{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T14:09:03Z","timestamp":1777990143949,"version":"3.51.4"},"publisher-location":"Cham","reference-count":56,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031957666","type":"print"},{"value":"9783031957673","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-95767-3_13","type":"book-chapter","created":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T12:25:09Z","timestamp":1750335909000},"page":"339-366","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["LaserGuider: A Laser Based Physical Backdoor Attack Against Deep Neural Networks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5816-8031","authenticated-orcid":false,"given":"Yongjie","family":"Xu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8277-3119","authenticated-orcid":false,"given":"Guangke","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0581-2679","authenticated-orcid":false,"given":"Fu","family":"Song","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2988-6012","authenticated-orcid":false,"given":"Yuqi","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,20]]},"reference":[{"key":"13_CR1","unstructured":"Explore Ultralytics YOLOv8: a new state-of-the-art in computer vision, supporting object detection, classification, and segmentation tasks (2019)"},{"issue":"3","key":"13_CR2","doi-asserted-by":"publisher","first-page":"47","DOI":"10.3390\/mti2030047","volume":"2","author":"M Bakator","year":"2018","unstructured":"Bakator, M., Radosav, D.: Deep learning and medical diagnosis: a review of literature. Multimodal Technol. Interact. 2(3), 47 (2018)","journal-title":"Multimodal Technol. Interact."},{"key":"13_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2023\/2039217","volume":"2023","author":"S Balasubramaniam","year":"2023","unstructured":"Balasubramaniam, S., et al.: Optimization enabled deep learning-based ddos attack detection in cloud computing. Int. J. Intell. Syst. 2023, 1\u201316 (2023)","journal-title":"Int. J. Intell. Syst."},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Barni, M., Kallas, K., Tondi, B.: A new backdoor attack in CNNS by training set corruption without label poisoning. In: ICIP (2019)","DOI":"10.1109\/ICIP.2019.8802997"},{"key":"13_CR5","unstructured":"Carlini, N., et al.: On evaluating adversarial robustness. CoRR arxiv:1902.06705 (2019)"},{"key":"13_CR6","unstructured":"Chen, B., et al.: Detecting backdoor attacks on deep neural networks by activation clustering. In: Workshop on Artificial Intelligence Safety, vol.\u00a02301 (2019)"},{"key":"13_CR7","unstructured":"Chen, X., Liu, C., Li, B., Lu, K., Song, D.: Targeted backdoor attacks on deep learning systems using data poisoning. CoRR arxiv:1712.05526 (2017)"},{"key":"13_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2023\/5418398","volume":"2023","author":"Y Chen","year":"2023","unstructured":"Chen, Y., Ye, Z., Zhao, H., Wang, Y.: Feature-based graph backdoor attack in the node classification task. Int. J. Intell. Syst. 2023, 1\u201313 (2023)","journal-title":"Int. J. Intell. Syst."},{"key":"13_CR9","unstructured":"Conti, M., Farronato, N., Koffas, S., Pajola, L., Picek, S.: Invisible threats: backdoor attack in OCR systems. CoRR arxiv:2310.08259 (2023)"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Doan, K.D., Lao, Y., Zhao, W., Li, P.: LIRA: learnable, imperceptible and robust backdoor attacks. In: Proceedings of the International Conference on Computer Vision, pp. 11946\u201311956 (2021)","DOI":"10.1109\/ICCV48922.2021.01175"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Dong, T., Zhang, Z., Qiu, H., Zhang, T., Li, H., Wang, T.: Mind your heart: stealthy backdoor attack on dynamic deep neural network in edge computing. In: IEEE INFOCOM 2023 - IEEE Conference on Computer Communications, New York City, NY, USA, 17\u201320 May 2023, pp. 1\u201310 (2023)","DOI":"10.1109\/INFOCOM53939.2023.10229092"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Dong, Y., et al.: Black-box detection of backdoor attacks with limited information and data. In: ICCV (2021)","DOI":"10.1109\/ICCV48922.2021.01617"},{"key":"13_CR13","unstructured":"Dosovitskiy, A., et al.: An image is worth 16x16 words: transformers for image recognition at scale. In: 9th International Conference on Learning Representations, ICLR (2021)"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Duan, R., et al.: Adversarial laser beam: effective physical-world attack to dnns in a blink. