Skip to main navigation
Skip to search
Skip to main content
New Jersey Institute of Technology Home
Help & FAQ
Home
Profiles
Research units
Facilities
Federal Grants
Research output
Press/Media
Search by expertise, name or affiliation
Benchmarking and Analyzing Robust Point Cloud Recognition: Bag of Tricks for Defending Adversarial Examples
Qiufan Ji
, Lin Wang
,
Cong Shi
, Shengshan Hu
, Yingying Chen
, Lichao Sun
Computer Science
Research output
:
Chapter in Book/Report/Conference proceeding
›
Conference contribution
8
Scopus citations
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Benchmarking and Analyzing Robust Point Cloud Recognition: Bag of Tricks for Defending Adversarial Examples'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Adversarial Examples
100%
Bag of Tricks
100%
Point Cloud Recognition
100%
Point Cloud
66%
Adversarial Robustness
50%
3D Point Cloud
33%
Code-based
16%
Attacker
16%
Deep Neural Network
16%
Augmentation Techniques
16%
2D Image
16%
Attack Strategy
16%
Practical Deployment
16%
Unseen
16%
Defense Method
16%
Effective Combination
16%
Robust Defense
16%
Adversarial Training
16%
Defense Strategy
16%
Defense Framework
16%
Adversarial Defense
16%
Hybrid Training
16%
Robust Learners
16%
Computer Science
Point Cloud
100%
Benchmarking
100%
Adversarial Example
100%
Adversarial Machine Learning
14%
Attackers
14%
Deep Neural Network
14%
Average Accuracy
14%
Defense Strategy
14%
Chemical Engineering
Deep Neural Network
100%