{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T15:51:32Z","timestamp":1776181892603,"version":"3.50.1"},"reference-count":180,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Intell. Veh."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1109\/tiv.2024.3484152","type":"journal-article","created":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T13:23:38Z","timestamp":1729517018000},"page":"4433-4454","source":"Crossref","is-referenced-by-count":15,"title":["Adversarial Attacks on Autonomous Driving Systems in the Physical World: A Survey"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-0905-9031","authenticated-orcid":false,"given":"Lijun","family":"Chi","sequence":"first","affiliation":[{"name":"LTCI, Telecom Paris, Institut Polytechnique de Paris, Palaiseau, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0331-493X","authenticated-orcid":false,"given":"Mounira","family":"Msahli","sequence":"additional","affiliation":[{"name":"LTCI, Telecom Paris, Institut Polytechnique de Paris, Palaiseau, France"}]},{"given":"Qingjie","family":"Zhang","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2678-8070","authenticated-orcid":false,"given":"Han","family":"Qiu","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6595-6650","authenticated-orcid":false,"given":"Tianwei","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanyang Technological University, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3380-8394","authenticated-orcid":false,"given":"Gerard","family":"Memmi","sequence":"additional","affiliation":[{"name":"LTCI, Telecom Paris, Institut Polytechnique de Paris, Palaiseau, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1004-0140","authenticated-orcid":false,"given":"Meikang","family":"Qiu","sequence":"additional","affiliation":[{"name":"School of Computer and Cyber Science, Augusta University, Augusta, GA, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2022.3223131"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2023.3318070"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00252"},{"key":"ref4","article-title":"Intriguing properties of neural networks","author":"Szegedy","year":"2014"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3048038"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3374217"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58610-2_15"},{"key":"ref8","first-page":"247","article-title":"KENKU: Towards efficient and stealthy black-box adversarial attacks against ASR systems","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Wu","year":"2023"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00175"},{"key":"ref10","first-page":"284","article-title":"Synthesizing robust adversarial examples","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Athalye","year":"2018"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01373"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485377"},{"key":"ref13","first-page":"3309","article-title":"Dirty road can attack: Security of deep learning based automated lane centering under physical-world attack","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Sato","year":"2021"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00076"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01580"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW54120.2021.00016"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.690"},{"key":"ref19","article-title":"ultralytics\/YOLOV5: V6. 1-tensorrt, tensorflow edge TPU and openvino export and inference","author":"Jocher","year":"2022","journal-title":"Zenodo"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1804.02767"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.l007\/978-3-319-46448-0_2"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.81"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.322"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2577031"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01298"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00086"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00798"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00935"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01240-3_7"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/itsc.2019.8917228"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58523-5_40"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2024.3510515\/mm1"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"ref34","first-page":"652","article-title":"PointNet: Deep learning on point sets for 3D classification and segmentation","volume-title":"Proc. IEEE Conf. Comput. Vis. Pattern Recognit.","author":"Qi","year":"2017"},{"key":"ref35","first-page":"5105","article-title":"PointNet++: Deep hierarchical feature learning on point sets in a metric space","volume-title":"Adv. Neural Inf. Process. Syst.","volume":"30","author":"Qi","year":"2017"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2018.8462926"},{"key":"ref37","article-title":"Cylinder3D: An effective 3D framework for driving-scene LiDAR semantic segmentation","author":"Zhou","year":"2020"},{"key":"ref38","article-title":"Very deep convolutional networks for large-scale image recognition","author":"Simonyan","year":"2015"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.308"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2011.6033395"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2012.2209421"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.232"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00271"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2012.6248074"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01164"},{"key":"ref50","first-page":"1","article-title":"Carla: An open urban driving simulator","volume-title":"Proc. Conf. robot Learn.","author":"Dosovitskiy","year":"2017"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3560830.3563733"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102694"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2975048"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3071405"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/IV48863.2021.9575935"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.2478\/acss-2021-0012"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3130054"},{"key":"ref58","article-title":"Physically adversarial attacks and defenses in computer vision: A survey","author":"Wei","year":"2022"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.4018\/jdwm.2007070101"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/AISP48273.2020.9072976"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.2021WBI0002"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/tiv.2024.3369733"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3128968"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/tiv.2024.3378716"},{"key":"ref65","first-page":"317","article-title":"GhostImage: Remote perception attacks against camera-based image classification systems","volume-title":"Proc. 23rd Int. Symp. Res. Attacks, Intrusions Defenses","author":"Man","year":"2020"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/tiv.2024.3415771"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2022.3167733"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2019.2938110"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2023.3307157"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.infrared.2021.103754"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2024.3358229"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2022.3167103"},{"key":"ref73","article-title":"Delving into transferable adversarial examples and black-box attacks","author":"Liu","year":"2016","journal-title":"Proc. Int. Conf. Learn. Representations"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.3033291"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC51644.2023.10060485"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.04.014"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ICNN.1995.488968"},{"key":"ref79","article-title":"Grid search, random search, genetic algorithm: A big comparison for NAS","author":"Liashchynskyi","year":"2019"},{"key":"ref80","article-title":"Auto-encoding variational bayes","author":"Kingma","year":"2013"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3453106"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19839-7_30"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1137\/0916069"},{"key":"ref84","first-page":"3237","article-title":"Too good to be safe: Tricking lane detection in autonomous driving with crafted perturbations","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Jing","year":"2021"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101766"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i4.16477"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i12.26777"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3231886"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3176760"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2022.108985"},{"key":"ref91","article-title":"Poster: Adversarial retroreflective patches: A novel stealthy attack on traffic sign recognition at night","author":"Tsuruoka","year":"2023","journal-title":"Proc. Int. Conf. Learn. Representations"},{"key":"ref92","article-title":"Adversarial color film: Effective physical-world attack to DNNs","author":"Hu","year":"2022"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01498"},{"key":"ref94","first-page":"661","article-title":"Tpatch: A triggered physical adversarial patch","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Zhu","year":"2023"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24130"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3034899"},{"key":"ref97","first-page":"1865","article-title":"SLAP: Improving physical adversarial examples with Short-Lived adversarial perturbations","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Lovisotto","year":"2021"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833776"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3181197"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01491"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1049\/cvi2.12264"},{"key":"ref102","article-title":"Adversarial zoom lens: A. novel physical-world attack to DNNs","author":"Hu","year":"2022"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559390"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20065-6_3"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01473"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00780"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5459"},{"key":"ref108","article-title":"Attacking object detector using a universal targeted label-switch patch","author":"Shapira","year":"2022"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00846"},{"key":"ref110","article-title":"Physical adversarial attack on vehicle detector in the carla simulator","author":"Wu","year":"2020"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i2.20141"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01487"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1145\/3485730.3485935"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/NAFIPS.1996.534789"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00091"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3076287"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/sp46215.2023.10179458"},{"key":"ref118","first-page":"877","article-title":"Towards robust LiDAR-based perception in autonomous driving: General black-box adversarial sensor attack and countermeasures","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Sun","year":"2020"},{"key":"ref119","first-page":"2993","article-title":"You can\u2019t see me: Physical removal attacks on LiDAR-based autonomous vehicles driving frameworks","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Cao","year":"2023"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423359"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484766"},{"key":"ref122","first-page":"1903","article-title":"Security analysis of camera-LiDAR fusion against black-box attacks on autonomous vehicles","volume-title":"Proc. 31st USENIX Secur. Symp.","author":"Hallyburton","year":"2022"},{"key":"ref123","first-page":"1885","article-title":"DoubleStar: Long-range attack towards depth estimation based obstacle avoidance in autonomous systems","volume-title":"Proc. 31st USENIX Secur. Symp.","author":"Zhou","year":"2022"},{"key":"ref124","first-page":"1957","article-title":"Rolling colors: Adversarial laser exploits against traffic light recognition","volume-title":"Proc. 31st USENIX Secur. Symp.","author":"Yan","year":"2022"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3011690"},{"key":"ref126","first-page":"1","article-title":"Counteracting adversarial attacks in autonomous driving","volume-title":"Proc. 39th Int. Conf. Comput.-Aided Des.","author":"Sun","year":"2020"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/591"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-60239-0_19"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2021.3076826"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI49217.2020.00-11"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC48522.2020.9200945"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140444"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1145\/3469261.3469406"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/SECON52354.2021.9491590"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3146038"},{"key":"ref136","first-page":"16805","article-title":"Diffusion models for adversarial purification","volume":"162","author":"Nie","year":"2022","journal-title":"Proc. Int. Conf. Mach. Learn."},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.02329"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1145\/3649329.3657358"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00962"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00939"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00895"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01054"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00393"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00225"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00122"},{"key":"ref146","article-title":"A commute in data: The comma2k19 dataset","author":"Schafer","year":"2018"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00644"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.324"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58452-8_13"},{"key":"ref150","article-title":"Nanodet-plus: Super fast and high accuracy lightweight anchor-free object detection model","author":"Lyu"},{"key":"ref151","volume-title":"Learning Microsoft Cognitive Services","author":"Larsen","year":"2017"},{"key":"ref152","article-title":"Traffic sign recognition database","author":"Huang","year":"2020"},{"key":"ref153","article-title":"Objects as points","author":"Zhou","year":"2019"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.510"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00678"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298878"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.223"},{"key":"ref158","first-page":"568","article-title":"Two-stream convolutional networks for action recognition in videos","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"27","author":"Simonyan","year":"2014"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2011.6126543"},{"key":"ref160","article-title":"UCF101: A dataset of 101 human actions classes from videos in the wild","author":"Soomro","year":"2012"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.4324\/9781410605337-29"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref163","article-title":"Mobilenets: Efficient convolutional neural networks for mobile vision applications","author":"Howard","year":"2017"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2516982"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.14722\/autosec.2022.23032"},{"key":"ref166","first-page":"22530","article-title":"Multi-agent trajectory prediction with fuzzy query attention","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Kamra","year":"2020"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2018.00141"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00967"},{"key":"ref169","article-title":"Light-head R-CNN: In defense of two-stage object detector","author":"Li","year":"2017"},{"key":"ref170","article-title":"YOLOV4: Optimal speed and accuracy of object detection","author":"Bochkovskiy","year":"2020"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00472"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00102"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00563"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01101"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58592-1_5"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.3390\/s18103337"},{"issue":"11","key":"ref177","first-page":"120","article-title":"The opencv library","volume":"25","author":"Bradski","year":"2000","journal-title":"Dr Dobb\u2019s J., Softw. Tools Professional Programmer"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.438"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00567"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00730"}],"container-title":["IEEE Transactions on Intelligent Vehicles"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/7274857\/11231124\/10723812.pdf?arnumber=10723812","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T19:47:42Z","timestamp":1762804062000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10723812\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9]]},"references-count":180,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tiv.2024.3484152","relation":{},"ISSN":["2379-8904","2379-8858"],"issn-type":[{"value":"2379-8904","type":"electronic"},{"value":"2379-8858","type":"print"}],"subject":[],"published":{"date-parts":[[2025,9]]}}}