{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T13:03:58Z","timestamp":1777467838253,"version":"3.51.4"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:00:00Z","timestamp":1648771200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:00:00Z","timestamp":1648771200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:00:00Z","timestamp":1648771200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Higher Education Commission","award":["NRPU-10023-2018\/2019"],"award-info":[{"award-number":["NRPU-10023-2018\/2019"]}]},{"name":"Higher Education Commission","award":["20-13396\/NRPU\/R&D\/HEC\/2020"],"award-info":[{"award-number":["20-13396\/NRPU\/R&D\/HEC\/2020"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Robot. Autom. Lett."],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1109\/lra.2022.3150031","type":"journal-article","created":{"date-parts":[[2022,2,10]],"date-time":"2022-02-10T20:23:24Z","timestamp":1644524604000},"page":"4670-4677","source":"Crossref","is-referenced-by-count":17,"title":["Perceptual Aliasing++: Adversarial Attack for Visual SLAM Front-End and Back-End"],"prefix":"10.1109","volume":"7","author":[{"given":"Muhammad Haris","family":"Ikram","sequence":"first","affiliation":[{"name":"School of Electrical Engineering and Computer Science, National University of Sciences and Technology (NUST), Islamabad, Pakistan"}]},{"given":"Saran","family":"Khaliq","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Computer Science, National University of Sciences and Technology (NUST), Islamabad, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3525-1956","authenticated-orcid":false,"given":"Muhammad Latif","family":"Anjum","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Computer Science, National University of Sciences and Technology (NUST), Islamabad, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2899-7493","authenticated-orcid":false,"given":"Wajahat","family":"Hussain","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Computer Science, National University of Sciences and Technology (NUST), Islamabad, Pakistan"}]}],"member":"263","reference":[{"key":"ref1","article-title":"openslam","author":"Stachniss"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2015.7139836"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1177\/0278364913498910"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1177\/0278364908090961"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2012.2197158"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2012.6224623"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.15607\/RSS.2018.XIV.032"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2015.2463671"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054781"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MITS.2010.939925"},{"key":"ref11","article-title":"Adversarial patch","author":"Brown","year":"2017"},{"key":"ref12","article-title":"Intriguing properties of neural networks","author":"Szegedy","year":"2013"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978392"},{"key":"ref14","article-title":"Constructing unrestricted adversarial examples with generative models","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Song","year":"2018"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00175"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3278515"},{"key":"ref17","first-page":"2137","article-title":"Black-box adversarial attacks with limited queries and information","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Ilyas","year":"2018"},{"key":"ref18","first-page":"284","article-title":"Synthesizing robust adversarial examples","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Athalye","year":"2018"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58548-8_1"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.15607\/RSS.2015.XI.022"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10514-015-9516-2"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.736"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.410"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-010-0001-0"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.robot.2017.03.016"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s10514-015-9512-6"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2015.7353721"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2017.2788045"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.robot.2014.08.005"},{"key":"ref31","article-title":"Adversarial examples for handcrafted features","volume-title":"Proc. Brit. Mach. Vis. Conf.","author":"Ali","year":"2019"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2019.2894852"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2020.2965893"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2012.6385590"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ROBOT.2006.1642040"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2011.5979949"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2013.2291626"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2012.6385773"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00219"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2015.7353367"},{"key":"ref41","first-page":"1527","article-title":"All your GPS are belong to us: Towards stealthy manipulation of road navigation systems","volume-title":"Proc. 27th  USENIX  Secur. Symp.","author":"Zeng","year":"2018"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23436"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1609\/aiide.v8i1.12518"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CW.2010.48"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243754"},{"key":"ref46","article-title":"The end is nigh: Generic solving of text-based CAPTCHAs","volume-title":"Proc. 8th USENIX Workshop Offensive Technol.","author":"Bursztein","year":"2014"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1177\/0278364909103911"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2012.6248074"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s10514-020-09965-2"}],"container-title":["IEEE Robotics and Automation Letters"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7083369\/9647862\/09709577.pdf?arnumber=9709577","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T23:29:17Z","timestamp":1705534157000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9709577\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4]]},"references-count":49,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/lra.2022.3150031","relation":{},"ISSN":["2377-3766","2377-3774"],"issn-type":[{"value":"2377-3766","type":"electronic"},{"value":"2377-3774","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4]]}}}