{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T10:09:03Z","timestamp":1764842943949,"version":"3.40.3"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031729829"},{"type":"electronic","value":"9783031729836"}],"license":[{"start":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T00:00:00Z","timestamp":1730160000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T00:00:00Z","timestamp":1730160000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-72983-6_8","type":"book-chapter","created":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T09:34:20Z","timestamp":1730108060000},"page":"128-144","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["PapMOT: Exploring Adversarial Patch Attack Against Multiple Object Tracking"],"prefix":"10.1007","author":[{"given":"Jiahuan","family":"Long","sequence":"first","affiliation":[]},{"given":"Tingsong","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Wen","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Shuai","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Weijia","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Weien","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Xiaoqian","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,29]]},"reference":[{"key":"8_CR1","unstructured":"Athalye, A., Engstrom, L., Ilyas, A., Kwok, K.: Synthesizing robust adversarial examples. In: International Conference on Machine Learning (2018)"},{"key":"8_CR2","unstructured":"PaddlePaddle Authors: PaddleDetection, object detection and instance segmentation toolkit based on PaddlePaddle (2019). https:\/\/github.com\/PaddlePaddle\/PaddleDetection"},{"key":"8_CR3","doi-asserted-by":"publisher","first-page":"246309","DOI":"10.1155\/2008\/246309","volume":"2008","author":"K Bernardin","year":"2008","unstructured":"Bernardin, K., Stiefelhagen, R.: Evaluating multiple object tracking performance: the clear mot metrics. EURASIP J. Image Video Process. 2008, 246309 (2008). https:\/\/doi.org\/10.1155\/2008\/246309","journal-title":"EURASIP J. Image Video Process."},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Cao, J., Weng, X., Khirodkar, R., Pang, J., Kitani, K.: Observation-centric sort: rethinking sort for robust multi-object tracking. arXiv preprint arXiv:2203.14360 (2022)","DOI":"10.1109\/CVPR52729.2023.00934"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Chiu, H.K., Li, J., Ambrus, R., Bohg, J.: Probabilistic 3D multi-modal, multi-object tracking for autonomous driving. In: IEEE International Conference on Robotics and Automation (2021)","DOI":"10.1109\/ICRA48506.2021.9561754"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1007\/978-3-030-59013-0_23","volume-title":"Computer Security \u2013 ESORICS 2020","author":"K-H Chow","year":"2020","unstructured":"Chow, K.-H., Liu, L., Gursoy, M.E., Truex, S., Wei, W., Wu, Y.: Understanding object detection through an adversarial lens. In: Chen, L., Li, N., Liang, K., Schneider, S. (eds.) ESORICS 2020. LNCS, vol. 12309, pp. 460\u2013481. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-59013-0_23"},{"key":"8_CR7","unstructured":"Dendorfer, P., et al.: MOT20: a benchmark for multi object tracking in crowded scenes. arXiv preprint arXiv:2003.09003 (2020)"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Dollar, P., Wojek, C., Schiele, B., Perona, P.: Pedestrian detection: a benchmark. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (2009)","DOI":"10.1109\/CVPRW.2009.5206631"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Du, A., et al.: Physical adversarial attacks on an aerial imagery object detector. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision (2022)","DOI":"10.1109\/WACV51458.2022.00385"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Ess, A., Leibe, B., Schindler, K., van Gool, L.: A mobile vision system for robust multi-person tracking. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (2008)","DOI":"10.1109\/CVPR.2008.4587581"},{"key":"8_CR11","unstructured":"Ge, Z., Liu, S., Wang, F., Li, Z., Sun, J.: YOLOX: exceeding yolo series in 2021. arXiv preprint arXiv:2107.08430 (2021)"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Hu, Y.C.T., Kung, B.H., Tan, D.S., Chen, J.C., Hua, K.L., Cheng, W.H.: Naturalistic physical adversarial patch for object detectors. