{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:11:09Z","timestamp":1772043069082,"version":"3.50.1"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T00:00:00Z","timestamp":1747612800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T00:00:00Z","timestamp":1747612800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62302220"],"award-info":[{"award-number":["62302220"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,19]]},"DOI":"10.1109\/icra55743.2025.11128081","type":"proceedings-article","created":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T17:28:56Z","timestamp":1756834136000},"page":"15188-15194","source":"Crossref","is-referenced-by-count":1,"title":["Gradient-Based Adversarial Attacks on Deep LiDAR Odometry"],"prefix":"10.1109","author":[{"given":"Zhenbo","family":"Song","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Nanjing University of Science and Technology,Nanjing,China,210094"}]},{"given":"Xuanzhu","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanjing University of Science and Technology,Nanjing,China,210094"}]},{"given":"Zhenyuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanjing University of Science and Technology,Nanjing,China,210094"}]},{"given":"Kaihao","family":"Zhang","sequence":"additional","affiliation":[{"name":"The School of Computer Science and Technology, Harbin Institute of Technology,Shenzhen,China,518055"}]},{"given":"Jianfeng","family":"Lu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanjing University of Science and Technology,Nanjing,China,210094"}]},{"given":"Weiqing","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanjing University of Science and Technology,Nanjing,China,210094"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02365"},{"key":"ref2","article-title":"Adversarial Attack and Defense for Dehazing Networks","author":"Gui","year":"2023","journal-title":"arXiv preprint"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3485730.3485935"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/3DV53792.2021.00127"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58610-2_15"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE53296.2022.9730540"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2023.3302018"},{"key":"ref8","first-page":"5580","article-title":"Ct-icp: Real-time elastic lidar odometry with loop closure","volume-title":"International Conference on Robotics and Automation","author":"Dellenbach","year":"2021"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00706"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA48506.2021.9561063"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2022.3140794"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01565"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2012.6248074"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.15607\/rss.2014.x.007"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IROS45743.2020.9341176"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00136"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IROS40897.2019.8967756"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00495"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00931"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3207015"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/34.121791"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.15607\/rss.2009.v.021"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2018.8594299"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00935"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"927","DOI":"10.1016\/j.robot.2008.08.005","article-title":"Towards 3d point cloud based object maps for household environments","author":"Rusu","year":"2008","journal-title":"Robotics and Autonomous Systems"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00168"},{"key":"ref27","article-title":"Towards robust lidar-based perception in autonomous driving: General black-box adversarial sensor attack and countermeasures","volume-title":"USENIX Security Symposium","author":"Sun","year":"2020"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339815"},{"issue":"2015","key":"ref29","first-page":"995","article-title":"Remote attacks on automated vehicles sensors: Experiments on camera and lidar","volume":"11","author":"Petit","year":"2015","journal-title":"Black Hat Europe"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_22"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01373"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00076"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00411"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.06083"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298801"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.2312\/LocalChapterEvents\/ItalChap\/ItalianChapConf2008\/129-136"},{"key":"ref37","volume-title":"Adversarial attack and defense on point sets","author":"Yang","year":"2019"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/iccv.2019.00205"},{"key":"ref39","volume-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014"}],"event":{"name":"2025 IEEE International Conference on Robotics and Automation (ICRA)","location":"Atlanta, GA, USA","start":{"date-parts":[[2025,5,19]]},"end":{"date-parts":[[2025,5,23]]}},"container-title":["2025 IEEE International Conference on Robotics and Automation (ICRA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11127273\/11127223\/11128081.pdf?arnumber=11128081","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T06:17:13Z","timestamp":1756880233000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11128081\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,19]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/icra55743.2025.11128081","relation":{},"subject":[],"published":{"date-parts":[[2025,5,19]]}}}