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 16062\u201316071 (2021)","DOI":"10.1109\/CVPR46437.2021.01580"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Gao, Y., Xu, C., Wang, D., Chen, S., Ranasinghe, D.C., Nepal, S.: STRIP: a defence against trojan attacks on deep neural networks. In: Proceedings of the 35th Annual Computer Security Applications Conference, ACSAC 2019, San Juan, PR, USA, 09\u201313 December 2019, pp. 113\u2013125 (2019)","DOI":"10.1145\/3359789.3359790"},{"key":"13_CR16","unstructured":"Gu, T., Dolan-Gavitt, B., Garg, S.: Badnets: identifying vulnerabilities in the machine learning model supply chain. CoRR arxiv:1708.06733 (2017)"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Han, X., Xu, G., Zhou, Y., Yang, X., Li, J., Zhang, T.: Physical backdoor attacks to lane detection systems in autonomous driving. In: The 30th ACM International Conference on Multimedia (2022)","DOI":"10.1145\/3503161.3548171"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"13_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103523","volume":"136","author":"Y He","year":"2024","unstructured":"He, Y., Shen, Z., Xia, C., Hua, J., Tong, W., Zhong, S.: SGBA: a stealthy scapegoat backdoor attack against deep neural networks. Comput. Secur. 136, 103523 (2024)","journal-title":"Comput. Secur."},{"issue":"6","key":"13_CR20","doi-asserted-by":"publisher","first-page":"2465","DOI":"10.1002\/int.22387","volume":"36","author":"Y Huang","year":"2021","unstructured":"Huang, Y., Shih, L., Tsai, C., Shen, G.: Describing video scenarios using deep learning techniques. Int. J. Intell. Syst. 36(6), 2465\u20132490 (2021)","journal-title":"Int. J. Intell. Syst."},{"key":"13_CR21","unstructured":"Huang, Y., Chen, Y.: Autonomous driving with deep learning: a survey of state-of-art technologies. CoRR arxiv:2006.06091 (2020)"},{"key":"13_CR22","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. In: ICLR (2015)"},{"key":"13_CR23","unstructured":"Li, H., et al.: Light can hack your face! black-box backdoor attack on face recognition systems. CoRR arxiv:2009.06996 (2020)"},{"key":"13_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104101","volume":"148","author":"Q Li","year":"2025","unstructured":"Li, Q., Chen, W., Xu, X., Zhang, Y., Wu, L.: Precision strike: precise backdoor attack with dynamic trigger. Comput. Secur. 148, 104101 (2025)","journal-title":"Comput. Secur."},{"key":"13_CR25","unstructured":"Li, Y., Jiang, Y., Li, Z., Xia, S.T.: Backdoor learning: a survey. IEEE Trans. Neural Netw. Learn. Syst. (2022)"},{"key":"13_CR26","unstructured":"Li, Y., Zhai, T., Jiang, Y., Li, Z., Xia, S.: Backdoor attack in the physical world. CoRR arxiv:2104.02361 (2021)"},{"key":"13_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2023\/6357750","volume":"2023","author":"W Lian","year":"2023","unstructured":"Lian, W., Zhang, Y., Chen, X., Jia, B., Zhang, X.: Ipcadp-equalizer: an improved multibalance privacy preservation scheme against backdoor attacks in federated learning. Int. J. Intell. Syst. 2023, 1\u201320 (2023)","journal-title":"Int. J. Intell. Syst."},{"key":"13_CR28","doi-asserted-by":"crossref","unstructured":"Lin, J., Xu, L., Liu, Y., Zhang, X.: Composite backdoor attack for deep neural network by mixing existing benign features. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 113\u2013131 (2020)","DOI":"10.1145\/3372297.3423362"},{"key":"13_CR29","doi-asserted-by":"crossref","unstructured":"Liu, Y., et al.: Trojaning attack on neural networks. In: 25th Annual Network and Distributed System Security Symposium, NDSS (2018)","DOI":"10.14722\/ndss.2018.23291"},{"key":"13_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/978-3-030-58607-2_11","volume-title":"Computer Vision \u2013 ECCV 2020","author":"Y Liu","year":"2020","unstructured":"Liu, Y., Ma, X., Bailey, J., Lu, F.: Reflection backdoor: a natural backdoor attack on deep neural networks. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12355, pp. 182\u2013199. