{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T16:50:47Z","timestamp":1775580647100,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T00:00:00Z","timestamp":1572998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Top-notch Youth Talents Program of China Youth Innovation Promotion Association CAS Beijing Nova Program Beijing Nat","award":["No.JQ18011"],"award-info":[{"award-number":["No.JQ18011"]}]},{"name":"National Key R&D Program of China","award":["No.2016QY04W0805"],"award-info":[{"award-number":["No.2016QY04W0805"]}]},{"name":"National Natural Science Foundation of China (NSFC)","award":["U1836211 61728209"],"award-info":[{"award-number":["U1836211 61728209"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,6]]},"DOI":"10.1145\/3319535.3354259","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T13:08:32Z","timestamp":1573132112000},"page":"1989-2004","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":135,"title":["Seeing isn't Believing"],"prefix":"10.1145","author":[{"given":"Yue","family":"Zhao","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Hong","family":"Zhu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Ruigang","family":"Liang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Qintao","family":"Shen","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Shengzhi","family":"Zhang","sequence":"additional","affiliation":[{"name":"Metropolitan College, Boston University, Boston, MA, USA"}]},{"given":"Kai","family":"Chen","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2014. Common Objects in Context Dataset. http:\/\/cocodataset.org\/.  2014. Common Objects in Context Dataset. http:\/\/cocodataset.org\/."},{"key":"e_1_3_2_2_2_1","unstructured":"2014. MSCOCO Dataset. https:\/\/github.com\/cocodataset\/cocoapi.  2014. MSCOCO Dataset. https:\/\/github.com\/cocodataset\/cocoapi."},{"key":"e_1_3_2_2_3_1","unstructured":"2016. The stopping distances table provided in Queensland Government website. https:\/\/www.qld.gov.au\/transport\/safety\/road-safety\/driving-safely\/stopping - distances.  2016. The stopping distances table provided in Queensland Government website. https:\/\/www.qld.gov.au\/transport\/safety\/road-safety\/driving-safely\/stopping - distances."},{"key":"e_1_3_2_2_4_1","unstructured":"2017. ApolloAuto. https:\/\/github.com\/ApolloAuto\/apollo.  2017. ApolloAuto. https:\/\/github.com\/ApolloAuto\/apollo."},{"key":"e_1_3_2_2_5_1","unstructured":"2017. ImageSegmentation. https:\/\/github.com\/GeorgeSeif\/Semantic-Segmen tation-Suite.  2017. ImageSegmentation. https:\/\/github.com\/GeorgeSeif\/Semantic-Segmen tation-Suite."},{"key":"e_1_3_2_2_6_1","volume-title":"Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples. arXiv preprint arXiv:1802.00420","author":"Athalye Anish","year":"2018","unstructured":"Anish Athalye , Nicholas Carlini , and David Wagner . 2018. Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples. arXiv preprint arXiv:1802.00420 ( 2018 ). Anish Athalye, Nicholas Carlini, and David Wagner. 2018. Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples. arXiv preprint arXiv:1802.00420 (2018)."},{"key":"e_1_3_2_2_7_1","volume-title":"Synthesizing robust adversarial examples. arXiv preprint arXiv:1707.07397","author":"Athalye Anish","year":"2017","unstructured":"Anish Athalye and Ilya Sutskever . 2017. Synthesizing robust adversarial examples. arXiv preprint arXiv:1707.07397 ( 2017 ). Anish Athalye and Ilya Sutskever. 2017. Synthesizing robust adversarial examples. arXiv preprint arXiv:1707.07397 (2017)."},{"key":"e_1_3_2_2_8_1","volume-title":"Adversarial patch. arXiv preprint arXiv:1712.09665","author":"Brown Tom B","year":"2017","unstructured":"Tom B Brown , Dandelion Man\u00e9 , Aurko Roy , Mart\u00edn Abadi , and Justin Gilmer . 