{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T14:57:27Z","timestamp":1776783447310,"version":"3.51.2"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,6,5]],"date-time":"2023-06-05T00:00:00Z","timestamp":1685923200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,5]],"date-time":"2023-06-05T00:00:00Z","timestamp":1685923200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"DOI":"10.1007\/s11416-023-00486-x","type":"journal-article","created":{"date-parts":[[2023,6,5]],"date-time":"2023-06-05T08:02:30Z","timestamp":1685952150000},"page":"363-373","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Potential cyber threats of adversarial attacks on autonomous driving models"],"prefix":"10.1007","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6375-0365","authenticated-orcid":false,"given":"Eldar","family":"Boltachev","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,5]]},"reference":[{"key":"486_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102150","volume":"103","author":"K Kim","year":"2021","unstructured":"Kim, K., Kim, J.S., Jeong, S., Park, J.H., Kim, H.K.: Cybersecurity for autonomous vehicles: review of attacks and defense. Comput. Secur. 103, 102150 (2021). https:\/\/doi.org\/10.1016\/j.cose.2020.102150","journal-title":"Comput. Secur."},{"key":"486_CR2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3055844","author":"Y Gao","year":"2021","unstructured":"Gao, Y., Kim, Y., Doan, B.G., Zhang, Z., Zhang, G., Nepal, S., Ranasinghe, D., Kim, H.: Design and evaluation of a multi-domain trojandetection method on deep neural networks. IEEE Trans. Depend. Secure Comput. (2021). https:\/\/doi.org\/10.1109\/TDSC.2021.3055844","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"486_CR3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3101289","author":"X Zhang","year":"2021","unstructured":"Zhang, X., Gupta, R., Mian, A., Rahnavard, N., Shah, M.: Cassandra: Detecting trojaned networks from adversarial perturbations. IEEE Access (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3101289","journal-title":"IEEE Access"},{"key":"486_CR4","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.tra.2021.07.012","volume":"152","author":"H Manivasakan","year":"2021","unstructured":"Manivasakan, H., Kalra, R., O\u2019Hern, S., Fang, Y., Xi, Y., Zheng, N.: Infrastructure requirement for autonomous vehicle integration for future urban and suburban roads - current practice and a case study of melbourne, australia. Transp. Res. Part A: Policy Pract. 152, 36\u201353 (2021). https:\/\/doi.org\/10.1016\/j.tra.2021.07.012","journal-title":"Transp. Res. Part A: Policy Pract."},{"key":"486_CR5","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.tra.2020.03.026","volume":"136","author":"D Lee","year":"2020","unstructured":"Lee, D., Hess, D.J.: Regulations for on-road testing of connected and automated vehicles: assessing the potential for global safety harmonization. Transp. Res. Part A Policy Pract. 136, 85\u201398 (2020). https:\/\/doi.org\/10.1016\/j.tra.2020.03.026","journal-title":"Transp. Res. Part A Policy Pract."},{"key":"486_CR6","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.2972974","author":"D Feng","year":"2021","unstructured":"Feng, D., Haase-Schutz, C., Rosenbaum, L., Hertlein, H., Glaser, C., Timm, F., Wiesbeck, W., Dietmayer, K.: Deep multi-modal object detection and semantic segmentation for autonomous driving: Datasets, methods, and challenges. IEEE Trans. Intell. Transp. Syst. (2021). https:\/\/doi.org\/10.1109\/TITS.2020.2972974","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"486_CR7","doi-asserted-by":"publisher","first-page":"207308","DOI":"10.1109\/ACCESS.2020.3037705","volume":"8","author":"A