported by the random occlusion match up very well with those that are reported in [21]. Over the set of 200 objects we track how the accuracy of the network changes as we occlude more points from each model. In the worst case, VoxNet trained on ModelNet40, it took only the occlusion of 6.5% of the input in order to reduce the network to 0% classification accuracy.
Architecture | Dataset | Method | 0% Occl. | 25% Occl. | 50% Occl. | 75% Occl. | 95% Occl. |
---|---|---|---|---|---|---|---|
VoxNet | ModelNet10 | Rand. | 79.8% | 72.1% | 66.9% | 51.9% | 10.9% |
ISO | 79.8% | 1.0% | 0% | 0% | 0% | ||
ModelNet40 | Rand. | 76.1% | 60.9% | 39.1% | 12.3% | 2.0% | |
ISO | 76.1% | 0% | 0% | 0% | 0% | ||
KITTI | Rand. | 71.5% | 55.5% | 30.0% | 13.5% | 6.5% | |
ISO | 71.5% | 0% | 0% | 0% | 0% | ||
PointNet | ModelNet10 | Rand. | 86.1% | 84.0% | 83.0% | 79.2% | 60.2% |
ISO | 86.1% | 27% | 5% | 0% | 0% | ||
ModelNet40 | Rand. | 82.5% | 79.4% | 78.2% | 74.3% | 35.9% | |
ISO | 82.5% | 17.9% | 4.1% | 0% | 0% | ||
KITTI | Rand. | 73.0% | 72.5% | 72.0% | 68.5% | 40.5% | |
ISO | 73.0% | 49.5% | 37.5% | 0% | 0% |
A more readily interpretable version of Figures 6 and 7 exists in Table 1. We see that, in general, using random occlusion instead of the ISO algorithm overestimates robustness of the network to occlusion by around 60%. Further, we see that each of the models was reduced to less that 10% classification accuracy providing that the ISO algorithm was given time to manipulate half of the data.
From our theoretical analysis it seems that one of the key components in accurately analyzing a 3D deep learning architecture is the cardinality of the critical point set. On one hand, it may seem desirable to have a network with a low critical set cardinality, that is to say, a network that only looks at several key points of the input in order to make a decision. It is clear that there exists a relationship between the number of points in the critical set and the effectiveness of a random occlusion approach. For example, the probability that a random network will select a point that matters to the classification of any given input point cloud is precisely equal to the cardinality of the critical set divided by the cardinality of the unique points in the input. On the other hand, it seems that a low critical point set cardinality will lead directly to the success of the proposed ISO algorithm as it only manipulates points that exist in the critical set.
PointNet In Figure 5 we see that the the cardinality of the critical set on ModelNet inputs with 2048 points hovers around 450 to 500 points, roughly a quarter of the data.
Given that the average critical point set cardinality is about 25% of the input model, we would like to highlight the performance of the ISO algorithm after removal of 25% of the data. The reason that the network does not immediately collapse to 0% classification accuracy is that, after a point is removed from the critical point set, there is an opening for a new point to become critical. Despite this complication, our simple algorithm allows us to get an exponential decrease in accuracy with an increase in occlusion, as seen in plots in Figures 6 and 7. Ultimately, this increases our confidence in the link between the modifications of the critical point set and the network’s overall robustness.
VoxNet While defining the critical set for PointNet is straightforward, VoxNet (and volumetric approaches in general) pose a more difficult problem. Unlike PointNet, where membership in the critical set is binary, convolutional volumetric networks yield continuous salience values. This means that every point in the input exists in the critical set. To rectify this, we set a threshold that determines which points are critical or not. In order to be consistent with the analysis for PointNet, we have set the threshold for membership of the critical set to be the most salient 25% of the input. This is visualized in Figure 8; however, when we look at the 25% occluded point in Table 1, we see that we can force almost all examples to be misclassified.
Future Directions One aim of the approach presented in this paper is to introduce and encourage the use of alternate metrics for accuracy when evaluating 3D deep learning pipelines that may come into use in real-time, safety-critical scenarios. The methods of computing saliency that are formulated in this work can be directly utilized in the frameworks of [28, 29, 1] in order to derive bounds on the safety of classification. The improvement of generalization of 3D deep learning would be aided greatly by formulating more robust pipelines for processing point-cloud data.
In this work, we demonstrate that the critical point sets induced by the latent space translation in 3D deep learning pipelines, for both point-cloud and volumetric representations, expose a vulnerability to adversarial occlusion attacks that to this point had not been studied. We show that, in the worst case, a black-box verification approach can, using only 4 seconds per input example, reduce the accuracy of a network to 0% despite manipulating at most 6.5% of the input.
This work has been partially supported by the EPSRC Programme Grant on Mobile Autonomy (EP/M019918/1).
2013 IEEE International Conference on Computer Vision
, pages 1505–1512, Dec 2013.2017 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2017
, pages 77–85, 2017.The KITTI Dataset [7] is a collection of sensor readings from an autonomous vehicle in an urban environment. This includes point clouds from a Velodyne sensor that have been hand labeled with 3D bounding boxes. To assess classification networks on this data, we isolated all of the objects in each driving scene and created a classification task (determining if an object was a car, truck or other) comprised of 5,000 real-world point clouds. In order to extract these objects we parsed through driving sequences and isolated the point clouds from human-labeled bounding boxes that had sufficient density (i.e. easily recognizable objects).
In Table 2 we show the initial accuracy of each method on the new data set in the first column. In subseqent columns we show how data occlusion affects the performance of the network (identical to the rows in the main paper). This is done for both white-box and black-box settings. The times reported are the mean times in seconds between the initial classification and the final adversarial example being returned. These times only reflect inputs which were initially classified correctly by the network.
Architecture | 0% Occl. | 25% | 50% | 75% | time (s) |
---|---|---|---|---|---|
PointNet | 73% | 49.5% | 37.5% | 0% | 5.06 |
PointNet-BB | 73% | 49.5% | 37.5% | 0% | 24.28 |
PointNet-Rand | 73% | 72.5% | 72.0% | 68.5% | 3.54 |
VoxNet | 71.5% | 0% | 0% | 0% | 1.16 |
VoxNet-BB | 71.5% | 0% | 0% | 0% | 1.44 |
VoxNet-Rand | 71.5% | 55.5% | 30.0% | 13.5% | 0.45 |
Comments
There are no comments yet.