2017. Adversarial patch. arXiv preprint arXiv:1712.09665 ( 2017 ). Tom B Brown, Dandelion Man\u00e9, Aurko Roy, Mart\u00edn Abadi, and Justin Gilmer. 2017. Adversarial patch. arXiv preprint arXiv:1712.09665 (2017)."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"e_1_3_2_2_10_1","volume-title":"Robust Physical Adversarial Attack on Faster R-CNN Object Detector. CoRR abs\/1804.05810","author":"Chen Shang-Tse","year":"2018","unstructured":"Shang-Tse Chen , Cory Cornelius , Jason Martin , and Duen Horng Chau . 2018. Robust Physical Adversarial Attack on Faster R-CNN Object Detector. CoRR abs\/1804.05810 ( 2018 ). arXiv:1804.05810 http:\/\/arxiv.org\/abs\/1804.05810 Shang-Tse Chen, Cory Cornelius, Jason Martin, and Duen Horng Chau. 2018. Robust Physical Adversarial Attack on Faster R-CNN Object Detector. CoRR abs\/1804.05810 (2018). arXiv:1804.05810 http:\/\/arxiv.org\/abs\/1804.05810"},{"key":"e_1_3_2_2_11_1","unstructured":"Jifeng Dai Yi Li Kaiming He and Jian Sun. 2016. R-FCN: Object detection via region-based fully convolutional networks. In Advances in neural information processing systems. 379--387.  Jifeng Dai Yi Li Kaiming He and Jian Sun. 2016. R-FCN: Object detection via region-based fully convolutional networks. In Advances in neural information processing systems. 379--387."},{"key":"e_1_3_2_2_12_1","volume-title":"A study of the effect of jpg compression on adversarial images. arXiv preprint arXiv:1608.00853","author":"Dziugaite Gintare Karolina","year":"2016","unstructured":"Gintare Karolina Dziugaite , Zoubin Ghahramani , and Daniel M Roy . 2016. A study of the effect of jpg compression on adversarial images. arXiv preprint arXiv:1608.00853 ( 2016 ). Gintare Karolina Dziugaite, Zoubin Ghahramani, and Daniel M Roy. 2016. A study of the effect of jpg compression on adversarial images. arXiv preprint arXiv:1608.00853 (2016)."},{"key":"e_1_3_2_2_13_1","volume-title":"You Only Look Twice: Rapid Multi-Scale Object Detection In Satellite Imagery. CoRR abs\/1805.09512","author":"Etten Adam Van","year":"2018","unstructured":"Adam Van Etten . 2018. You Only Look Twice: Rapid Multi-Scale Object Detection In Satellite Imagery. CoRR abs\/1805.09512 ( 2018 ). arXiv:1805.09512 http:\/\/arxiv. org\/abs\/1805.09512 Adam Van Etten. 2018. You Only Look Twice: Rapid Multi-Scale Object Detection In Satellite Imagery. CoRR abs\/1805.09512 (2018). arXiv:1805.09512 http:\/\/arxiv. org\/abs\/1805.09512"},{"key":"e_1_3_2_2_14_1","volume-title":"Robust Physical-World Attacks on Machine Learning Models. CoRR abs\/1707.08945","author":"Evtimov Ivan","year":"2017","unstructured":"Ivan Evtimov , Kevin Eykholt , Earlence Fernandes , Tadayoshi Kohno , Bo Li , Atul Prakash , Amir Rahmati , and Dawn Song . 2017. Robust Physical-World Attacks on Machine Learning Models. CoRR abs\/1707.08945 ( 2017 ). arXiv:1707.08945 http:\/\/arxiv.org\/abs\/1707.08945 Ivan Evtimov, Kevin Eykholt, Earlence Fernandes, Tadayoshi Kohno, Bo Li, Atul Prakash, Amir Rahmati, and Dawn Song. 2017. Robust Physical-World Attacks on Machine Learning Models. CoRR abs\/1707.08945 (2017). arXiv:1707.08945 http:\/\/arxiv.org\/abs\/1707.08945"},{"key":"e_1_3_2_2_15_1","volume-title":"12th {USENIX} Workshop on Offensive Technologies ({WOOT} 18).","author":"Eykholt Kevin","unstructured":"Kevin Eykholt , Ivan Evtimov , Earlence Fernandes , Bo Li , Amir Rahmati , Florian Tramer , Atul Prakash , Tadayoshi Kohno , and Dawn Song . 2018. Physical Adversarial Examples for Object Detectors . In 12th {USENIX} Workshop on Offensive Technologies ({WOOT} 18). Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Florian Tramer, Atul Prakash, Tadayoshi Kohno, and Dawn Song. 2018. Physical Adversarial Examples for Object Detectors. In 12th {USENIX} Workshop on Offensive Technologies ({WOOT} 18)."