{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:16:01Z","timestamp":1773155761447,"version":"3.50.1"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001839","name":"University Grants Committee","doi-asserted-by":"publisher","award":["11202320"],"award-info":[{"award-number":["11202320"]}],"id":[{"id":"10.13039\/501100001839","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Comput Vis"],"published-print":{"date-parts":[[2024,5]]},"DOI":"10.1007\/s11263-023-01934-3","type":"journal-article","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T14:02:34Z","timestamp":1701352954000},"page":"1592-1624","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":34,"title":["A Comprehensive Study of the Robustness for LiDAR-Based 3D Object Detectors Against Adversarial Attacks"],"prefix":"10.1007","volume":"132","author":[{"given":"Yifan","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3431-2021","authenticated-orcid":false,"given":"Junhui","family":"Hou","sequence":"additional","affiliation":[]},{"given":"Yixuan","family":"Yuan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,30]]},"reference":[{"key":"1934_CR1","doi-asserted-by":"crossref","unstructured":"Abdelfattah, M., Yuan, K., Wang, Z. J., & Ward, R. (2021). Adversarial attacks on camera-lidar models for 3D car detection. In 2021 IEEE\/RSJ international conference on intelligent robots and systems (IROS) (pp. 2189\u20132194). IEEE.","DOI":"10.1109\/IROS51168.2021.9636638"},{"key":"1934_CR2","unstructured":"Athalye, A., Carlini, N., & Wagner, D. (2018). Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples. In International Conference on Machine Learning (Vol. 80, pp. 274\u2013283)."},{"key":"1934_CR3","doi-asserted-by":"crossref","unstructured":"Bri\u00f1\u00f3n-Arranz, L., Rakotovao, T., Creuzet, T., Karaoguz, C., & El-Hamzaoui, O. (2021). A methodology for analyzing the impact of crosstalk on lidar measurements. In Sensors (pp. 1\u20134). IEEE.","DOI":"10.1109\/SENSORS47087.2021.9639531"},{"key":"1934_CR4","doi-asserted-by":"crossref","unstructured":"Carlini, N., & Wagner, D. (2017). Towards evaluating the robustness of neural networks. In IEEE Symposium on Security and Privacy (pp. 39\u201357). IEEE.","DOI":"10.1109\/SP.2017.49"},{"issue":"1","key":"1934_CR5","doi-asserted-by":"publisher","first-page":"87","DOI":"10.5194\/isprs-archives-XLII-1-87-2018","volume":"42","author":"A Carrilho","year":"2018","unstructured":"Carrilho, A., Galo, M., & Dos Santos, R. C. (2018). Statistical outlier detection method for airborne lidar data. International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 42(1), 87\u201392.","journal-title":"International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences"},{"key":"1934_CR6","doi-asserted-by":"crossref","unstructured":"Chen, C., Chen, Z., Zhang, J., & Tao, D. (2022). Sasa: Semantics-augmented set abstraction for point-based 3d object detection. In Proceedings of the AAAI Conference on Artificial Intelligence (Vol. 1, pp. 221\u2013229).","DOI":"10.1609\/aaai.v36i1.19897"},{"key":"1934_CR7","doi-asserted-by":"crossref","unstructured":"Cheng, Z., Liang, J., Choi, H., Tao, G., Cao, Z., Liu, D., & Zhang, X. (2022). Physical attack on monocular depth estimation with optimal adversarial patches. In European conference on computer vision (pp. 514\u2013532). Springer.","DOI":"10.1007\/978-3-031-19839-7_30"},{"key":"1934_CR8","doi-asserted-by":"crossref","unstructured":"Choi, J., Song, Y., & Kwak, N. (2021). Part-aware data augmentation for 3d object detection in point cloud. In IEEE\/RSJ International Conference on Intelligent Robots and Systems (pp. 3391\u20133397).","DOI":"10.1109\/IROS51168.2021.9635887"},{"key":"1934_CR9","doi-asserted-by":"crossref","unstructured":"Deng, J., Shi, S., Li, P., Zhou, W., Zhang, Y., & Li, H. (2021). Voxel r-cnn: Towards high performance voxel-based 3d object detection. In Proceedings of the AAAI conference on artificial intelligence (pp. 1201\u20131209).","DOI":"10.1609\/aaai.v35i2.16207"},{"key":"1934_CR10","doi-asserted-by":"crossref","unstructured":"Dong, X., Chen, D., Zhou, H., Hua, G., Zhang, W., & Yu, N. (2020). Self-robust 3d point recognition via gather-vector guidance. