{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T13:54:56Z","timestamp":1762869296486,"version":"3.37.3"},"reference-count":53,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2020AAA0107700"],"award-info":[{"award-number":["2020AAA0107700"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62032021","62372406","62172359","62102354"],"award-info":[{"award-number":["62032021","62372406","62172359","62102354"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tifs.2024.3376192","type":"journal-article","created":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T17:51:25Z","timestamp":1710438685000},"page":"4199-4214","source":"Crossref","is-referenced-by-count":5,"title":["PhaDe: Practical Phantom Spoofing Attack Detection for Autonomous Vehicles"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5240-5200","authenticated-orcid":false,"given":"Feng","family":"Lin","sequence":"first","affiliation":[{"name":"State Key Laboratory of Blockchain and Data Security, School of Cyber Science and Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-0195-0446","authenticated-orcid":false,"given":"Hao","family":"Yan","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Blockchain and Data Security, School of Cyber Science and Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-5596-4740","authenticated-orcid":false,"given":"Jin","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Blockchain and Data Security, School of Cyber Science and Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2311-4193","authenticated-orcid":false,"given":"Ziwei","family":"Liu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Blockchain and Data Security, School of Cyber Science and Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5230-3749","authenticated-orcid":false,"given":"Li","family":"Lu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Blockchain and Data Security, School of Cyber Science and Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0921-8869","authenticated-orcid":false,"given":"Zhongjie","family":"Ba","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Blockchain and Data Security, School of Cyber Science and Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1969-2591","authenticated-orcid":false,"given":"Kui","family":"Ren","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Blockchain and Data Security, School of Cyber Science and Technology, Zhejiang University, Hangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/jproc.2023.3238524"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s00138-011-0404-2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCUBEA.2018.8697819"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00175"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10925-7_4"},{"key":"ref6","first-page":"1","article-title":"$SLAP$: Improving physical adversarial examples with short-lived adversarial perturbations","volume-title":"Proc. 30th USENIX Secur. Symposium (USENIX Security)","author":"Lovisotto"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423359"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00333"},{"article-title":"Polynomial expansion for orientation and motion estimation","year":"2002","author":"Farneb\u00e4ck","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3038924"},{"key":"ref11","article-title":"Towards out-of-distribution generalization: A survey","author":"Liu","year":"2021","journal-title":"arXiv:2108.13624"},{"key":"ref12","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv:1412.6572"},{"key":"ref13","first-page":"1957","article-title":"Rolling colors: Adversarial laser exploits against traffic light recognition","volume-title":"Proc. 31st USENIX Secur. Symp. (USENIX Security)","author":"Yan"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i10.17073"},{"key":"ref15","first-page":"3309","article-title":"Dirty road can attack: Security of deep learning based automated lane centering under physical-world attack","volume-title":"Proc. 29th USENIX Secur. Symp. (USENIX Security)","author":"Sato"},{"key":"ref16","first-page":"3237","article-title":"Too good to be safe: Tricking lane detection in autonomous driving with crafted perturbations","volume-title":"Proc. 30th USENIX Secur. Symp. (USENIX Security)","author":"Jing"},{"key":"ref17","article-title":"Learning with a strong adversary","author":"Huang","year":"2015","journal-title":"arXiv:1511.03034"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SPW50608.2020.00025"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484766"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3586183.3606775"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2020.107486","article-title":"Multi-head enhanced self-attention network for novelty detection","volume":"107","author":"Zhang","year":"2020","journal-title":"Pattern Recognit."},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01415"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2019.00067"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/7503.003.0022"},{"article-title":"Fooling detection alone is not enough: Adversarial attack against multiple object tracking","volume-title":"Proc. Int. Conf. Learning Represent.","author":"Jia","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2004.10934"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-75807_17"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45103-X_50"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2020.104042"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3485730.3485945"},{"key":"ref32","article-title":"Creating artificial modalities to solve RGB liveness","author":"Parkin","year":"2020","journal-title":"arXiv:2006.16028"},{"key":"ref33","first-page":"14200","article-title":"Attention bottlenecks for multimodal fusion","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"34","author":"Nagrani"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/WACV45572.2020.9093548"},{"key":"ref37","article-title":"L2-constrained softmax loss for discriminative face verification","author":"Ranjan","year":"2017","journal-title":"arXiv:1703.09507"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.609"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1703.07737"},{"key":"ref40","article-title":"YOLOv3: An incremental improvement","author":"Redmon","year":"2018","journal-title":"arXiv:1804.02767"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00271"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2016.2577031"},{"key":"ref43","article-title":"In search of lost domain generalization","author":"Gulrajani","year":"2020","journal-title":"arXiv:2007.01434"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref46","article-title":"Adversarial patch","author":"Brown","year":"2017","journal-title":"arXiv:1712.09665"},{"key":"ref47","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017","journal-title":"arXiv:1706.06083"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref49","article-title":"Adversarial robustness toolbox v1.0.0","author":"Nicolae","year":"2018","journal-title":"arXiv:1807.01069"},{"volume-title":"Perception","year":"2020","key":"ref50"},{"volume-title":"Safety First for Automated Driving","year":"2019","key":"ref51"},{"volume-title":"Why Tesla\u2019s Autopilot Can\u2019t See a Stopped Firetruck","year":"2018","author":"Stewart","key":"ref52"},{"volume-title":"Autopilot","year":"2021","key":"ref53"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/10319981\/10466616.pdf?arnumber=10466616","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,7]],"date-time":"2024-05-07T04:42:41Z","timestamp":1715056961000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10466616\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":53,"URL":"https:\/\/doi.org\/10.1109\/tifs.2024.3376192","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2024]]}}}