},{"key":"e_1_3_2_2_16_1","volume-title":"Fast R-CNN. In IEEE International Conference on Computer Vision.","author":"Girshick Ross","year":"2015","unstructured":"Ross Girshick . 2015 . Fast R-CNN. In IEEE International Conference on Computer Vision. Ross Girshick. 2015. Fast R-CNN. In IEEE International Conference on Computer Vision."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.81"},{"key":"e_1_3_2_2_18_1","volume-title":"Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572","author":"Goodfellow Ian J","year":"2014","unstructured":"Ian J Goodfellow , Jonathon Shlens , and Christian Szegedy . 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 ( 2014 ). Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)."},{"key":"e_1_3_2_2_19_1","volume-title":"Countering adversarial images using input transformations. arXiv preprint arXiv:1711.00117","author":"Guo Chuan","year":"2017","unstructured":"Chuan Guo , Mayank Rana , Moustapha Cisse , and Laurens van der Maaten . 2017. Countering adversarial images using input transformations. arXiv preprint arXiv:1711.00117 ( 2017 ). Chuan Guo, Mayank Rana, Moustapha Cisse, and Laurens van der Maaten. 2017. Countering adversarial images using input transformations. arXiv preprint arXiv:1711.00117 (2017)."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.322"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2015.2389824"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00014"},{"key":"e_1_3_2_2_23_1","volume-title":"Adversarial examples in the physical world. arXiv preprint arXiv:1607.02533","author":"Kurakin Alexey","year":"2016","unstructured":"Alexey Kurakin , Ian Goodfellow , and Samy Bengio . 2016. Adversarial examples in the physical world. arXiv preprint arXiv:1607.02533 ( 2016 ). Alexey Kurakin, Ian Goodfellow, and Samy Bengio. 2016. Adversarial examples in the physical world. arXiv preprint arXiv:1607.02533 (2016)."},{"key":"e_1_3_2_2_24_1","volume-title":"Light-head r-cnn: In defense of two-stage object detector. arXiv preprint arXiv:1711.07264","author":"Li Zeming","year":"2017","unstructured":"Zeming Li , Chao Peng , Gang Yu , Xiangyu Zhang , Yangdong Deng , and Jian Sun . 2017. Light-head r-cnn: In defense of two-stage object detector. arXiv preprint arXiv:1711.07264 ( 2017 ). Zeming Li, Chao Peng, Gang Yu, Xiangyu Zhang, Yangdong Deng, and Jian Sun. 2017. Light-head r-cnn: In defense of two-stage object detector. arXiv preprint arXiv:1711.07264 (2017)."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00191"},{"key":"e_1_3_2_2_26_1","unstructured":"Li Liu Wanli Ouyang XiaogangWang Paul Fieguth Jie Chen Xinwang Liu and Matti Pietik\u00e4inen. 2018. Deep Learning for Generic Object Detection: A Survey. (2018).  Li Liu Wanli Ouyang XiaogangWang Paul Fieguth Jie Chen Xinwang Liu and Matti Pietik\u00e4inen. 2018. Deep Learning for Generic Object Detection: A Survey. (2018)."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46448-0_2"},{"key":"e_1_3_2_2_28_1","volume-title":"No need to worry about adversarial examples in object detection in autonomous vehicles. arXiv preprint arXiv:1707.03501","author":"Lu Jiajun","year":"2017","unstructured":"Jiajun Lu , Hussein Sibai , Evan Fabry , and David Forsyth . 2017. No need to worry about adversarial examples in object detection in autonomous vehicles. arXiv preprint arXiv:1707.03501 ( 2017 ). Jiajun Lu, Hussein Sibai, Evan Fabry, and David Forsyth. 2017. No need to worry about adversarial examples in object detection in autonomous vehicles. arXiv preprint arXiv:1707.03501 (2017)."