{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T21:03:26Z","timestamp":1769202206499,"version":"3.49.0"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61976049"],"award-info":[{"award-number":["61976049"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61632007"],"award-info":[{"award-number":["61632007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["ZYGX2019Z015"],"award-info":[{"award-number":["ZYGX2019Z015"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Sichuan Science and Technology Program, China","award":["2019ZDZX0008"],"award-info":[{"award-number":["2019ZDZX0008"]}]},{"name":"Sichuan Science and Technology Program, China","award":["2020YFS0057"],"award-info":[{"award-number":["2020YFS0057"]}]},{"name":"Sichuan Science and Technology Program, China","award":["2020YJ0038"],"award-info":[{"award-number":["2020YJ0038"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2021,4,15]]},"DOI":"10.1109\/jiot.2020.3016145","type":"journal-article","created":{"date-parts":[[2020,8,12]],"date-time":"2020-08-12T21:02:36Z","timestamp":1597266156000},"page":"6337-6347","source":"Crossref","is-referenced-by-count":74,"title":["Adaptive Square Attack: Fooling Autonomous Cars With Adversarial Traffic Signs"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0275-2797","authenticated-orcid":false,"given":"Yujie","family":"Li","sequence":"first","affiliation":[{"name":"School of Information Engineering, Yangzhou University, Yangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5685-3123","authenticated-orcid":false,"given":"Xing","family":"Xu","sequence":"additional","affiliation":[{"name":"Center for Future Multimedia and School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Jinhui","family":"Xiao","sequence":"additional","affiliation":[{"name":"Center for Future Multimedia and School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Siyuan","family":"Li","sequence":"additional","affiliation":[{"name":"Center for Future Multimedia and School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2999-2088","authenticated-orcid":false,"given":"Heng Tao","family":"Shen","sequence":"additional","affiliation":[{"name":"Center for Future Multimedia and School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"}]}],"member":"263","reference":[{"key":"ref39","author":"papernot","year":"2016","journal-title":"Transferability in machine learning from phenomena to black-box attacks using adversarial samples"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref33","author":"sitawarin","year":"2018","journal-title":"Darts Deceiving autonomous cars with toxic signs"},{"key":"ref32","first-page":"2017","article-title":"Spatial transformer networks","author":"jaderberg","year":"2015","journal-title":"Proc Annu Conf Neural Inf Process Syst (NIPS)"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01232"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3343031.3351088"},{"key":"ref37","first-page":"1","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2014","journal-title":"Proc 2nd Int Conf Learn Represent (ICLR)"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2013.6706807"},{"key":"ref35","author":"andriushchenko","year":"2019","journal-title":"Square attack A query-efficient black-box adversarial attack via random search"},{"key":"ref34","author":"morgulis","year":"2019","journal-title":"Fooling a real car with adversarial traffic signs"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2016.2521602"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2012.6232144"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2014.6907580"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2017.7995848"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2952088"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2019.2928180"},{"key":"ref18","first-page":"1112","article-title":"Hierarchical LSTMs with adaptive attention for visual captioning","volume":"42","author":"gao","year":"2020","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2967597"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00107"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/34.121789"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/134"},{"key":"ref3","author":"feng","year":"2019","journal-title":"Deep multi-modal object detection and semantic segmentation for autonomous driving Datasets methods and challenges"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/PerCom45495.2020.9127389"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00099"},{"key":"ref5","first-page":"1","article-title":"Autonomous driving in urban environments: Boss and the urban challenge","author":"urmson","year":"2009","journal-title":"The DARPA Urban Challenge Autonomous Vehicles in City Traffic"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-006-9038-7"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2018.8500504"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2013.2296516"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MITS.2016.2605381"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2306328"},{"key":"ref46","first-page":"2484","article-title":"Simple black-box adversarial attacks","author":"guo","year":"2019","journal-title":"Proc 36th Int Conf Mach Learn (ICML)"},{"key":"ref20","article-title":"Radial graph convolutional network for visual question generation","author":"xu","year":"2020","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"ref45","author":"schrijver","year":"1999","journal-title":"Theory of Linear and Integer Programming"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-018-0541-x"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3123266.3123326"},{"key":"ref42","first-page":"1","article-title":"Prior convictions: Black-box adversarial attacks with bandits and priors","author":"ilyas","year":"2019","journal-title":"Proc 7th Int Conf Learn Represent (ICLR)"},{"key":"ref24","first-page":"1","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2015","journal-title":"Proc 3rd Int Conf Learn Represent (ICLR)"},{"key":"ref41","first-page":"2142","article-title":"Black-box adversarial attacks with limited queries and information","author":"ilyas","year":"2018","journal-title":"Proc 35th Int Conf Mach Learn (ICML)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2020.2984991"},{"key":"ref44","first-page":"1337","article-title":"The convergence of the random search method in the extremal control of many parameter systems","volume":"24","author":"rastrigin","year":"1963","journal-title":"Autom Remote Control"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref43","first-page":"4636","article-title":"Parsimonious black-box adversarial attacks via efficient combinatorial optimization","author":"moon","year":"2019","journal-title":"Proc 36th Int Conf Mach Learn (ICML)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9398162\/09165820.pdf?arnumber=9165820","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T19:04:41Z","timestamp":1733252681000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9165820\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,15]]},"references-count":46,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2020.3016145","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,15]]}}}