Chowdhury","year":"2020","unstructured":"Chowdhury, A., Karmakar, G., Kamruzzaman, J., Jolfaei, A., Das, R.: Attacks on self-driving cars and their countermeasures: a survey. IEEE Access 8, 207308\u2013207342 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3037705","journal-title":"IEEE Access"},{"key":"486_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102269","volume":"109","author":"M Pham","year":"2021","unstructured":"Pham, M., Xiong, K.: A survey on security attacks and defense techniques for connected and autonomous vehicles. Comput. Secur. 109, 102269 (2021). https:\/\/doi.org\/10.1016\/j.cose.2021.102269","journal-title":"Comput. Secur."},{"key":"486_CR9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3114024","author":"Y Wang","year":"2021","unstructured":"Wang, Y., Sarkar, E., Li, W., Maniatakos, M., Jabari, S.E.: Stop-and-go: Exploring backdoor attacks on deep reinforcement learning-based traffic congestion control systems. IEEE Trans. Inf. Forens. Secur. (2021). https:\/\/doi.org\/10.1109\/TIFS.2021.3114024","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"key":"486_CR10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3098675","author":"M Abdel-Basset","year":"2021","unstructured":"Abdel-Basset, M., Gamal, A., Moustafa, N., Abdel-Monem, A., El-Saber, N.: A security-by-design decision-making model for risk management in autonomous vehicles. IEEE Access (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3098675","journal-title":"IEEE Access"},{"key":"486_CR11","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3071405","author":"Y Deng","year":"2021","unstructured":"Deng, Y., Zhang, T., Lou, G., Zheng, X., Jin, J., Han, Q.L.: Deep learning-based autonomous driving systems: A survey of attacks and defenses. IEEE Trans. Ind. Inform. (2021). https:\/\/doi.org\/10.1109\/TII.2021.3071405","journal-title":"IEEE Trans. Ind. Inform."},{"key":"486_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2019.100199","volume":"34","author":"N Pitropakis","year":"2019","unstructured":"Pitropakis, N., Panaousis, E., Giannetsos, T., Anastasiadis, E., Loukas, G.: A taxonomy and survey of attacks against machine learning. Comput. Sci. Rev. 34, 100199 (2019). https:\/\/doi.org\/10.1016\/j.cosrev.2019.100199","journal-title":"Comput. Sci. Rev."},{"key":"486_CR13","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.engappai.2021.104211","volume":"104211","author":"O Sharma","year":"2021","unstructured":"Sharma, O., Sahoo, N.C., Puhan, N.B.: Recent advances in motion and behavior planning techniques for software architecture of autonomous vehicles: a state-of-the-art survey. Eng. Appl. Artif. Intell. 104211, 101 (2021). https:\/\/doi.org\/10.1016\/j.engappai.2021.104211","journal-title":"Eng. Appl. Artif. Intell."},{"key":"486_CR14","doi-asserted-by":"publisher","first-page":"1092","DOI":"10.1016\/j.future.2017.12.041","volume":"108","author":"GDL Torre","year":"2020","unstructured":"Torre, G.D.L., Rad, P., Choo, K.K.R.: Driverless vehicle security: challenges and future research opportunities. Future Gener. Comput. Syst. 108, 1092\u20131111 (2020). https:\/\/doi.org\/10.1016\/j.future.2017.12.041","journal-title":"Future Gener. Comput. Syst."},{"key":"486_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.12.006","volume":"90","author":"J Cui","year":"2019","unstructured":"Cui, J., Liew, L.S., Sabaliauskaite, G., Zhou, F.: A review on safety failures, security attacks, and available countermeasures for autonomous vehicles. Ad Hoc Netw. 90, 101823 (2019). https:\/\/doi.org\/10.1016\/j.adhoc.2018.12.006","journal-title":"Ad Hoc Netw."