{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T02:00:13Z","timestamp":1772935213206,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000104","name":"National Aeronautics and Space Administration","doi-asserted-by":"publisher","award":["80NSSC24K1755"],"award-info":[{"award-number":["80NSSC24K1755"]}],"id":[{"id":"10.13039\/100000104","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/bigdata66926.2025.11401571","type":"proceedings-article","created":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T20:57:57Z","timestamp":1772830677000},"page":"6489-6494","source":"Crossref","is-referenced-by-count":0,"title":["AI Blinks, Chaos Winks: Adversarial Vulnerability of Object Detection in High-Density Urban Mobility Scenarios"],"prefix":"10.1109","author":[{"given":"Farhaan","family":"Syed","sequence":"first","affiliation":[{"name":"New Jersey City University,Department of Computer Science,Jersey City,NJ,USA"}]},{"given":"Abhi","family":"Chatterjee","sequence":"additional","affiliation":[{"name":"School of Business, New Jersey City University,Jersey City,NJ,USA"}]},{"given":"Moitrayee","family":"Chatterjee","sequence":"additional","affiliation":[{"name":"New Jersey City University,Department of Computer Science,Jersey City,NJ,USA"}]},{"given":"Xiwang","family":"Guo","sequence":"additional","affiliation":[{"name":"New Jersey City University,Department of Computer Science,Jersey City,NJ,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/app15084195"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2024.104252"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2024.3484152"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2024.3484152"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.02065"},{"key":"ref6","article-title":"Adversarial examples that fool both computer vision and time-limited humans","volume":"31","author":"Elsayed","year":"2018","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-025-01067-3"},{"key":"ref8","author":"Goodfellow","year":"2014","journal-title":"Explaining and harnessing adversarial examples"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/KHI-HTC60760.2024.10482197"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/bdcc7020120"},{"key":"ref11","article-title":"Yolov5 by ultralytics","volume-title":"Ultralytics I.","year":"2022"},{"key":"ref12","author":"Khanam","year":"2024","journal-title":"What is yolov5: A deep look into the internal features of the popular object detector"},{"key":"ref13","author":"Liu","year":"2016","journal-title":"Delving into transferable adversarial examples and black-box attacks"},{"key":"ref14","article-title":"Adversarial perturbations are formed by iteratively learning linear combinations of the right singular vectors of the adversarial jacobian","volume-title":"Forty-second International Conference on Machine Learning","author":"Paniagua"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i5.28267"},{"key":"ref17","author":"Thomas","year":"2024","journal-title":"Realface-pedestrian face dataset"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.52202\/079017-4242"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2024.128620"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.02330"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00129"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3716895.3716980"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00051"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3707402.3707404"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586163"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C63300.2024.00028"}],"event":{"name":"2025 IEEE International Conference on Big Data (BigData)","location":"Macau, China","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,11]]}},"container-title":["2025 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11400704\/11400712\/11401571.pdf?arnumber=11401571","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T07:26:37Z","timestamp":1772868397000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11401571\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/bigdata66926.2025.11401571","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}