{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T21:28:59Z","timestamp":1770931739716,"version":"3.50.1"},"reference-count":46,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T00:00:00Z","timestamp":1761523200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T00:00:00Z","timestamp":1761523200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,27]]},"DOI":"10.1109\/icves65691.2025.11376412","type":"proceedings-article","created":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T20:54:58Z","timestamp":1770843298000},"page":"49-56","source":"Crossref","is-referenced-by-count":0,"title":["Robust Monocular Depth Estimation Against Adversarial Camouflage in Autonomous Vehicles"],"prefix":"10.1109","author":[{"given":"Saahil","family":"Khanna","sequence":"first","affiliation":[{"name":"University of Galway,School of Computer Science,Galway,Ireland"}]},{"given":"Muhammad Adeel","family":"Hafeez","sequence":"additional","affiliation":[{"name":"University of Galway,School of Computer Science,Galway,Ireland"}]},{"given":"Muhammad","family":"Asad","sequence":"additional","affiliation":[{"name":"University of Galway,School of Computer Science,Galway,Ireland"}]},{"given":"Ganesh","family":"Sistu","sequence":"additional","affiliation":[{"name":"Valeo Vision Systems,Tuam,Ireland"}]},{"given":"Michael G.","family":"Madden","sequence":"additional","affiliation":[{"name":"University of Galway,School of Computer Science,Galway,Ireland"}]},{"given":"Ihsan","family":"Ullah","sequence":"additional","affiliation":[{"name":"University of Galway,School of Computer Science,Galway,Ireland"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/RTEICT52294.2021.9573964"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s42835-020-00570-y"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.5772\/intechopen.89917"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/s22145353"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/OJVT.2023.3265363"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3099164"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2901469"},{"key":"ref8","article-title":"A survey on physical adversarial attack in computer vision","author":"Wang","year":"2022"},{"key":"ref9","article-title":"Fooling a real car with adversarial traffic signs","author":"Morgulis","year":"2019"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.02308"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19839-7_30"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/WACV51458.2022.00288"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.03.084"},{"key":"ref14","article-title":"Intriguing Properties of Neural Networks","author":"Szegedy","year":"2013"},{"key":"ref15","article-title":"Towards Deep Learning Models Resistant to Adversarial Attacks","author":"Madry","year":"2017"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00175"},{"key":"ref17","article-title":"Adversarial Machine Learning at Scale","author":"Kurakin","year":"2016"},{"key":"ref18","article-title":"Ensemble Adversarial Training: Attacks and Defenses","author":"Tram\u00e8r","year":"2017"},{"key":"ref19","first-page":"284","article-title":"Synthesizing Robust Adversarial Examples","volume-title":"Proceedings of the International Conference on Machine Learning","author":"Athalye"},{"key":"ref20","first-page":"1802","article-title":"Exploring the Landscape of Spatial Robustness","volume-title":"International Conference on Machine Learning","author":"Engstrom"},{"key":"ref21","article-title":"Adversarial Patch","author":"Brown","year":"2017"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00175"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/OJVT.2025.3579341"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00397"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3317054"},{"key":"ref26","article-title":"Monocular Depth Estimators: Vulnerabilities and Attacks","author":"Mathew","year":"2020"},{"key":"ref27","article-title":"Adversarial Training of Self-Supervised Monocular Depth Estimation Against Physical-World Attacks","author":"Cheng","year":"2023"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00393"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00122"},{"key":"ref30","article-title":"Midas v3.1\u2013A Model Zoo for Robust Monocular Relative Depth Estimation","author":"Birkl","year":"2023"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00400"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00818"},{"key":"ref33","article-title":"AI and Autopilot"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.52202\/079017-0688"},{"key":"ref35","article-title":"High Quality Monocular Depth Estimation via Transfer Learning","author":"Alhashim","year":"2018"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/OJITS.2023.3236531"},{"key":"ref37","article-title":"Zoedepth: Zero-Shot Transfer by Combining Relative and Metric Depth","author":"Bhat","year":"2023"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01196"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.3390\/su15118897"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2019.2893426"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1080\/15472450.2017.1336053"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00371"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2024.3412432"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2019.00143"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i12.26758"}],"event":{"name":"2025 IEEE International Conference on Vehicular Electronics and Safety (ICVES)","location":"Coventry, United Kingdom","start":{"date-parts":[[2025,10,27]]},"end":{"date-parts":[[2025,10,28]]}},"container-title":["2025 IEEE International Conference on Vehicular Electronics and Safety (ICVES)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11373934\/11375868\/11376412.pdf?arnumber=11376412","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T20:57:08Z","timestamp":1770929828000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11376412\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,27]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/icves65691.2025.11376412","relation":{},"subject":[],"published":{"date-parts":[[2025,10,27]]}}}