},{"key":"486_CR16","doi-asserted-by":"publisher","unstructured":"Liu, Y., Ma, X., Bailey, J., Lu, F.: Reflection backdoor: A natural backdoor attack on deep neural networks, vol. 12355 LNCS (2020). https:\/\/doi.org\/10.1007\/978-3-030-58607-2_11","DOI":"10.1007\/978-3-030-58607-2_11"},{"key":"486_CR17","doi-asserted-by":"publisher","DOI":"10.1049\/ipr2.12325","author":"X Chen","year":"2021","unstructured":"Chen, X., Ma, Y.N., Lu, S.W., Yao, Y.: Boundary augment: a data augment method to defend poison attack. IET Image Process. (2021). https:\/\/doi.org\/10.1049\/ipr2.12325","journal-title":"IET Image Process."},{"key":"486_CR18","doi-asserted-by":"publisher","unstructured":"Rehman, H., Ekelhart, A., Mayer, R.: Backdoor attacks in neural networks - a systematic evaluation on multiple traffic sign datasets, vol. 11713 LNCS (2019). https:\/\/doi.org\/10.1007\/978-3-030-29726-8_18","DOI":"10.1007\/978-3-030-29726-8_18"},{"key":"486_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102682","volume":"116","author":"Z Zhang","year":"2022","unstructured":"Zhang, Z., Huang, S., Liu, X., Zhang, B., Dong, D.: Adversarial attacks on yolact instance segmentation. Comput. Secur. 116, 102682 (2022). https:\/\/doi.org\/10.1016\/j.cose.2022.102682","journal-title":"Comput. Secur."},{"key":"486_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107388","volume":"180","author":"Q Zhang","year":"2020","unstructured":"Zhang, Q., Zhao, Y., Wang, Y., Baker, T., Zhang, J., Hu, J.: Towards cross-task universal perturbation against black-box object detectors in autonomous driving. Comput. Netw. 180, 107388 (2020). https:\/\/doi.org\/10.1016\/j.comnet.2020.107388","journal-title":"Comput. Netw."},{"key":"486_CR21","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3016145","author":"Y Li","year":"2021","unstructured":"Li, Y., Xu, X., Xiao, J., Li, S., Shen, H.T.: Adaptive square attack: fooling autonomous cars with adversarial traffic signs. IEEE Internet Things J. (2021). https:\/\/doi.org\/10.1109\/JIOT.2020.3016145","journal-title":"IEEE Internet Things J."},{"key":"486_CR22","doi-asserted-by":"publisher","unstructured":"Chen, S.T., Cornelius, C., Martin, J., Chau, D.H.P.: Shapeshifter: Robust physical adversarial attack on faster r-cnn object detector, vol. 11051 LNAI (2019). https:\/\/doi.org\/10.1007\/978-3-030-10925-7_4","DOI":"10.1007\/978-3-030-10925-7_4"},{"key":"486_CR23","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3024643","author":"X Xu","year":"2021","unstructured":"Xu, X., Zhang, J., Li, Y., Wang, Y., Yang, Y., Shen, H.T.: Adversarial attack against urban scene segmentation for autonomous vehicles. IEEE Trans. Ind. Inform. (2021). https:\/\/doi.org\/10.1109\/TII.2020.3024643","journal-title":"IEEE Trans. Ind. Inform."},{"key":"486_CR24","doi-asserted-by":"publisher","unstructured":"Andriushchenko, M., Croce, F., Flammarion, N., Hein, M.: Square attack: A query-efficient black-box adversarial attack via random search, vol. 12368 LNCS, (2020). https:\/\/doi.org\/10.1007\/978-3-030-58592-1_29","DOI":"10.1007\/978-3-030-58592-1_29"},{"key":"486_CR25","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1016\/j.tra.2018.06.033","volume":"124","author":"B Sheehan","year":"2019","unstructured":"Sheehan, B., Murphy, F., Mullins, M., Ryan, C.: Connected and autonomous vehicles: a cyber-risk classification framework. Transp. Res. Part A: Policy Pract. 124, 523\u2013536 (2019). https:\/\/doi.org\/10.1016\/j.tra.2018.06.033","journal-title":"Transp. Res. Part A: Policy Pract."},{"key":"486_CR26","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2020.3018329","author":"K Cheng","year":"2021","unstructured":"Cheng, K., Zhou, Y., Chen, B., Wang, R., Bai, Y., Liu, Y.: Guardauto: a decentralized runtime protection system for autonomous driving. IEEE Trans. Comput. (2021). https:\/\/doi.org\/10.1109\/TC.2020.3018329","journal-title":"IEEE Trans. Comput."