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58607-2_11"},{"key":"13_CR31","doi-asserted-by":"crossref","unstructured":"Liu, Y., Xie, Y., Srivastava, A.: Neural trojans. In: 2017 IEEE International Conference on Computer Design, pp. 45\u201348. IEEE (2017)","DOI":"10.1109\/ICCD.2017.16"},{"key":"13_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.101869","volume":"99","author":"A Mehrish","year":"2023","unstructured":"Mehrish, A., Majumder, N., Bharadwaj, R., Mihalcea, R., Poria, S.: A review of deep learning techniques for speech processing. Inf. Fusion 99, 101869 (2023)","journal-title":"Inf. Fusion"},{"key":"13_CR33","unstructured":"Nguyen, T.A., Tran, A.T.: Input-aware dynamic backdoor attack. In: Annual Conference on Neural Information Processing Systems (2020)"},{"issue":"10","key":"13_CR34","doi-asserted-by":"publisher","first-page":"4742","DOI":"10.3390\/s23104742","volume":"23","author":"T Oyama","year":"2023","unstructured":"Oyama, T., Okura, S., Yoshida, K., Fujino, T.: Backdoor attack on deep neural networks triggered by fault injection attack on image sensor interface. Sensors 23(10), 4742 (2023)","journal-title":"Sensors"},{"key":"13_CR35","unstructured":"Pan, X., Zhang, M., Sheng, B., Zhu, J., Yang, M.: Hidden trigger backdoor attack on NLP models via linguistic style manipulation. In: 31st USENIX Security Symposium, pp. 3611\u20133628 (2022)"},{"key":"13_CR36","doi-asserted-by":"crossref","unstructured":"Rakin, A.S., He, Z., Fan, D.: TBT: targeted neural network attack with bit trojan. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 13198\u201313207 (2020)","DOI":"10.1109\/CVPR42600.2020.01321"},{"key":"13_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-3-030-29726-8_18","volume-title":"Machine Learning and Knowledge Extraction","author":"H Rehman","year":"2019","unstructured":"Rehman, H., Ekelhart, A., Mayer, R.: Backdoor attacks in neural networks \u2013 a systematic evaluation on multiple traffic sign datasets. In: Holzinger, A., Kieseberg, P., Tjoa, A.M., Weippl, E. (eds.) CD-MAKE 2019. LNCS, vol. 11713, pp. 285\u2013300. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-29726-8_18"},{"key":"13_CR38","unstructured":"Sun, W., Jiang, X., Li, D., Zhao, C.: Diffphysba: diffusion-based physical backdoor attack against person re-identification in real-world. arXiv preprint arXiv:2405.19990 (2024)"},{"key":"13_CR39","doi-asserted-by":"crossref","unstructured":"Sun, Z., Du, X., Song, F., Li, L.: Codemark: imperceptible watermarking for code datasets against neural code completion models. In: Chandra, S., Blincoe, K., Tonella, P. (eds.) Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC\/FSE), pp. 1561\u20131572 (2023)","DOI":"10.1145\/3611643.3616297"},{"key":"13_CR40","doi-asserted-by":"crossref","unstructured":"Sun, Z., Du, X., Song, F., Ni, M., Li, L.: Coprotector: protect open-source code against unauthorized training usage with data poisoning. In: The ACM Web Conference, pp. 652\u2013660 (2022)","DOI":"10.1145\/3485447.3512225"},{"key":"13_CR41","doi-asserted-by":"crossref","unstructured":"Szegedy, C., et al.: Going deeper with convolutions. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR, pp.\u00a01\u20139 (2015)","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"13_CR42","doi-asserted-by":"crossref","unstructured":"Tang, R., Du, M., Liu, N., Yang, F., Hu, X.: An embarrassingly simple approach for trojan attack in deep neural networks. In: Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 218\u2013228 (2020)","DOI":"10.1145\/3394486.3403064"},{"key":"13_CR43","unstructured":"Tran, B., Li, J., Madry, A.: Spectral signatures in backdoor attacks. In: Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, NeurIPS 2018, Montr\u00e9al, Canada, 3\u20138 December 2018, pp. 8011\u20138021 (2018)"},{"key":"13_CR44","unstructured":"Turner, A., Tsipras, D., Madry, A.: Label-consistent backdoor attacks. CoRR arxiv:1912.02771 (2019)"},{"key":"13_CR45","doi-asserted-by":"crossref","unstructured":"Wang, B., et al.: Neural cleanse: identifying and mitigating backdoor attacks in neural networks. In: IEEE Symposium on Security and Privacy, pp. 707\u2013723. IEEE (2019)","DOI":"10.1109\/SP.2019.00031"},{"key":"13_CR46","doi-asserted-by":"crossref","unstructured":"Wei, H., Yu, H., Zhang, K., Wang, Z., Zhu, J., Wang, Z.: Moir\u00e9 backdoor attack (MBA): a novel trigger for pedestrian detectors in the physical world. In: Proceedings of the 31st ACM International Conference on Multimedia (2023)","DOI":"10.1145\/3581783.3611910"},{"key":"13_CR47","doi-asserted-by":"crossref","unstructured":"Wenger, E., Passananti, J., Bhagoji, A.N., Yao, Y., Zheng, H., Zhao, B.Y.: Backdoor attacks against deep learning systems in the physical world. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 6206\u20136215 (2021)","DOI":"10.1109\/CVPR46437.2021.00614"},{"key":"13_CR48","doi-asserted-by":"crossref","unstructured":"Yao, Y., Li, H., Zheng, H., Zhao, B.Y.: Latent backdoor attacks on deep neural networks. In: CCS, pp. 2041\u20132055 (2019)","DOI":"10.1145\/3319535.3354209"},{"issue":"3","key":"13_CR49","doi-asserted-by":"publisher","first-page":"2567","DOI":"10.1002\/int.22785","volume":"37","author":"X Yu","year":"2022","unstructured":"Yu, X., et al.: A multitarget backdooring attack on deep neural networks with random location trigger. Int. J. Intell. Syst. 37(3), 2567\u20132583 (2022)","journal-title":"Int. J. Intell. Syst."},{"key":"13_CR50","doi-asserted-by":"crossref","unstructured":"Zhai, T., Li, Y., Zhang, Z., Wu, B., Jiang, Y., Xia, S.: Backdoor attack against speaker verification. In: IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 2560\u20132564 (2021)","DOI":"10.1109\/ICASSP39728.2021.9413468"},{"key":"13_CR51","doi-asserted-by":"crossref","unstructured":"Zhang, X., Liu, A., Zhang, T., Liang, S., Liu, X.: Towards robust physical-world backdoor attacks on lane detection. In: Proceedings of the 32nd ACM International Conference on Multimedia, MM (2024)","DOI":"10.1145\/3664647.3680766"},{"key":"13_CR52","doi-asserted-by":"publisher","unstructured":"Zhang, Y., Chen, G., Song, F., Sun, J., Dong, J.S.: Certified quantization strategy synthesis for neural networks. In: 26th International Symposium on Formal Methods. Lecture Notes in Computer Science, vol. 14933, pp. 343\u2013362. Springer, Heidelberg (2024). https:\/\/doi.org\/10.1007\/978-3-031-71162-6_18","DOI":"10.1007\/978-3-031-71162-6_18"},{"key":"13_CR53","doi-asserted-by":"crossref","unstructured":"Zhao, Z., et al.: Attack as detection: using adversarial attack methods to detect abnormal examples. ACM Trans. Softw. Eng. Methodol. 33(3), 68:1\u201368:45 (2024)","DOI":"10.1145\/3631977"},{"key":"13_CR54","doi-asserted-by":"crossref","unstructured":"Zhao, Z., Chen, G., Wang, J., Yang, Y., Song, F., Sun, J.: Attack as defense: characterizing adversarial examples using robustness. In: Cadar, C., Zhang, X. (eds.) Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), pp. 42\u201355. ACM (2021)","DOI":"10.1145\/3460319.3464822"},{"key":"13_CR55","doi-asserted-by":"crossref","unstructured":"Zhong, H., Liao, C., Squicciarini, A.C., Zhu, S., Miller, D.: Backdoor embedding in convolutional neural network models via invisible perturbation. In: Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy, pp. 97\u2013108 (2020)","DOI":"10.1145\/3374664.3375751"},{"key":"13_CR56","doi-asserted-by":"crossref","unstructured":"Zhu, Z., Liang, D., Zhang, S., Huang, X., Li, B., Hu, S.: Traffic-sign detection and classification in the wild. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2110\u20132118 (2016)","DOI":"10.1109\/CVPR.2016.232"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-95767-3_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T12:25:29Z","timestamp":1750335929000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-95767-3_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031957666","9783031957673"],"references-count":56,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-95767-3_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"20 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors\u00a0have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"ACNS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applied Cryptography and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Munich","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acns2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/acns2025.fordaysec.de\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}