{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:00:29Z","timestamp":1771700429100,"version":"3.50.1"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000006","name":"ONR","doi-asserted-by":"publisher","award":["N00014-23-1-2206"],"award-info":[{"award-number":["N00014-23-1-2206"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"ONR","doi-asserted-by":"publisher","award":["N00014-20-1-2745"],"award-info":[{"award-number":["N00014-20-1-2745"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","award":["FA9550-19-1-0169"],"award-info":[{"award-number":["FA9550-19-1-0169"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NSF","award":["CNS-1652544"],"award-info":[{"award-number":["CNS-1652544"]}]},{"name":"National AI Institute for Edge Computing Leveraging Next Generation Wireless Networks","award":["CNS-2112562"],"award-info":[{"award-number":["CNS-2112562"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Automat. Contr."],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1109\/tac.2024.3401022","type":"journal-article","created":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T17:47:15Z","timestamp":1715795235000},"page":"7726-7741","source":"Crossref","is-referenced-by-count":8,"title":["Attacks on Perception-Based Control Systems: Modeling and Fundamental Limits"],"prefix":"10.1109","volume":"69","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1728-4890","authenticated-orcid":false,"given":"Amir","family":"Khazraei","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Duke University, Durham, NC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5521-4397","authenticated-orcid":false,"given":"Henry D.","family":"Pfister","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Duke University, Durham, NC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5357-0117","authenticated-orcid":false,"given":"Miroslav","family":"Pajic","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Duke University, Durham, NC, USA"}]}],"member":"263","reference":[{"key":"ref1","first-page":"713","article-title":"Resiliency of perception-based controllers against attacks","volume-title":"Proc. Learn. Dyn. Control Conf.","author":"Khazraei","year":"2022"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.3043505"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2017.7963716"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2018.8460934"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2018.8460487"},{"key":"ref6","first-page":"399","article-title":"Certainty equivalent perception-based control","volume-title":"Proc. Learn. Dyn. Control Conf.","author":"Dean","year":"2021"},{"key":"ref7","first-page":"350","article-title":"Robust guarantees for perception-based control","volume-title":"Proc. Learn. Dyn. Control Conf.","author":"Dean","year":"2020"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.23919\/ACC45564.2020.9147981"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101766"},{"key":"ref10","article-title":"Fooling detection alone is not enough: First adversarial attack against multiple object tracking","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Jia","year":"2020"},{"key":"ref11","first-page":"1","article-title":"False data injection attacks in control systems","volume-title":"Proc. 1st Workshop Secure Control Syst.","author":"Mo","year":"2010"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2019.2898510"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.23919\/ACC45564.2020.9147833"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.2514\/1.I010201"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2017.8263660"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2021.110035"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2017.04.047"},{"key":"ref18","article-title":"Intriguing properties of neural networks","volume-title":"Proc. 2nd Int. Conf. Learn. Representations","author":"Szegedy","year":"2014"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00175"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"ref21","first-page":"877","article-title":"Towards robust LiDAR-based perception in autonomous driving: General black-box adversarial sensor attack and countermeasures","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Sun","year":"2020"},{"key":"ref22","first-page":"8486","article-title":"Targeted adversarial perturbations for monocular depth prediction","volume-title":"Proc. 34th Int. Conf. Neural Inf. Process. Syst.","author":"Wong","year":"2020"},{"key":"ref23","article-title":"Learning image attacks toward vision guided autonomous vehicles","author":"Yoon","year":"2021"},{"key":"ref24","first-page":"1903","article-title":"Security analysis of camera-LiDAR fusion against black-box attacks on autonomous vehicles","volume-title":"Proc. 31st USENIX Secur. Symp.","author":"Hallyburton","year":"2022"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS48487.2020.00024"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394956"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2012.6483441"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2364723"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2020.2987307"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS54341.2022.00030"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2016.2607420"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2019.108655"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2019.2921753"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CDC51059.2022.9993195"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2017.2704434"},{"key":"ref36","volume-title":"Information Theory: From Coding to Learning","author":"Polyanskiy","year":"2024"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00227"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2018.8461050"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2013.10.013"},{"key":"ref40","volume-title":"Nonlinear Systems","author":"Khalil","year":"2002"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2017.00012"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3380866"},{"key":"ref43","article-title":"Partial-information, longitudinal cyber attacks on LiDAR in autonomous vehicles","author":"Hallyburton","year":"2023"},{"key":"ref47","first-page":"151","article-title":"Timing attack in vehicular network","volume-title":"Proc. 15th WSEAS Int. Conf. Comput., World Sci. Eng. Acad. Soc.","author":"Sumra","year":"2011"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611971422.ch21"},{"issue":"20122016","key":"ref49","first-page":"7","article-title":"Lecture notes on information theory","volume":"6","author":"Polyanskiy","year":"2014","journal-title":"Lecture Notes ECE563"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1017\/9781108571401"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.jappmathmech.2006.03.010"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2015.7225830"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.23919\/ACC.2017.7963810"}],"container-title":["IEEE Transactions on Automatic Control"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/9\/10736196\/10531007-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9\/10736196\/10531007.pdf?arnumber=10531007","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:18:18Z","timestamp":1732666698000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10531007\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11]]},"references-count":50,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tac.2024.3401022","relation":{},"ISSN":["0018-9286","1558-2523","2334-3303"],"issn-type":[{"value":"0018-9286","type":"print"},{"value":"1558-2523","type":"electronic"},{"value":"2334-3303","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11]]}}}