},{"issue":"5","key":"486_CR27","doi-asserted-by":"publisher","first-page":"3443","DOI":"10.1109\/JIOT.2021.3099164","volume":"9","author":"J Zhang","year":"2022","unstructured":"Zhang, J., Lou, Y., Wang, J., Wu, K., Lu, K., Jia, X.: Evaluating adversarial attacks on driving safety in vision-based autonomous vehicles. IEEE Internet Things J. 9(5), 3443\u20133456 (2022). https:\/\/doi.org\/10.1109\/JIOT.2021.3099164","journal-title":"IEEE Internet Things J."},{"key":"486_CR28","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3135342","author":"Y He","year":"2021","unstructured":"He, Y., Huang, K., Zhang, G., Yu, F.R., Chen, J., Li, J.: Bift: A blockchain-based federated learning system for connected and autonomous vehicles. IEEE Internet Things J. (2021). https:\/\/doi.org\/10.1109\/JIOT.2021.3135342","journal-title":"IEEE Internet Things J."},{"key":"486_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.09.027","author":"X Wang","year":"2021","unstructured":"Wang, X., Cai, M., Sohel, F., Sang, N., Chang, Z.: Adversarial point cloud perturbations against 3d object detection in autonomous driving systems. Neurocomputing (2021). https:\/\/doi.org\/10.1016\/j.neucom.2021.09.027","journal-title":"Neurocomputing"},{"key":"486_CR30","doi-asserted-by":"publisher","DOI":"10.1002\/int.22349","author":"C Chen","year":"2021","unstructured":"Chen, C., Huang, T.: Camdar-adv: generating adversarial patches on 3d object. Int. J. Intell. Syst. (2021). https:\/\/doi.org\/10.1002\/int.22349","journal-title":"Int. J. Intell. Syst."},{"key":"486_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101766","volume":"110","author":"A Boloor","year":"2020","unstructured":"Boloor, A., Garimella, K., He, X., Gill, C., Vorobeychik, Y., Zhang, X.: Attacking vision-based perception in end-to-end autonomous driving models. J. Syst. Architect. 110, 101766 (2020). https:\/\/doi.org\/10.1016\/j.sysarc.2020.101766","journal-title":"J. Syst. Architect."},{"key":"486_CR32","doi-asserted-by":"publisher","DOI":"10.3390\/s22010126","author":"MKA Chy","year":"2022","unstructured":"Chy, M.K.A., Masum, A.K.M., Sayeed, K.A.M., Uddin, M.Z.: Delicar: A smart deep learning based self driving product delivery car in perspective of bangladesh. Sensors (2022). https:\/\/doi.org\/10.3390\/s22010126","journal-title":"Sensors"},{"key":"486_CR33","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2018.2886678","author":"Y Kang","year":"2019","unstructured":"Kang, Y., Yin, H., Berger, C.: Test your self-driving algorithm: an overview of publicly available driving datasets and virtual testing environments. IEEE Trans. Intell. Veh. (2019). https:\/\/doi.org\/10.1109\/TIV.2018.2886678","journal-title":"IEEE Trans. Intell. Veh."},{"key":"486_CR34","doi-asserted-by":"publisher","unstructured":"Huang, X., Wang, P., Cheng, X., Zhou, D., Geng, Q., Yang, R.: The apolloscape open dataset for autonomous driving and its application. IEEE Transactions on Pattern Analysis and Machine Intelligence, 42(2), (2020), https:\/\/doi.org\/10.1109\/TPAMI.2019.2926463","DOI":"10.1109\/TPAMI.2019.2926463"},{"key":"486_CR35","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3150906","author":"G Singh","year":"2022","unstructured":"Singh, G., Akrigg, S., Maio, M.D., Fontana, V., Alitappeh, R.J., Khan, S., Saha, S., Jeddisaravi, K., Yousefi, F., Culley, J., Nicholson, T., Omokeowa, J., Grazioso, S., Bradley, A., Gironimo, G.D., Cuzzolin, F.: Road: The road event awareness dataset for autonomous driving. IEEE