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (pp. 11513\u201311521). IEEE.","DOI":"10.1109\/CVPR42600.2020.01153"},{"key":"1934_CR11","doi-asserted-by":"crossref","unstructured":"Dong, Y., Liao, F., Pang, T., Su, H., Zhu, J., Hu, X., & Li, J. (2018). Boosting adversarial attacks with momentum. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (pp. 9185\u20139193)","DOI":"10.1109\/CVPR.2018.00957"},{"key":"1934_CR12","unstructured":"Dziugaite, G. K., Ghahramani, Z., & Roy, D. M. (2016). A study of the effect of jpg compression on adversarial images. arXiv preprint arXiv:1608.00853"},{"key":"1934_CR13","doi-asserted-by":"crossref","unstructured":"Geiger, A., Lenz, P., & Urtasun, R. (2012). Are we ready for autonomous driving? The kitti vision benchmark suite. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (pp. 3354\u20133361).","DOI":"10.1109\/CVPR.2012.6248074"},{"key":"1934_CR14","unstructured":"Goodfellow, I. J., Shlens, J., & Szegedy, C. (2014). Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572"},{"key":"1934_CR15","unstructured":"Guo, C., Rana, M., Cisse, M., & van\u00a0der Maaten, L. (2018). Countering adversarial images using input transformations. In International conference on learning representations"},{"key":"1934_CR16","doi-asserted-by":"crossref","unstructured":"Hahner, M., Sakaridis, C., Bijelic, M., Heide, F., Yu, F., Dai, D., & Van\u00a0Gool, L. (2022). Lidar snowfall simulation for robust 3d object detection. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (pp. 16364\u201316374).","DOI":"10.1109\/CVPR52688.2022.01588"},{"key":"1934_CR17","doi-asserted-by":"crossref","unstructured":"Hamdi, A., Rojas, S., Thabet, A., & Ghanem, B. (2020). Advpc: Transferable adversarial perturbations on 3d point clouds. In European conference on computer vision (pp. 241\u2013257). Springer.","DOI":"10.1007\/978-3-030-58610-2_15"},{"key":"1934_CR18","doi-asserted-by":"crossref","unstructured":"He, C., Zeng, H., Huang, J., Hua, X. S., & Zhang, L. (2020). Structure aware single-stage 3d object detection from point cloud. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (pp. 11870\u201311879).","DOI":"10.1109\/CVPR42600.2020.01189"},{"key":"1934_CR19","doi-asserted-by":"crossref","unstructured":"Herrmann, C., Sargent, K., Jiang, L., Zabih, R., Chang, H., Liu, C., Krishnan, D., & Sun, D. (2022). Pyramid adversarial training improves vit performance. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (pp. 13419\u201313429).","DOI":"10.1109\/CVPR52688.2022.01306"},{"key":"1934_CR20","unstructured":"Hu, J. S., Kuai, T., & Waslander, S. L. (2022a). Point density-aware voxels for lidar 3d object detection. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (pp. 8469\u20138478)."},{"key":"1934_CR21","doi-asserted-by":"crossref","unstructured":"Hu, S., Zhang, J., Liu, W., Hou, J., Li, M., Zhang, L. Y., Jin, H., & Sun, L. (2023). Pointca: Evaluating the robustness of 3d point cloud completion models against adversarial examples. In Proceedings of the AAAI conference on artificial intelligence (Vol. 37, pp. 872\u2013880).","DOI":"10.1609\/aaai.v37i1.25166"},{"key":"1934_CR22","doi-asserted-by":"crossref","unstructured":"Hu, Z., Huang, S., Zhu, X., Sun, F., Zhang, B., & Hu, X. (2022b). Adversarial texture for fooling person detectors in the physical world. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (pp. 13307\u201313316).","DOI":"10.1109\/CVPR52688.2022.01295"},{"key":"1934_CR23","doi-asserted-by":"crossref","unstructured":"Jia, J., Cao, X., & Gong, N. Z. (2021). Intrinsic certified robustness of bagging against data poisoning attacks. In Proceedings of the AAAI conference on artificial intelligence (Vol. 35, pp. 7961\u20137969).","DOI":"10.1609\/aaai.v35i9.16971"},{"key":"1934_CR24","first-page":"5","volume":"9","author":"A Kerckhoffs","year":"1883","unstructured":"Kerckhoffs, A. (1883). La cryptographie militaire. Journal des sciences militaires, 9, 5\u201338.","journal-title":"Journal des sciences militaires"},{"key":"1934_CR25","doi-asserted-by":"crossref","unstructured":"Kong, L., Liu, Y., Li, X., Chen, R., Zhang, W., Ren, J., Pan, L., Chen, K., & Liu, Z. (2023). Robo3d: Towards robust and reliable 3d perception against corruptions. arXiv preprint arXiv:2303.17597","DOI":"10.1109\/ICCV51070.2023.01830"},{"key":"1934_CR26","unstructured":"Kurakin, A., Goodfellow, I. J., & Bengio, S. (2017). Adversarial machine learning at scale. In International Conference on Learning Representations."