Skip to main content

Showing 1–7 of 7 results for author: Hau, Z

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.00282  [pdf, other

    cs.CV cs.CR

    Adversarial 3D Virtual Patches using Integrated Gradients

    Authors: Chengzeng You, Zhongyuan Hau, Binbin Xu, Soteris Demetriou

    Abstract: LiDAR sensors are widely used in autonomous vehicles to better perceive the environment. However, prior works have shown that LiDAR signals can be spoofed to hide real objects from 3D object detectors. This study explores the feasibility of reducing the required spoofing area through a novel object-hiding strategy based on virtual patches (VPs). We first manually design VPs (MVPs) and show that VP… ▽ More

    Submitted 31 May, 2024; originally announced June 2024.

    Comments: IEEE/ACM Workshop on the Internet of Safe Things, May 23rd, 2024

  2. arXiv:2204.13973  [pdf, other

    cs.CV cs.CR

    Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception

    Authors: Zhongyuan Hau, Soteris Demetriou, Emil C. Lupu

    Abstract: Autonomous Vehicles (AVs) are mostly reliant on LiDAR sensors which enable spatial perception of their surroundings and help make driving decisions. Recent works demonstrated attacks that aim to hide objects from AV perception, which can result in severe consequences. 3D shadows, are regions void of measurements in 3D point clouds which arise from occlusions of objects in a scene. 3D shadows were… ▽ More

    Submitted 29 April, 2022; originally announced April 2022.

    Comments: To appear in the Proceedings of the 2022 IEEE Security and Privacy Workshop on the Internet of Safe Things (SafeThings 2022)

  3. arXiv:2204.08726  [pdf, other

    cs.LG cs.CR cs.CV

    Jacobian Ensembles Improve Robustness Trade-offs to Adversarial Attacks

    Authors: Kenneth T. Co, David Martinez-Rego, Zhongyuan Hau, Emil C. Lupu

    Abstract: Deep neural networks have become an integral part of our software infrastructure and are being deployed in many widely-used and safety-critical applications. However, their integration into many systems also brings with it the vulnerability to test time attacks in the form of Universal Adversarial Perturbations (UAPs). UAPs are a class of perturbations that when applied to any input causes model m… ▽ More

    Submitted 19 April, 2022; originally announced April 2022.

  4. Temporal Consistency Checks to Detect LiDAR Spoofing Attacks on Autonomous Vehicle Perception

    Authors: Chengzeng You, Zhongyuan Hau, Soteris Demetriou

    Abstract: LiDAR sensors are used widely in Autonomous Vehicles for better perceiving the environment which enables safer driving decisions. Recent work has demonstrated serious LiDAR spoofing attacks with alarming consequences. In particular, model-level LiDAR spoofing attacks aim to inject fake depth measurements to elicit ghost objects that are erroneously detected by 3D Object Detectors, resulting in haz… ▽ More

    Submitted 14 June, 2021; originally announced June 2021.

    Comments: Accepted in 1st Workshop on Security and Privacy for Mobile AI (MAISP 2021)

  5. arXiv:2102.03722  [pdf, other

    cs.CV cs.CR cs.LG

    Object Removal Attacks on LiDAR-based 3D Object Detectors

    Authors: Zhongyuan Hau, Kenneth T. Co, Soteris Demetriou, Emil C. Lupu

    Abstract: LiDARs play a critical role in Autonomous Vehicles' (AVs) perception and their safe operations. Recent works have demonstrated that it is possible to spoof LiDAR return signals to elicit fake objects. In this work we demonstrate how the same physical capabilities can be used to mount a new, even more dangerous class of attacks, namely Object Removal Attacks (ORAs). ORAs aim to force 3D object dete… ▽ More

    Submitted 7 February, 2021; originally announced February 2021.

    Comments: Accepted to AutoSec at NDSS 2021

  6. arXiv:2008.12008  [pdf, other

    cs.CR

    Shadow-Catcher: Looking Into Shadows to Detect Ghost Objects in Autonomous Vehicle 3D Sensing

    Authors: Zhongyuan Hau, Soteris Demetriou, Luis Muñoz-González, Emil C. Lupu

    Abstract: LiDAR-driven 3D sensing allows new generations of vehicles to achieve advanced levels of situation awareness. However, recent works have demonstrated that physical adversaries can spoof LiDAR return signals and deceive 3D object detectors to erroneously detect "ghost" objects. Existing defenses are either impractical or focus only on vehicles. Unfortunately, it is easier to spoof smaller objects s… ▽ More

    Submitted 2 May, 2021; v1 submitted 27 August, 2020; originally announced August 2020.

    Comments: To appear in 26th European Symposium on Research in Computer Security (ESORICS) 2021. Accepted at ESORICS'21 for the Winter Cycle submission

  7. Evaluating Cascading Impact of Attacks on Resilience of Industrial Control Systems: A Design-Centric Modeling Approach

    Authors: Zhongyuan Hau, John H. Castellanos, Jianying Zhou

    Abstract: A design-centric modeling approach was proposed to model the behaviour of the physical processes controlled by Industrial Control Systems (ICS) and study the cascading impact of data-oriented attacks. A threat model was used as input to guide the construction of the CPS model where control components which are within the adversary's intent and capabilities are extracted. The relevant control compo… ▽ More

    Submitted 16 July, 2020; v1 submitted 8 May, 2019; originally announced May 2019.