},{"key":"e_1_3_2_2_29_1","volume-title":"2016 IEEE European Symposium on. IEEE, 372--387","author":"Papernot Nicolas","year":"2016","unstructured":"Nicolas Papernot , Patrick McDaniel , Somesh Jha , Matt Fredrikson , Z Berkay Celik , and Ananthram Swami . 2016 . The limitations of deep learning in adversarial settings. In Security and Privacy (EuroS&P) , 2016 IEEE European Symposium on. IEEE, 372--387 . Nicolas Papernot, Patrick McDaniel, Somesh Jha, Matt Fredrikson, Z Berkay Celik, and Ananthram Swami. 2016. The limitations of deep learning in adversarial settings. In Security and Privacy (EuroS&P), 2016 IEEE European Symposium on. IEEE, 372--387."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"e_1_3_2_2_32_1","volume-title":"YOLO9000: better, faster, stronger. arXiv preprint","author":"Redmon Joseph","year":"2017","unstructured":"Joseph Redmon and Ali Farhadi . 2017. YOLO9000: better, faster, stronger. arXiv preprint ( 2017 ). Joseph Redmon and Ali Farhadi. 2017. YOLO9000: better, faster, stronger. arXiv preprint (2017)."},{"key":"e_1_3_2_2_33_1","volume-title":"Yolov3: An incremental improvement. arXiv preprint arXiv:1804.02767","author":"Redmon Joseph","year":"2018","unstructured":"Joseph Redmon and Ali Farhadi . 2018. Yolov3: An incremental improvement. arXiv preprint arXiv:1804.02767 ( 2018 ). Joseph Redmon and Ali Farhadi. 2018. Yolov3: An incremental improvement. arXiv preprint arXiv:1804.02767 (2018)."},{"key":"e_1_3_2_2_34_1","unstructured":"Shaoqing Ren Kaiming He Ross Girshick and Jian Sun. 2015. Faster R-CNN: Towards real-time object detection with region proposal networks. In Advances in neural information processing systems. 91--99.  Shaoqing Ren Kaiming He Ross Girshick and Jian Sun. 2015. Faster R-CNN: Towards real-time object detection with region proposal networks. In Advances in neural information processing systems. 91--99."},{"key":"e_1_3_2_2_35_1","volume-title":"Defense-GAN: Protecting classifiers against adversarial attacks using generative models. arXiv preprint arXiv:1805.06605","author":"Samangouei Pouya","year":"2018","unstructured":"Pouya Samangouei , Maya Kabkab , and Rama Chellappa . 2018. Defense-GAN: Protecting classifiers against adversarial attacks using generative models. arXiv preprint arXiv:1805.06605 ( 2018 ). Pouya Samangouei, Maya Kabkab, and Rama Chellappa. 2018. Defense-GAN: Protecting classifiers against adversarial attacks using generative models. arXiv preprint arXiv:1805.06605 (2018)."},{"key":"e_1_3_2_2_36_1","volume-title":"OverFeat: Integrated Recognition, Localization and Detection using Convolutional Networks. Eprint Arxiv","author":"Sermanet Pierre","year":"2013","unstructured":"Pierre Sermanet , David Eigen , Xiang Zhang , Michael Mathieu , Rob Fergus , and Yann Lecun . 2013. OverFeat: Integrated Recognition, Localization and Detection using Convolutional Networks. Eprint Arxiv ( 2013 ). Pierre Sermanet, David Eigen, Xiang Zhang, Michael Mathieu, Rob Fergus, and Yann Lecun. 2013. OverFeat: Integrated Recognition, Localization and Detection using Convolutional Networks. Eprint Arxiv (2013)."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978392"},{"key":"e_1_3_2_2_38_1","volume-title":"Learning to drive: Perception for autonomous cars","author":"Stavens David Michael","unstructured":"David Michael Stavens . 2011. Learning to drive: Perception for autonomous cars . Stanford University . David Michael Stavens. 2011. Learning to drive: Perception for autonomous cars. Stanford University."},{"key":"e_1_3_2_2_39_1","volume-title":"Intriguing properties of neural networks. Computer Science","author":"Szegedy Christian","year":"2013","unstructured":"Christian Szegedy , Wojciech Zaremba , Ilya Sutskever , Joan Bruna , Dumitru Erhan , Ian Goodfellow , and Rob Fergus . 