2021
DOI: 10.1007/978-3-030-88418-5_33
|View full text |Cite
|
Sign up to set email alerts
|

Shadow-Catcher: Looking into Shadows to Detect Ghost Objects in Autonomous Vehicle 3D Sensing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 11 publications
(13 citation statements)
references
References 18 publications
0
13
0
Order By: Relevance
“…3D Shadows as physical invariant. 3D shadows have been introduced by Hau et al in [6] as a phyiscal invariant to verify genuine objects in a 3D point cloud scene and detect object spoofing attacks. In object spoofing attacks [5], [7]- [9], point cloud measurements are injected into a scene to spoof objects that are then erroneously detected by 3D-object detectors used by AVs.…”
Section: Using 3d Shadows To Detect Hidden Objectsmentioning
confidence: 99%
See 1 more Smart Citation
“…3D Shadows as physical invariant. 3D shadows have been introduced by Hau et al in [6] as a phyiscal invariant to verify genuine objects in a 3D point cloud scene and detect object spoofing attacks. In object spoofing attacks [5], [7]- [9], point cloud measurements are injected into a scene to spoof objects that are then erroneously detected by 3D-object detectors used by AVs.…”
Section: Using 3d Shadows To Detect Hidden Objectsmentioning
confidence: 99%
“…Our work. 3D shadows in LiDAR point clouds, introduced in [6], are a physical phenomenon that is caused by occlusion of LiDAR laser pulses by objects in a scene. The authors leverage these shadow artifacts as a physical invariant to detect LiDAR spoofing attacks.…”
Section: Introductionmentioning
confidence: 99%
“…For defenses against point cloud attacks on 3D object detection, [40] introduced 1) CARLO -an empirical defense for binary classification between valid and invalid instances, and 2) SVF -a re-architecting of the perception model with multi-view projection, similar to [10], while [16] casts detecting spoof objects as a binary classification problem using the shadow region behind detections for features. Translation attack.…”
Section: Attacks On Perceptionmentioning
confidence: 99%
“…GhostBuster. Finally, the GhostBuster defense extracts features of the shadow region behind object detections, to perform binary classification into valid and invalid instances [16].…”
Section: Other Defense Algorithmsmentioning
confidence: 99%
“…UAP present a systemic risk, as they enable practical and physically realizable adversarial attacks. They have been demonstrated in many widely-used and safety-critical applications such as camera-based computer vision [7,8,2,18] and LiDAR-based object detection [10,11]. UAPs have also been shown to facilitate realistic attacks in both the physical [23] and digital [24] domains.…”
Section: Introductionmentioning
confidence: 99%