Trans. Pattern Anal. Mach. Intell. (2022). https:\/\/doi.org\/10.1109\/TPAMI.2022.3150906","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"486_CR36","doi-asserted-by":"crossref","unstructured":"Yerznkyan, B., Gataullin, T., Gataullin, S.: Mathematical aspects of synergy. search.proquest.com. https:\/\/doi.org\/10.14254\/1800-5845\/2022.18-3.16","DOI":"10.14254\/1800-5845\/2022.18-3.16"},{"key":"486_CR37","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1134\/S0001434622110037","volume":"112","author":"TM Gataullin","year":"2022","unstructured":"Gataullin, T.M., Gataullin, S.T.: Endpoint functions: mathematical apparatus and economic applications. Math. Notes 112, 656\u2013663 (2022). https:\/\/doi.org\/10.1134\/S0001434622110037","journal-title":"Math. Notes"},{"key":"486_CR38","doi-asserted-by":"publisher","unstructured":"Barotov, D., Osipov, A., Korchagin, S., Pleshakova, E., Muzafarov, D., Barotov, R., Serdechnyy, D.: Transformation method for solving system of Boolean algebraic equations. Mathematics (2021). https:\/\/doi.org\/10.3390\/math9243299","DOI":"10.3390\/math9243299"},{"key":"486_CR39","doi-asserted-by":"publisher","DOI":"10.3390\/math9172171","author":"A Kositzyn","year":"2021","unstructured":"Kositzyn, A., Serdechnyy, D., Korchagin, S., Pleshakova, E., Nikitin, P., Kurileva, N.: Mathematical modeling, analysis and evaluation of the complexity of flight paths of groups of unmanned aerial vehicles in aviation and transport systems. Mathematics (2021). https:\/\/doi.org\/10.3390\/math9172171","journal-title":"Mathematics"},{"key":"486_CR40","doi-asserted-by":"publisher","DOI":"10.3390\/sym14010148","author":"N Andriyanov","year":"2022","unstructured":"Andriyanov, N., Khasanshin, I., Utkin, D., Gataullin, T., Ignar, S., Shumaev, V., Soloviev, V.: Intelligent system for estimation of the spatial position of apples based on yolov3 and real sense depth camera d415. Symmetry (2022). https:\/\/doi.org\/10.3390\/sym14010148","journal-title":"Symmetry"},{"key":"486_CR41","doi-asserted-by":"crossref","unstructured":"Maaz, M., Shaker, A., Cholakkal, H., Khan, S., Zamir, S.W., Anwer, R.M., Khan, F.S.: Edgenext: Efficiently amalgamated cnn-transformer architecture for mobile vision applications (2022)","DOI":"10.1007\/978-3-031-25082-8_1"}],"updated-by":[{"DOI":"10.1007\/s11416-023-00497-8","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2023,8,10]],"date-time":"2023-08-10T00:00:00Z","timestamp":1691625600000}}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00486-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-023-00486-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00486-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,9]],"date-time":"2025-01-09T10:09:13Z","timestamp":1736417353000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-023-00486-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,5]]},"references-count":41,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024,9]]}},"alternative-id":["486"],"URL":"https:\/\/doi.org\/10.1007\/s11416-023-00486-x","relation":{"correction":[{"id-type":"doi","id":"10.1007\/s11416-023-00497-8","asserted-by":"object"}]},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,5]]},"assertion":[{"value":"2 February 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 May 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 June 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 August 2023","order":4,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":5,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11416-023-00497-8","URL":"https:\/\/doi.org\/10.1007\/s11416-023-00497-8","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}