{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T09:58:53Z","timestamp":1730195933678,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,11]],"date-time":"2022-10-11T00:00:00Z","timestamp":1665446400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,11]],"date-time":"2022-10-11T00:00:00Z","timestamp":1665446400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,11]]},"DOI":"10.1109\/aipr57179.2022.10092221","type":"proceedings-article","created":{"date-parts":[[2023,4,10]],"date-time":"2023-04-10T19:01:19Z","timestamp":1681153279000},"page":"1-6","source":"Crossref","is-referenced-by-count":5,"title":["Adversarial Examples in Self-Driving: A Review of Available Datasets and Attacks"],"prefix":"10.1109","author":[{"given":"Mohammad R.","family":"Alam","sequence":"first","affiliation":[{"name":"The MITRE Corporation,San Diego,CA,USA"}]},{"given":"Chris M.","family":"Ward","sequence":"additional","affiliation":[{"name":"The MITRE Corporation,San Diego,CA,USA"}]}],"member":"263","reference":[{"issue":"5","key":"ref1","article-title":"Review of artificial intelligence adversarial attack and defense technologies","volume-title":"Applied Sciences","volume":"9","author":"Qiu","year":"2019"},{"article-title":"Apricot: A dataset of physical adversarial attacks on object detection","year":"2019","author":"Braunegg","key":"ref2"},{"article-title":"Making an invisibility cloak: Real world adversarial attacks on object detectors","year":"2019","author":"Wu","key":"ref3"},{"key":"ref4","first-page":"107388","article-title":"Towards cross-task universal perturbation against black-box object detectors in autonomous driving","volume-title":"Computer Networks","volume":"180","author":"Zhang","year":"2020"},{"article-title":"Intriguing properties of neural networks","year":"2013","author":"Szegedy","key":"ref5"},{"article-title":"Top 10 companies developing autonomous vehicle technology","year":"2022","author":"Gray","key":"ref6"},{"year":"2021","key":"ref7","article-title":"Autonomous vehicles factsheet"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2962338"},{"key":"ref9","first-page":"113816","article-title":"Self-driving cars: A survey","volume-title":"Expert Systems with Applications","volume":"165","author":"Badue","year":"2021"},{"key":"ref10","article-title":"Adversarial threat landscape for artificial-intelligence systems"},{"issue":"1","key":"ref11","article-title":"Attacks to automatous vehicles: A deep learning algorithm for cybersecurity","volume-title":"Sensors","volume":"22","author":"Aldhyani","year":"2022"},{"key":"ref12","first-page":"35","article-title":"Deep learning for self-driving cars: Chances and challenges","volume-title":"2018 IEEE\/ACM 1st International Workshop on Software Engineering for AI in Autonomous Systems (SEFAIAS)","author":"Rao"},{"article-title":"Uber\u2019s self-driving operator charged over fatal crash","year":"2019","author":"Ilascu","key":"ref13"},{"article-title":"The translucent patch: A physical and universal attack on object detectors","year":"2020","author":"Zolfi","key":"ref14"},{"article-title":"Uber\u2019s self-driving operator charged over fatal crash","year":"2020","author":"Cellan-Jones","key":"ref15"},{"article-title":"Landmark trial involving tesla autopilot weighs if \u2018man or machine\u2019 at fault","year":"2022","author":"Anguiano","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICISCAE55891.2022.9927611"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN55064.2022.9892759"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN55064.2022.9892059"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.3033291"},{"article-title":"Carla-gear: a dataset generator for a systematic evaluation of adversarial robustness of vision models","year":"2022","author":"Nesti","key":"ref21"},{"article-title":"nuscenes: A multimodal dataset for autonomous driving","year":"2019","author":"Caesar","key":"ref22"},{"article-title":"Level 5 perception dataset 2020","year":"2019","author":"Kesten","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC48978.2021.9565009"},{"article-title":"Scalability in perception for autonomous driving: Waymo open dataset","year":"2019","author":"Sun","key":"ref25"},{"article-title":"Bdd100k: A diverse driving dataset for heterogeneous multitask learning","year":"2018","author":"Yu","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1177\/0278364916679498"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2012.6248074"},{"article-title":"Adversarial learning and self-teaching techniques for domain adaptation in semantic segmentation","year":"2019","author":"Michieli","key":"ref29"},{"article-title":"Carla: An open urban driving simulator","year":"2017","author":"Dosovitskiy","key":"ref30"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA40945.2020.9197144"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339815"},{"article-title":"Darts: Deceiving autonomous cars with toxic signs","year":"2018","author":"Sitawarin","key":"ref33"},{"article-title":"Fooling a real car with adversarial traffic signs","year":"2019","author":"Morgulis","key":"ref34"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/IV51971.2022.9827222"},{"key":"ref36","doi-asserted-by":"crossref","DOI":"10.1109\/PerCom45495.2020.9127389","article-title":"An analysis of adversarial attacks and defenses on autonomous driving models","author":"Deng","year":"2020"},{"article-title":"Evaluating the robustness of semantic segmentation for autonomous driving against real-world adversarial patch attacks","year":"2021","author":"Nesti","key":"ref37"}],"event":{"name":"2022 IEEE Applied Imagery Pattern Recognition Workshop (AIPR)","start":{"date-parts":[[2022,10,11]]},"location":"DC, USA","end":{"date-parts":[[2022,10,13]]}},"container-title":["2022 IEEE Applied Imagery Pattern Recognition Workshop (AIPR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10091955\/10092198\/10092221.pdf?arnumber=10092221","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T21:15:31Z","timestamp":1709241331000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10092221\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,11]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/aipr57179.2022.10092221","relation":{},"subject":[],"published":{"date-parts":[[2022,10,11]]}}}