{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T06:11:49Z","timestamp":1767766309261,"version":"3.48.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T00:00:00Z","timestamp":1760832000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T00:00:00Z","timestamp":1760832000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,19]]},"DOI":"10.1109\/vtc2025-fall65116.2025.11310106","type":"proceedings-article","created":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T18:33:45Z","timestamp":1767724425000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["ScoreCAM and Segmentation-Based Adversarial Attacks in Autonomous Vehicles"],"prefix":"10.1109","author":[{"given":"Ifrah","family":"Andleeb","sequence":"first","affiliation":[{"name":"University of Windsor,Department of Electrical and Computer Engineering,Windsor,Canada"}]},{"given":"Katsuya","family":"Suto","sequence":"additional","affiliation":[{"name":"Hokkaido University,Faculty of Graduate School of Information Science and Technology,Hokkaido,Japan"}]},{"given":"Mitra","family":"Mirhassani","sequence":"additional","affiliation":[{"name":"University of Windsor,Faculty of Electrical and Computer Engineering,Windsor,Canada"}]},{"given":"Ning","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Windsor,Faculty of Electrical and Computer Engineering,Windsor,Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-1533-9"},{"volume-title":"Autonomous vehicles moving forward: Perspectives from industry leaders","year":"2024","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2024.3458805"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCME57830.2023.10252727"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3061065"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICESC60852.2024.10690061"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT58233.2024.10540922"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1117\/12.3044875"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11760-024-03108-1"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12030725"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13112172"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/3041117"},{"article-title":"Intriguing properties of neural networks","volume-title":"International Conference on Learning Representations (ICLR)","author":"Szegedy","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00175"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3321118"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.displa.2022.102277"},{"article-title":"Explaining and harnessing adversarial examples","year":"2014","author":"Goodfellow","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/IV48863.2021.9575935"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC51644.2023.10060485"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2011.6033395"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICMI60790.2024.10586152"},{"article-title":"Adversarial attack with raindrops","year":"2023","author":"Liu","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01491"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3034899"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011028"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-51167-7_35"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00400"}],"event":{"name":"2025 IEEE 102nd Vehicular Technology Conference (VTC2025-Fall)","start":{"date-parts":[[2025,10,19]]},"location":"Chengdu, China","end":{"date-parts":[[2025,10,22]]}},"container-title":["2025 IEEE 102nd Vehicular Technology Conference (VTC2025-Fall)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11309821\/11309345\/11310106.pdf?arnumber=11310106","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T06:02:30Z","timestamp":1767765750000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11310106\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,19]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/vtc2025-fall65116.2025.11310106","relation":{},"subject":[],"published":{"date-parts":[[2025,10,19]]}}}