},{"key":"1934_CR27","doi-asserted-by":"crossref","unstructured":"Kurakin, A., Goodfellow, I. J., & Bengio, S. (2018). Adversarial examples in the physical world. In Artificial intelligence safety and security (pp. 99\u2013112). Chapman and Hall\/CRC.","DOI":"10.1201\/9781351251389-8"},{"key":"1934_CR28","doi-asserted-by":"crossref","unstructured":"Lang, A., Vora, S., Caesar, H., Zhou, L., Yang, J., & Beijbom, O. (2019a). Pointpillars: Fast encoders for object detection from point clouds. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (pp. 12689\u201312697).","DOI":"10.1109\/CVPR.2019.01298"},{"key":"1934_CR29","doi-asserted-by":"crossref","unstructured":"Lang, A. H., Vora, S., Caesar, H., Zhou, L., Yang, J., & Beijbom, O. (2019b). Pointpillars: Fast encoders for object detection from point clouds. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (pp. 12697\u201312705).","DOI":"10.1109\/CVPR.2019.01298"},{"key":"1934_CR30","doi-asserted-by":"crossref","unstructured":"Lehner, A., Gasperini, S., Marcos-Ramiro, A., Schmidt, M., Mahani, M. A. N., Navab, N., Busam, B., & Tombari, F. (2022). 3d-vfield: Adversarial augmentation of point clouds for domain generalization in 3d object detection. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (pp. 17295\u201317304).","DOI":"10.1109\/CVPR52688.2022.01678"},{"key":"1934_CR31","unstructured":"Li, B., Chen, C., Wang, W., & Carin, L. (2019). Certified adversarial robustness with additive noise. In Advances in neural information processing systems (p. 32)."},{"key":"1934_CR32","doi-asserted-by":"crossref","unstructured":"Lin, T. Y., Goyal, P., Girshick, R., He, K., & Doll\u00e1r, P. (2017). Focal loss for dense object detection. In Proceedings of the IEEE\/CVF international conference on computer vision (pp. 2980\u20132988).","DOI":"10.1109\/ICCV.2017.324"},{"key":"1934_CR33","first-page":"4727","volume":"45","author":"D Liu","year":"2022","unstructured":"Liu, D., & Hu, W. (2022). Imperceptible transfer attack and defense on 3d point cloud classification. IEEE Transactions on Pattern Analysis and Machine Intelligence, 45, 4727\u20134746.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"1934_CR34","doi-asserted-by":"crossref","unstructured":"Liu, D., Yu, R., & Su, H. (2019). Extending adversarial attacks and defenses to deep 3d point cloud classifiers. In 2019 IEEE international conference on image processing (ICIP) (pp. 2279\u20132283). IEEE.","DOI":"10.1109\/ICIP.2019.8803770"},{"key":"1934_CR35","doi-asserted-by":"crossref","unstructured":"Liu, D., Yu, R., & Su, H. (2020). Adversarial shape perturbations on 3d point clouds. In European conference on computer vision (pp. 88\u2013104). Springer.","DOI":"10.1007\/978-3-030-66415-2_6"},{"key":"1934_CR36","doi-asserted-by":"crossref","unstructured":"Liu, H., Jia, J., & Gong, N. Z. (2021). Pointguard: Provably robust 3d point cloud classification. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (pp. 6186\u20136195).","DOI":"10.1109\/CVPR46437.2021.00612"},{"key":"1934_CR37","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., & Vladu, A. (2018). Towards deep learning models resistant to adversarial attacks. In International conference on learning representations (pp. 1\u201328)."},{"issue":"11","key":"1934_CR38","doi-asserted-by":"publisher","first-page":"2640","DOI":"10.1109\/TIFS.2017.2718479","volume":"12","author":"M Osadchy","year":"2017","unstructured":"Osadchy, M., Hernandez-Castro, J., Gibson, S., Dunkelman, O., & P\u00e9rez-Cabo, D. (2017). No bot expects the deepcaptcha! introducing immutable adversarial examples, with applications to captcha generation. IEEE Transactions on Information Forensics and Security, 12(11), 2640\u20132653.