Research Article

NormalAttack: Curvature-Aware Shape Deformation along Normals for Imperceptible Point Cloud Attack

Table 3

Comparison on the transferability performance of different attack methods.

SourcePointNet++DGCNNPointConv
TargetDGCNNPointConvPointNet++PointConvPointNet++DGCNN

I-FGSM24.4022.4032.5332.4238.0233.41
3D-ADV20.4419.5632.7533.9622.8654.73
GeoA318.3522.4221.6530.5517.1423.19
ITA21.4221.8633.1830.9834.7231.75
Ours21.2122.8639.2338.2434.9440.98