Neural Reconstruction of LiDAR Point Clouds under Jamming Attacks via Full-Waveform Representation and Simultaneous Laser Sensing
arXiv:2604.00371v1 Announce Type: new Abstract: LiDAR sensors are critical for autonomous driving perception, yet remain vulnerable to spoofing attacks. Jamming attacks inject high-frequency laser pulses that completely blind LiDAR sensors by overwhelming authentic returns with malicious signals. We discover that while point clouds become randomized, the underlying full-waveform data retains distinguishable signatures between attack and legitimate signals. In this work, we propose PULSAR-Net, capable of reconstructing authentic point clouds under jamming attacks by leveraging previously underutilized intermediate full-waveform representations and simultaneous laser sensing in modern LiDAR systems. PULSAR-Net adopts a novel U-Net architecture with axial spatial attention mechanisms specific
View PDF HTML (experimental)
Abstract:LiDAR sensors are critical for autonomous driving perception, yet remain vulnerable to spoofing attacks. Jamming attacks inject high-frequency laser pulses that completely blind LiDAR sensors by overwhelming authentic returns with malicious signals. We discover that while point clouds become randomized, the underlying full-waveform data retains distinguishable signatures between attack and legitimate signals. In this work, we propose PULSAR-Net, capable of reconstructing authentic point clouds under jamming attacks by leveraging previously underutilized intermediate full-waveform representations and simultaneous laser sensing in modern LiDAR systems. PULSAR-Net adopts a novel U-Net architecture with axial spatial attention mechanisms specifically designed to identify attack-induced signals from authentic object returns in the full-waveform representation. To address the lack of full-waveform representations in existing LiDAR datasets under jamming attacks, we introduce a physics-aware dataset generation pipeline that synthesizes realistic full-waveform representations under jamming attacks. Despite being trained exclusively on synthetic data, PULSAR-Net achieves reconstruction rates of 92% and 73% for vehicles obscured by jamming attacks in real-world static and driving scenarios, respectively.
Subjects:
Computer Vision and Pattern Recognition (cs.CV)
Cite as: arXiv:2604.00371 [cs.CV]
(or arXiv:2604.00371v1 [cs.CV] for this version)
https://doi.org/10.48550/arXiv.2604.00371
arXiv-issued DOI via DataCite (pending registration)
Submission history
From: Ryo Yoshida [view email] [v1] Wed, 1 Apr 2026 01:37:11 UTC (2,319 KB)
Sign in to highlight and annotate this article

Conversation starters
Daily AI Digest
Get the top 5 AI stories delivered to your inbox every morning.
More about
announceautonomousarxiv
New AI testing method flags fairness risks in autonomous systems
Artificial intelligence is increasingly being used to help optimize decision-making in high-stakes settings. For instance, an autonomous system can identify a power distribution strategy that minimizes costs while keeping voltages stable.

The Algorithmic Edge: Launching Your Day Trading Journey with AI Sentiment and Next-Gen Charting
The Modern Trader's Toolkit: From Automated Signals to Market Sentiment AI The landscape of retail trading has undergone a seismic shift in the last five years. Where once a Bloomberg Terminal, a broker's phone line, and gut instinct were the primary tools, today's trader navigates a digital ecosystem powered by artificial intelligence, real-time analytics, and democratized data. For aspiring and established traders alike, the challenge is no longer accessing information, but intelligently filtering the signal from the noise. This evolution has given rise to sophisticated AI trading signals , comprehensive educational resources like a day trading guide for beginners , and powerful analytics platforms that go beyond traditional charting. Understanding these tools—and how they integrate—is n

Building Sentinel Gate: A 3-Layer Security Pipeline for AI Agents
How I Built a 3-Layer Security Pipeline for My AI Agent in 5 Minutes Your AI agent has API keys, passwords, phone numbers, and email addresses. It also has access to the internet. What could go wrong? Everything. I run a 10-agent AI system (OpenClaw) on a single MacBook. It posts tweets, sends emails, fetches web pages, and executes shell commands — all autonomously. Last week, I realized I had zero protection against my own agents accidentally leaking secrets or executing injected commands from fetched web content. So I built Sentinel Gate — a 3-layer security pipeline that sits between my agents and the outside world. The Threat Model Three attack surfaces: Outbound leaks — An agent constructs a tweet, email, or API call that accidentally includes an API key, phone number, or password. T
Knowledge Map
Connected Articles — Knowledge Graph
This article is connected to other articles through shared AI topics and tags.
More in Releases

Gemma 4 1B, 13B, and 27B spotted
[Gemma 4](INSET_PAPER_LINK) is a multimodal model with pretrained and instruction-tuned variants, available in 1B, 13B, and 27B parameters. The architecture is mostly the same as the previous Gemma versions. The key differences are a vision processor that can output images of fixed token budget and a spatial 2D RoPE to encode vision-specific information across height and width axis. You can find all the original Gemma 4 checkpoints under the [Gemma 4]( https://huggingface.co/collections/google/gemma-4-release-67c6c6f89c4f76621268bb6d ) release. submitted by /u/TKGaming_11 [link] [comments]

EchoData and R. Michael Anderson Announce Strategic Partnership to Drive AI Leadership Transformation in Saudi Arabia - The Tuscaloosa News
EchoData and R. Michael Anderson Announce Strategic Partnership to Drive AI Leadership Transformation in Saudi Arabia The Tuscaloosa News



Discussion
Sign in to join the discussion
No comments yet — be the first to share your thoughts!