{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T21:27:49Z","timestamp":1770845269521,"version":"3.50.1"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T00:00:00Z","timestamp":1759622400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T00:00:00Z","timestamp":1759622400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,5]]},"DOI":"10.1109\/smc58881.2025.11343607","type":"proceedings-article","created":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T20:54:44Z","timestamp":1769633684000},"page":"2250-2255","source":"Crossref","is-referenced-by-count":0,"title":["Infrared Vehicle Adversarial Patch: Physical Attacking Infrared Vehicle Detectors"],"prefix":"10.1109","author":[{"given":"Hanyang","family":"Chen","sequence":"first","affiliation":[{"name":"Southwest University of Science and Technology,Mianyang,China,621010"}]},{"given":"Wanli","family":"Dong","sequence":"additional","affiliation":[{"name":"Southwest University of Science and Technology,Mianyang,China,621010"}]},{"given":"Jiachuan","family":"Fan","sequence":"additional","affiliation":[{"name":"Southwest University of Science and Technology,Mianyang,China,621010"}]},{"given":"Xiaoming","family":"Gao","sequence":"additional","affiliation":[{"name":"Southwest University of Science and Technology,Mianyang,China,621010"}]},{"given":"Anjie","family":"Peng","sequence":"additional","affiliation":[{"name":"Southwest University of Science and Technology,Mianyang,China,621010"}]},{"given":"Xingdi","family":"Fan","sequence":"additional","affiliation":[{"name":"Southwest University of Science and Technology,Mianyang,China,621010"}]},{"given":"Dong","family":"Li","sequence":"additional","affiliation":[{"name":"Southwest University of Science and Technology,Mianyang,China,621010"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2983149"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2022.3140344"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2761740"},{"key":"ref4","article-title":"Intriguing properties of neural networks","author":"Szegedy","year":"2013"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i2.20141"},{"key":"ref6","first-page":"1","article-title":"Carla: An open urban driving simulator","volume-title":"Conference on robot learning","author":"Dosovitskiy"},{"key":"ref7","article-title":"Adversarial machine learning at scale","author":"Kurakin","year":"2016"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i4.16477"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01296"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2024.106310"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i12.26777"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01187"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00410"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1802.02611"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICNN.1995.488968"},{"key":"ref16","first-page":"284","article-title":"Synthesizing robust adversarial examples","volume-title":"International conference on machine learning","author":"Athalye"},{"key":"ref17","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014"},{"key":"ref18","article-title":"Adversarial examples that fool detectors","author":"Lu","year":"2017"},{"key":"ref19","article-title":"Faster r-cnn: Towards real-time object detection with region proposal networks","volume":"28","author":"Ren","year":"2015","journal-title":"Advances in neural information processing systems"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102634"},{"key":"ref21","article-title":"Dynamic adversarial patch for evading object detection models","author":"Hoory","year":"2020"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01487"},{"key":"ref23","article-title":"Free adas thermal dataset v2","author":"FLIR"},{"key":"ref24","article-title":"yolov5","author":"Jocher"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.324"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58452-8_13"},{"key":"ref27","article-title":"Yolov3: An incremental improvement","author":"Redmon","year":"2018"}],"event":{"name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","location":"Vienna, Austria","start":{"date-parts":[[2025,10,5]]},"end":{"date-parts":[[2025,10,8]]}},"container-title":["2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11342430\/11342431\/11343607.pdf?arnumber=11343607","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T20:50:21Z","timestamp":1770843021000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11343607\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,5]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/smc58881.2025.11343607","relation":{},"subject":[],"published":{"date-parts":[[2025,10,5]]}}}