
Theorem 1indicates that to make two surfaces
-isometric, one can constrain their Gaussian curvatures.
Since the Gaussian curvature is computable and differentiable w.r.t. vertices, we adopt it to constrain
the naturalness of 3D adversarial meshes as
RGauss (Madv,M) = 1
nvX
v∈V,v0=ϕ(v)∈Vadv
kK(v0)−K(v)k2
2,(3)
where
ϕ(·)
is the corresponding mapping between vertices in
V
and
Vadv
. We follow the Gauss-
Bonnet formula [7] to calculate the Gaussian curvature of the vertices as
K(v) = 2π−Pi∈N(v)θi(v)
A(v),(4)
where
A(·)
is the area of the vertex neighborhood, i.e., the area of the polygonal region joined by the
consecutive midpoints of triangles incident on the vertex of interest,
N(v)
is the set of faces containing
v
, and
θi(v)
is the interior angle of the face at vertex
v
. Note that the value of
Pi∈N(v)θi(v)
for a
plane is
2π
and the Gaussian curvature is
0
. The more curved the surface, the smaller the value of
Pi∈N(v)θi(v)and the larger the Gaussian curvature.
In addition, we prevent the generated adversarial meshes from self-intersecting by using the Laplace
loss [
16
], denoted as
RLap (Madv)
, which represents the distance between a vertex and its nearest
neighbor’s center of mass, and the edge length loss [
67
], denoted as
Redge (Madv)
, which represents
the smoothness of the surface. Thus, the overall regularization term can be expressed as:
R(Madv,M) = λ1· RGauss (Madv,M) + λ2· RLap (Madv) + λ3· Redge (Madv),(5)
where λ1,λ2and λ3are balancing hyperparameters.
3.3 Improving the robustness under physical transformations
Besides concerning the naturalness of 3D adversarial examples, we further enhance their robustness
under physical transformations, such as 3D rotations, affine projections, cutouts, etc. A common
method is the expectation over transformation (EOT) algorithm [
1
], which optimizes the adversarial
example over the distribution of different transformations. However, it is still challenging to maintain
the attacking performance under various physical transformations. As shown in the experiments, after
using the EOT algorithm, there are still some transformations that the generated adversarial examples
are not robust to, leading to a reduction of the attack success rate.
To address this issue, our key insight is to consider the worst-case transformations rather than their ex-
pectation, since if the adversarial examples are resistant to the most harmful physical transformations,
they can also resist much weaker transformations, inspired by adversarial training [
47
]. Therefore,
we propose a
maxima over transformation (MaxOT)
algorithm to actively search for physical
transformations that maximize the misclassification loss. The loss function
Lf
is thus formulated as:
Lf(S(Madv), y∗) = max
T∗⊂T
Et∈T∗Lce (t(S(Madv)), y∗),(6)
where
T
contains all possible transformations,
T∗
is a subset of transformations in
T
, and
Lce
is the
cross-entropy loss. Note that in Eq.
(6)
we consider a subset of transformations
T∗
rather than a
single one because the loss landscape w.r.t. transformations is largely non-convex and contains many
local maxima [
14
]. Thus we aim to find a set of diverse worst-case transformations. By integrating
Eq.
(6)
into Eq.
(1)
, it forms a minimax optimization problem, where the inner maximization aims
to find physical transformations that maximize the cross-entropy loss, while the outer minimization
aims to optimize the adversarial example with the worst-case transformations.
3.3.1 Bayesian optimization
To solve problem
(6)
, we search for the worst-case transformations one by one. Given an initialized
transformation, we perform gradient-based optimization to update the transformation parameters
(e.g., angles for rotations). However, randomly selecting initialized transformations is ineffective
since the random initialization may drop into regions of weak transformations, which limits the
exploration of the space of all transformations. To address this issue, we propose to adopt the
Bayesian optimization [17,55] to better break the dilemma between exploration and exploitation to
find more appropriate initialized transformations.
5