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1934_CR39","unstructured":"Paszke, A., Gross, S., Massa, F., Lerer, A., Bradbury, J., Chanan, G., Killeen, T., Lin, Z., Gimelshein, N., Antiga, L., Desmaison, A., K\u00f6pf, A., Yang, E. Z., DeVito, Z., Raison, M., Tejani, A., Chilamkurthy, S., Steiner, B., Fang, L., Bai, J., & Chintala, S. (2019). Pytorch: An imperative style, high-performance deep learning library. In H. M. Wallach, H. Larochelle, A. Beygelzimer, F. d\u2019Alch\u00e9-Buc, E. B. Fox, & R. Garnett (Eds.), Advances in neural information processing systems (pp. 8024\u20138035)."},{"key":"1934_CR40","unstructured":"Qi, C., Su, H., Mo, K., & Guibas, L. J. (2017). Pointnet: Deep learning on point sets for 3d classification and segmentation. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 652\u2013660)."},{"key":"1934_CR41","doi-asserted-by":"crossref","unstructured":"Shi, S., Guo, C., Jiang, L., Wang, Z., Shi, J., Wang, X., & Li, H. (2020a). Pv-rcnn: Point-voxel feature set abstraction for 3d object detection. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (pp. 10529\u201310538).","DOI":"10.1109\/CVPR42600.2020.01054"},{"key":"1934_CR42","doi-asserted-by":"crossref","unstructured":"Shi, S., Wang, X., & Li, H. (2019). Pointrcnn: 3d object proposal generation and detection from point cloud. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (pp. 770\u2013779).","DOI":"10.1109\/CVPR.2019.00086"},{"key":"1934_CR43","doi-asserted-by":"crossref","unstructured":"Shi, S., Wang, Z., Shi, J., Wang, X., & Li, H. (2020b). From points to parts: 3d object detection from point cloud with part-aware and part-aggregation network. IEEE Transactions on Pattern Analysis and Machine Intelligence, 43(8), 2647\u20132664.","DOI":"10.1109\/TPAMI.2020.2977026"},{"key":"1934_CR44","unstructured":"Sun, J., Cao, Y., Chen, Q. A., & Mao, Z. M. (2020a). Towards robust $$\\{$$LiDAR-based$$\\}$$ perception in autonomous driving: General black-box adversarial sensor attack and countermeasures. In 29th USENIX Security Symposium (USENIX Security 20) (pp. 877\u2013894)."},{"key":"1934_CR45","first-page":"15498","volume":"34","author":"J Sun","year":"2021","unstructured":"Sun, J., Cao, Y., Choy, C. B., Yu, Z., Anandkumar, A., Mao, Z. M., & Xiao, C. (2021). Adversarially robust 3d point cloud recognition using self-supervisions. Advances in Neural Information Processing Systems, 34, 15498\u201315512.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"1934_CR46","doi-asserted-by":"crossref","unstructured":"Sun, P., Kretzschmar, H., Dotiwalla, X., Chouard, A., Patnaik, V., Tsui, P., Guo, J., Zhou, Y., Chai, Y., Caine, B., Vasudevan, V., Han, W., Ngiam, J., Zhao, H., Timofeev, A., Ettinger, S., Krivokon, M., Gao, A., Joshi, A., Zhange, Y., Shlens, J., Chen, Z., & Anguelov, D. (2020b). Scalability in perception for autonomous driving: Waymo open dataset. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (pp. 2443\u20132451).","DOI":"10.1109\/CVPR42600.2020.00252"},{"key":"1934_CR47","unstructured":"Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I., & Fergus, R. (2013). Intriguing properties of neural networks. In International conference on learning representations (pp. 1\u201310)."},{"key":"1934_CR48","unstructured":"Tram\u00e8r, F., Kurakin, A., Papernot, N., Goodfellow, I., Boneh, D., & McDaniel, P. (2018). Ensemble adversarial training: Attacks and defenses. In International conference on learning representations."},{"key":"1934_CR49","doi-asserted-by":"crossref","unstructured":"Tsai, T., Yang, K., Ho, T. Y., & Jin, Y. (2020). Robust adversarial objects against deep learning models. In Proceedings of the AAAI conference on artificial intelligence (Vol. 34, pp. 954\u2013962).","DOI":"10.1609\/aaai.v34i01.5443"},{"key":"1934_CR50","unstructured":"Tu, J., Li, H., Yan, X., Ren, M., Chen, Y., Liang, M., Bitar, E., Yumer, E., & Urtasun, R. (2021). Exploring adversarial robustness of multi-sensor perception systems in self driving. In 5th annual conference on robot learning (pp. 1\u201312)."},{"key":"1934_CR51","doi-asserted-by":"crossref","unstructured":"Tu, J., Ren, M., Manivasagam, S., Liang, M., Yang, B., Du, R., Cheng, F., & Urtasun, R. (2020). Physically realizable adversarial examples for lidar object detection. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, computer vision foundation (pp. 13713\u201313722). IEEE.","DOI":"10.1109\/CVPR42600.2020.01373"},{"key":"1934_CR52","doi-asserted-by":"publisher","first-page":"2984","DOI":"10.1109\/TPAMI.2020.3044712","volume":"44","author":"Y Wen","year":"2020","unstructured":"Wen, Y., Lin, J., Chen, K., Chen, C. P., & Jia, K. (2020). Geometry-aware generation of adversarial point clouds. IEEE Transactions on Pattern Analysis and Machine Intelligence, 44, 2984\u20132999.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"1934_CR53","doi-asserted-by":"crossref","unstructured":"Wicker, M., & Kwiatkowska, M. (2019). Robustness of 3d deep learning in an adversarial setting. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (pp. 11767\u201311775).","DOI":"10.1109\/CVPR.2019.01204"},{"key":"1934_CR54","doi-asserted-by":"crossref","unstructured":"Xiang, C., Qi, C. R., & Li, B. (2019). Generating 3d adversarial point clouds. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (pp. 9136\u20139144).","DOI":"10.1109\/CVPR.2019.00935"},{"key":"1934_CR55","doi-asserted-by":"crossref","unstructured":"Xu, W., Evans, D., & Qi, Y. (2017). Feature squeezing: Detecting adversarial examples in deep neural networks. arXiv preprint arXiv:1704.01155","DOI":"10.14722\/ndss.2018.23198"},{"issue":"10","key":"1934_CR56","doi-asserted-by":"publisher","first-page":"3337","DOI":"10.3390\/s18103337","volume":"18","author":"Y Yan","year":"2018","unstructured":"Yan, Y., Mao, Y., & Li, B. (2018). Second: Sparsely embedded convolutional detection. Sensors, 18(10), 3337.","journal-title":"Sensors"},{"key":"1934_CR57","doi-asserted-by":"crossref","unstructured":"Yang, Z., Sun, Y., Liu, S., & Jia, J. (2020). 3dssd: Point-based 3d single stage object detector. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (pp. 11040\u201311048).","DOI":"10.1109\/CVPR42600.2020.01105"},{"key":"1934_CR58","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Hu, Q., Xu, G., Ma, Y., Wan, J., & Guo, Y. (2022). Not all points are equal: Learning highly efficient point-based detectors for 3d lidar point clouds. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (pp. 18953\u201318962).","DOI":"10.1109\/CVPR52688.2022.01838"},{"key":"1934_CR59","doi-asserted-by":"crossref","unstructured":"Zheng, T., Chen, C., Yuan, J., Li, B., & Ren, K. (2019). Pointcloud saliency maps. In Proceedings of the IEEE\/CVF international conference on computer vision (pp. 1598\u20131606).","DOI":"10.1109\/ICCV.2019.00168"},{"key":"1934_CR60","doi-asserted-by":"crossref","unstructured":"Zhou, H., Chen, K., Zhang, W., Fang, H., Zhou, W., & Yu, N. (2019). Dup-net: Denoiser and upsampler network for 3d adversarial point clouds defense. In Proceedings of the IEEE\/CVF international conference on computer vision (pp. 1961\u20131970).","DOI":"10.1109\/ICCV.2019.00205"},{"key":"1934_CR61","doi-asserted-by":"crossref","unstructured":"Zhou, Y., & Tuzel, O. (2018). Voxelnet: End-to-end learning for point cloud based 3d object detection. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (pp. 4490\u20134499).","DOI":"10.1109\/CVPR.2018.00472"}],"container-title":["International Journal of Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11263-023-01934-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11263-023-01934-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11263-023-01934-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,7]],"date-time":"2024-05-07T08:12:29Z","timestamp":1715069549000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11263-023-01934-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,30]]},"references-count":61,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,5]]}},"alternative-id":["1934"],"URL":"https:\/\/doi.org\/10.1007\/s11263-023-01934-3","relation":{},"ISSN":["0920-5691","1573-1405"],"issn-type":[{"value":"0920-5691","type":"print"},{"value":"1573-1405","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,30]]},"assertion":[{"value":"16 December 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 November 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they do not have any commercial or associative interest that represents a conflict of interest in connection with the work submitted.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}