2013. Intriguing properties of neural networks. Computer Science ( 2013 ). Christian Szegedy,Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2013. Intriguing properties of neural networks. Computer Science (2013)."},{"key":"e_1_3_2_2_40_1","volume-title":"Ensemble adversarial training: Attacks and defenses. arXiv preprint arXiv:1705.07204","author":"Tram\u00e8r Florian","year":"2017","unstructured":"Florian Tram\u00e8r , Alexey Kurakin , Nicolas Papernot , Ian Goodfellow , Dan Boneh , and Patrick McDaniel . 2017. Ensemble adversarial training: Attacks and defenses. arXiv preprint arXiv:1705.07204 ( 2017 ). Florian Tram\u00e8r, Alexey Kurakin, Nicolas Papernot, Ian Goodfellow, Dan Boneh, and Patrick McDaniel. 2017. Ensemble adversarial training: Attacks and defenses. arXiv preprint arXiv:1705.07204 (2017)."},{"key":"e_1_3_2_2_41_1","volume-title":"Mitigating adversarial effects through randomization. arXiv preprint arXiv:1711.01991","author":"Xie Cihang","year":"2017","unstructured":"Cihang Xie , JianyuWang, Zhishuai Zhang , Zhou Ren , and Alan Yuille . 2017. Mitigating adversarial effects through randomization. arXiv preprint arXiv:1711.01991 ( 2017 ). Cihang Xie, JianyuWang, Zhishuai Zhang, Zhou Ren, and Alan Yuille. 2017. Mitigating adversarial effects through randomization. arXiv preprint arXiv:1711.01991 (2017)."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.153"},{"key":"e_1_3_2_2_43_1","volume-title":"Feature denoising for improving adversarial robustness. arXiv preprint arXiv:1812.03411","author":"Xie Cihang","year":"2018","unstructured":"Cihang Xie , Yuxin Wu , Laurens van der Maaten , Alan Yuille , and Kaiming He. 2018. Feature denoising for improving adversarial robustness. arXiv preprint arXiv:1812.03411 ( 2018 ). Cihang Xie, Yuxin Wu, Laurens van der Maaten, Alan Yuille, and Kaiming He. 2018. Feature denoising for improving adversarial robustness. arXiv preprint arXiv:1812.03411 (2018)."},{"key":"e_1_3_2_2_44_1","volume-title":"Realistic Adversarial Examples in 3D Meshes. CoRR abs\/1810.05206","author":"Yang Dawei","year":"2018","unstructured":"Dawei Yang , Chaowei Xiao , Bo Li , Jia Deng , and Mingyan Liu . 2018. Realistic Adversarial Examples in 3D Meshes. CoRR abs\/1810.05206 ( 2018 ). arXiv:1810.05206 http:\/\/arxiv.org\/abs\/1810.05206 Dawei Yang, Chaowei Xiao, Bo Li, Jia Deng, and Mingyan Liu. 2018. Realistic Adversarial Examples in 3D Meshes. CoRR abs\/1810.05206 (2018). arXiv:1810.05206 http:\/\/arxiv.org\/abs\/1810.05206"},{"key":"e_1_3_2_2_45_1","volume-title":"CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. USENIX Security Symposium","author":"Yuan Xuejing","year":"2018","unstructured":"Xuejing Yuan , Yuxuan Chen , Yue Zhao , Yunhui Long , Xiaokang Liu , Kai Chen , Shengzhi Zhang , Heqing Huang , XiaoFengWang, and Carl A Gunter . 2018 . CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. USENIX Security Symposium (2018). Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, XiaoFengWang, and Carl A Gunter. 2018. CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. USENIX Security Symposium (2018)."}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3354259","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3354259","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:32Z","timestamp":1750203872000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3354259"}},"subtitle":["Towards More Robust Adversarial Attack Against Real World Object Detectors"],"short-title":[],"issued":{"date-parts":[[2019,11,6]]},"references-count":45,"alternative-id":["10.1145\/3319535.3354259","10.1145\/3319535"],"URL":"https:\/\/doi.org\/10.1145\/3319535.3354259","relation":{},"subject":[],"published":{"date-parts":[[2019,11,6]]},"assertion":[{"value":"2019-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}