{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:15:55Z","timestamp":1771697755848,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1109\/irc.2019.00023","type":"proceedings-article","created":{"date-parts":[[2019,3,29]],"date-time":"2019-03-29T04:29:14Z","timestamp":1553833754000},"page":"102-109","source":"Crossref","is-referenced-by-count":11,"title":["Real-Time Attack Detection on Robot Cameras: A Self-Driving Car Application"],"prefix":"10.1109","author":[{"given":"Sofiane","family":"Lagraa","sequence":"first","affiliation":[]},{"given":"Maxime","family":"Cailac","sequence":"additional","affiliation":[]},{"given":"Sean","family":"Rivera","sequence":"additional","affiliation":[]},{"given":"Frederic","family":"Beck","sequence":"additional","affiliation":[]},{"given":"Radu","family":"State","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3029798.3038437"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2018.00035"},{"key":"ref12","article-title":"Adversarial examples in the physical world","author":"kurakin","year":"2016","journal-title":"CoRR abs\/1607 02533"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICIF.2006.301574"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.robot.2017.11.002"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098101"},{"key":"ref16","article-title":"Practical black-box attacks against deep learning systems using adversarial examples","author":"papernot","year":"2016","journal-title":"CoRR abs\/1602 02697"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098144"},{"key":"ref18","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2013","journal-title":"CoRR abs\/1312 6199"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.930649"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.robot.2017.09.017"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2008.4564669"},{"key":"ref5","article-title":"Robust physical-world attacks on machine learning models","author":"evtimov","year":"2017","journal-title":"CoRR abs\/1707 08945"},{"key":"ref8","first-page":"1","article-title":"An improved full-reference image quality metric based on structure compensation","author":"gu","year":"2012","journal-title":"Proceedings of The 2012 Asia Pacific Signal and Information Processing Association Annual Summit and Conference"},{"key":"ref7","article-title":"Adding salt to pepper: A structured security assessment over a humanoid robot","author":"giaretta","year":"2018","journal-title":"CoRR abs\/1805 04101"},{"key":"ref2","year":"0"},{"key":"ref1","year":"0"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1023\/B:AIRE.0000045502.10941.a9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.153"},{"key":"ref21","first-page":"27s","article-title":"Fast indexing strategies for robust image hashes. Digital Investigation","volume":"11","author":"winter","year":"2014","journal-title":"Proceedings of the First Annual DFRWS Europe"},{"key":"ref23","article-title":"Adversarial examples: Attacks and defenses for deep learning","author":"yuan","year":"2017","journal-title":"CoRR abs\/1712 07107"}],"event":{"name":"2019 Third IEEE International Conference on Robotic Computing (IRC)","location":"Naples, Italy","start":{"date-parts":[[2019,2,25]]},"end":{"date-parts":[[2019,2,27]]}},"container-title":["2019 Third IEEE International Conference on Robotic Computing (IRC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8666629\/8675422\/08675588.pdf?arnumber=8675588","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T20:20:45Z","timestamp":1658262045000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8675588\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/irc.2019.00023","relation":{},"subject":[],"published":{"date-parts":[[2019,2]]}}}