{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T11:03:07Z","timestamp":1769166187493,"version":"3.49.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T00:00:00Z","timestamp":1747612800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T00:00:00Z","timestamp":1747612800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-2145493,CNS1929771"],"award-info":[{"award-number":["CNS-2145493,CNS1929771"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,19]]},"DOI":"10.1109\/icra55743.2025.11127495","type":"proceedings-article","created":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T17:28:56Z","timestamp":1756834136000},"page":"15181-15187","source":"Crossref","is-referenced-by-count":1,"title":["Slamspoof: Practical Lidar Spoofing Attacks on Localization Systems Guided by Scan Matching Vulnerability Analysis"],"prefix":"10.1109","author":[{"given":"Rokuto","family":"Nagata","sequence":"first","affiliation":[{"name":"Keio University,Department of Electronics and Electrical Engineering"}]},{"given":"Kenji","family":"Koide","sequence":"additional","affiliation":[{"name":"the National Institute of Advanced Industrial Science and Technology,Department of Information Technology and Human Factors"}]},{"given":"Yuki","family":"Hayakawa","sequence":"additional","affiliation":[{"name":"Keio University,Department of Electronics and Electrical Engineering"}]},{"given":"Ryo","family":"Suzuki","sequence":"additional","affiliation":[{"name":"Keio University,Department of Electronics and Electrical Engineering"}]},{"given":"Kazuma","family":"Ikeda","sequence":"additional","affiliation":[{"name":"Keio University,Department of Electronics and Electrical Engineering"}]},{"given":"Ozora","family":"Sako","sequence":"additional","affiliation":[{"name":"Keio University,Department of Electronics and Electrical Engineering"}]},{"given":"Qi Alfred","family":"Chen","sequence":"additional","affiliation":[{"name":"University of California,Department of Computer Science,Irvine"}]},{"given":"Takami","family":"Sato","sequence":"additional","affiliation":[{"name":"University of California,Department of Computer Science,Irvine"}]},{"given":"Kentaro","family":"Yoshioka","sequence":"additional","affiliation":[{"name":"Keio University,Department of Electronics and Electrical Engineering"}]}],"member":"263","reference":[{"key":"ref1","author":"Urmson","year":"2007","journal-title":"Tartan racing: A multi-modal approach to the darpa urban challenge"},{"key":"ref2","volume-title":"Autonomous Vehicle Testing Permit Holders"},{"key":"ref3","first-page":"3309","article-title":"Dirty road can attack: Security of deep learning based automated lane centering under {Physical-World} attack","volume-title":"in 30th USENIX security symposium (USENIX Security 21)","author":"Sato","year":"2021"},{"issue":"2015","key":"ref4","first-page":"995","article-title":"Remote attacks on automated vehicles sensors: Experiments on camera and lidar","volume":"11","author":"Petit","year":"2015","journal-title":"Black Hat Europe"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339815"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.23350"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP57164.2023.00067"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.2021CIP0017"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.14722\/vehiclesec.2024.23014"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_22"},{"key":"ref11","first-page":"2993","article-title":"You can\u2019t see me: Physical removal attacks on {lidarbased} autonomous vehicles driving frameworks","volume-title":"in 32nd USENIX Security Symposium (USENIX Security 23)","author":"Cao","year":"2023"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2022.3141876"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA57147.2024.10611195"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2023.3236571"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA46639.2022.9811849"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA48506.2021.9561364"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.15607\/RSS.2014.X.007"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1177\/1729881419841532"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/BF01427149"},{"key":"ref20","article-title":"The three-dimensional normal-distributions transform: an efficient representation for registration, surface analysis, and loop detection","volume-title":"Ph.D. dissertation, \u00d6rebro universitet","author":"Magnusson","year":"2009"},{"key":"ref21","first-page":"1903","article-title":"Security analysis of {Camera-LiDAR} fusion against {Black-Box} attacks on autonomous vehicles","volume-title":"in 31st USENIX Security Symposium (USENIX Security 22)","author":"Hallyburton","year":"2022"},{"key":"ref22","journal-title":"VLP-16 User Manual"},{"key":"ref23","volume-title":"Livox Horizon User Manual"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.15607\/RSS.2009.V.021"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2018.8593941"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2025.230628"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/IROS45743.2020.9341176"}],"event":{"name":"2025 IEEE International Conference on Robotics and Automation (ICRA)","location":"Atlanta, GA, USA","start":{"date-parts":[[2025,5,19]]},"end":{"date-parts":[[2025,5,23]]}},"container-title":["2025 IEEE International Conference on Robotics and Automation (ICRA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11127273\/11127223\/11127495.pdf?arnumber=11127495","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T06:32:30Z","timestamp":1756881150000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11127495\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,19]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/icra55743.2025.11127495","relation":{},"subject":[],"published":{"date-parts":[[2025,5,19]]}}}