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (2021)","DOI":"10.1109\/ICCV48922.2021.00775"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Hu, Z., Huang, S., Zhu, X., Sun, F., Zhang, B., Hu, X.: Adversarial texture for fooling person detectors in the physical world. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (2022)","DOI":"10.1109\/CVPR52688.2022.01295"},{"key":"8_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-030-58529-7_5","volume-title":"Computer Vision \u2013 ECCV 2020","author":"S Jia","year":"2020","unstructured":"Jia, S., Ma, C., Song, Y., Yang, X.: Robust tracking against adversarial attacks. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12364, pp. 69\u201384. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58529-7_5"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Jia, S., Ma, C., Yao, T., Yin, B., Ding, S., Yang, X.: Exploring frequency adversarial attacks for face forgery detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (2022)","DOI":"10.1109\/CVPR52688.2022.00407"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Jia, S., Song, Y., Ma, C., Yang, X.: IoU attack: towards temporally coherent black-box adversarial attack for visual object tracking. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (2021)","DOI":"10.1109\/CVPR46437.2021.00664"},{"key":"8_CR17","unstructured":"Jia, Y., Lu, Y., Shen, J., Chen, Q.A., Zhong, Z., Wei, T.: Fooling detection alone is not enough: adversarial attack against multiple object tracking. In: International Conference on Learning Representations (2020)"},{"issue":"1\u20132","key":"8_CR18","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1002\/nav.3800020109","volume":"2","author":"HW Kuhn","year":"1955","unstructured":"Kuhn, H.W.: The Hungarian method for the assignment problem. Naval Res. Logistics Q. 2(1\u20132), 83\u201397 (1955)","journal-title":"Naval Res. Logistics Q."},{"key":"8_CR19","unstructured":"Leal-Taix\u00e9, L., Milan, A., Reid, I., Roth, S., Schindler, K.: MOTChallenge 2015: towards a benchmark for multi-target tracking. arXiv preprint arXiv:1504.01942 (2015)"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Lin, D., Chen, Q., Zhou, C., He, K.: TraSA: Tracklet-switch adversarial attacks against multi-object tracking. arXiv preprint arXiv:2111.08954 (2023)","DOI":"10.31219\/osf.io\/u9zrj"},{"key":"8_CR21","doi-asserted-by":"publisher","first-page":"696","DOI":"10.1109\/TIP.2010.2073477","volume":"20","author":"F Luisier","year":"2010","unstructured":"Luisier, F., Blu, T., Unser, M.: Image denoising in mixed Poisson-Gaussian noise. IEEE Trans. Image Process. 20, 696\u2013708 (2010)","journal-title":"IEEE Trans. Image Process."},{"key":"8_CR22","doi-asserted-by":"publisher","first-page":"103448","DOI":"10.1016\/j.artint.2020.103448","volume":"293","author":"W Luo","year":"2021","unstructured":"Luo, W., Xing, J., Milan, A., Zhang, X., Liu, W., Kim, T.K.: Multiple object tracking: a literature review. Artif. Intell. 293, 103448 (2021)","journal-title":"Artif. Intell."},{"key":"8_CR23","unstructured":"Milan, A., Leal-Taix\u00e9, L., Reid, I., Roth, S., Schindler, K.: MOT16: a benchmark for multi-object tracking. arXiv preprint arXiv:1603.00831 (2016)"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Redmon, J., Farhadi, A.: YOLO9000: better, faster, stronger. In: IEEE Conference on Computer Vision and Pattern Recognition (2017)","DOI":"10.1109\/CVPR.2017.690"},{"key":"8_CR25","unstructured":"Redmon, J., Farhadi, A.: YOLOv3: an incremental improvement. arXiv preprint arXiv:1804.02767 (2018)"},{"key":"8_CR26","unstructured":"Shao, S., et al.: CrowdHuman: a benchmark for detecting human in a crowd. arXiv preprint arXiv:1805.00123 (2018)"},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Sharif, M., Bhagavatula, S., Bauer, L., Reiter, M.K.: Accessorize to a crime. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (2016)","DOI":"10.1145\/2976749.2978392"},{"key":"8_CR28","doi-asserted-by":"crossref","unstructured":"Thys, S., Van\u00a0Ranst, W., Goedem\u00e9, T.: Fooling automated surveillance cameras: adversarial patches to attack person detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (2019)","DOI":"10.1109\/CVPRW.2019.00012"},{"key":"8_CR29","doi-asserted-by":"crossref","unstructured":"Wang, D., et al.: FCA: learning a 3D full-coverage vehicle camouflage for multi-view physical adversarial attack. In: Proceedings of the AAAI Conference on Artificial Intelligence (2022)","DOI":"10.1609\/aaai.v36i2.20141"},{"key":"8_CR30","unstructured":"Welch, G., Bishop, G., et\u00a0al.: An introduction to the Kalman filter (1995)"},{"key":"8_CR31","doi-asserted-by":"crossref","unstructured":"Wojke, N., Bewley, A., Paulus, D.: Simple online and realtime tracking with a deep association metric. In: IEEE International Conference on Image Processing (2017)","DOI":"10.1109\/ICIP.2017.8296962"},{"key":"8_CR32","doi-asserted-by":"crossref","unstructured":"Xiao, T., Li, S., Wang, B., Lin, L., Wang, X.: Joint detection and identification feature learning for person search. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (2017)","DOI":"10.1109\/CVPR.2017.360"},{"key":"8_CR33","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s11633-019-1211-x","volume":"17","author":"H Xu","year":"2019","unstructured":"Xu, H., et al.: Adversarial attacks and defenses in images, graphs and text: a review. Int. J. Autom. Comput. 17, 151\u2013178 (2019). https:\/\/doi.org\/10.1007\/s11633-019-1211-x","journal-title":"Int. J. Autom. Comput."},{"key":"8_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1007\/978-3-030-58558-7_39","volume-title":"Computer Vision \u2013 ECCV 2020","author":"K Xu","year":"2020","unstructured":"Xu, K., et al.: Adversarial t-shirt! evading person detectors in a physical world. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12350, pp. 665\u2013681. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58558-7_39"},{"key":"8_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/978-3-030-58520-4_11","volume-title":"Computer Vision \u2013 ECCV 2020","author":"X Yang","year":"2020","unstructured":"Yang, X., Wei, F., Zhang, H., Zhu, J.: Design and interpretation of universal adversarial patches in face detection. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12362, pp. 174\u2013191. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58520-4_11"},{"key":"8_CR36","doi-asserted-by":"crossref","unstructured":"Yu, F., et al.: BDD100K: a diverse driving dataset for heterogeneous multitask learning. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition (2020)","DOI":"10.1109\/CVPR42600.2020.00271"},{"key":"8_CR37","doi-asserted-by":"crossref","unstructured":"Zhang, S., Benenson, R., Schiele, B.: CityPersons: a diverse dataset for pedestrian detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (2017)","DOI":"10.1109\/CVPR.2017.474"},{"key":"8_CR38","doi-asserted-by":"publisher","unstructured":"Zhang, Y., et al.: ByteTrack: multi-object tracking by associating every detection box. In: Avidan, S., Brostow, G., Ciss\u00e9, M., Farinella, G.M., Hassner, T. (eds.) Computer Vision, ECCV 2022. LNCS, vol. 13682, pp. 1\u201321. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-20047-2_1","DOI":"10.1007\/978-3-031-20047-2_1"},{"key":"8_CR39","doi-asserted-by":"publisher","first-page":"3069","DOI":"10.1007\/s11263-021-01513-4","volume":"129","author":"Y Zhang","year":"2021","unstructured":"Zhang, Y., Wang, C., Wang, X., Zeng, W., Liu, W.: FairMOT: on the fairness of detection and re-identification in multiple object tracking. Int. J. Comput. Vis. 129, 3069\u20133087 (2021)","journal-title":"Int. J. Comput. Vis."},{"key":"8_CR40","doi-asserted-by":"publisher","unstructured":"Zhao, Z., Wu, Z., Zhuang, Y., Li, B., Jia, J.: Tracking objects as pixel-wise distributions. In: Avidan, S., Brostow, G., Cisse\u00e9, M., Farinella, G.M., Hassner, T. (eds.) Computer Vision, ECCV 2022. LNCS, vol. 13682, pp 76\u201394. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-20047-2_5","DOI":"10.1007\/978-3-031-20047-2_5"},{"key":"8_CR41","doi-asserted-by":"crossref","unstructured":"Zheng, L., Zhang, H., Sun, S., Chandraker, M., Yang, Y., Tian, Q.: Person re-identification in the wild. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (2017)","DOI":"10.1109\/CVPR.2017.357"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-72983-6_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T09:56:21Z","timestamp":1730109381000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-72983-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,29]]},"ISBN":["9783031729829","9783031729836"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-72983-6_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,10,29]]},"assertion":[{"value":"29 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Milan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2024.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}