{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T13:04:01Z","timestamp":1777467841706,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T00:00:00Z","timestamp":1621814400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,24]]},"DOI":"10.1145\/3433210.3453106","type":"proceedings-article","created":{"date-parts":[[2021,6,4]],"date-time":"2021-06-04T15:26:39Z","timestamp":1622820399000},"page":"349-362","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["Robust Roadside Physical Adversarial Attack Against Deep Learning in Lidar Perception Modules"],"prefix":"10.1145","author":[{"given":"Kaichen","family":"Yang","sequence":"first","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"given":"Tzungyu","family":"Tsai","sequence":"additional","affiliation":[{"name":"National Tsing Hua University, Hsinchu, Taiwan Roc"}]},{"given":"Honggang","family":"Yu","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"given":"Max","family":"Panoff","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]},{"given":"Tsung-Yi","family":"Ho","sequence":"additional","affiliation":[{"name":"National Tsing Hua University, Hsinchu, Taiwan Roc"}]},{"given":"Yier","family":"Jin","sequence":"additional","affiliation":[{"name":"University of Florida, Gainesville, FL, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,6,4]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"[n.d.]. https:\/\/pytorch3d.readthedocs.io\/en\/latest\/modules\/loss.html.  [n.d.]. https:\/\/pytorch3d.readthedocs.io\/en\/latest\/modules\/loss.html."},{"key":"e_1_3_2_2_2_1","volume-title":"Baidu Apollo team","year":"2017","unstructured":"[n.d.]. Baidu Apollo team ( 2017 ), Apollo : Open Source Autonomous Driving, howpublished = https:\/\/github.com\/ApolloAuto\/apollo, note = Accessed : 2019-02-11. [n.d.]. Baidu Apollo team (2017), Apollo: Open Source Autonomous Driving, howpublished = https:\/\/github.com\/ApolloAuto\/apollo, note = Accessed: 2019-02-11."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339815"},{"key":"e_1_3_2_2_4_1","volume-title":"2019 b. Adversarial objects against lidar-based autonomous driving systems. arXiv preprint arXiv:1907.05418","author":"Cao Yulong","year":"2019","unstructured":"Yulong Cao , Chaowei Xiao , Dawei Yang , Jing Fang , Ruigang Yang , Mingyan Liu , and Bo Li . 2019 b. Adversarial objects against lidar-based autonomous driving systems. arXiv preprint arXiv:1907.05418 ( 2019 ). Yulong Cao, Chaowei Xiao, Dawei Yang, Jing Fang, Ruigang Yang, Mingyan Liu, and Bo Li. 2019 b. Adversarial objects against lidar-based autonomous driving systems. arXiv preprint arXiv:1907.05418 (2019)."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.04.014"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140448"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.691"},{"key":"e_1_3_2_2_9_1","volume-title":"Certified Adversarial Robustness via Randomized Smoothing. CoRR","author":"Cohen Jeremy M.","year":"2019","unstructured":"Jeremy M. Cohen , Elan Rosenfeld , and J. Zico Kolter . 2019. Certified Adversarial Robustness via Randomized Smoothing. CoRR , Vol. abs\/ 1902 .02918 ( 2019 ). arxiv: 1902.02918 http:\/\/arxiv.org\/abs\/1902.02918 Jeremy M. Cohen, Elan Rosenfeld, and J. Zico Kolter. 2019. Certified Adversarial Robustness via Randomized Smoothing. CoRR, Vol. abs\/1902.02918 (2019). arxiv: 1902.02918 http:\/\/arxiv.org\/abs\/1902.02918"},{"key":"e_1_3_2_2_10_1","volume-title":"Trojan Attack on Deep Generative Models in Autonomous Driving. In International Conference on Security and Privacy in Communication Systems. Springer, 299--318","author":"Ding Shaohua","year":"2019","unstructured":"Shaohua Ding , Yulong Tian , Fengyuan Xu , Qun Li , and Sheng Zhong . 2019 . Trojan Attack on Deep Generative Models in Autonomous Driving. In International Conference on Security and Privacy in Communication Systems. Springer, 299--318 . Shaohua Ding, Yulong Tian, Fengyuan Xu, Qun Li, and Sheng Zhong. 2019. Trojan Attack on Deep Generative Models in Autonomous Driving. In International Conference on Security and Privacy in Communication Systems. Springer, 299--318."},{"key":"e_1_3_2_2_11_1","volume-title":"The KITTI Vision Benchmark Suite. In Conference on Computer Vision and Pattern Recognition (CVPR).","author":"Geiger Andreas","year":"2012","unstructured":"Andreas Geiger , Philip Lenz , and Raquel Urtasun . 2012 . Are we ready for Autonomous Driving? The KITTI Vision Benchmark Suite. In Conference on Computer Vision and Pattern Recognition (CVPR). Andreas Geiger, Philip Lenz, and Raquel Urtasun. 2012. Are we ready for Autonomous Driving? The KITTI Vision Benchmark Suite. In Conference on Computer Vision and Pattern Recognition (CVPR)."},{"key":"e_1_3_2_2_12_1","volume-title":"Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572","author":"Goodfellow Ian J","year":"2014","unstructured":"Ian J Goodfellow , Jonathon Shlens , and Christian Szegedy . 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 ( 2014 ). Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)."},{"key":"e_1_3_2_2_13_1","volume-title":"Countering adversarial images using input transformations. arXiv preprint arXiv:1711.00117","author":"Guo Chuan","year":"2017","unstructured":"Chuan Guo , Mayank Rana , Moustapha Cisse , and Laurens van der Maaten . 2017. Countering adversarial images using input transformations. arXiv preprint arXiv:1711.00117 ( 2017 ). Chuan Guo, Mayank Rana, Moustapha Cisse, and Laurens van der Maaten. 2017. Countering adversarial images using input transformations. arXiv preprint arXiv:1711.00117 (2017)."},{"key":"e_1_3_2_2_14_1","unstructured":"jae251. 2019. lidar_simulation. https:\/\/github.com\/jae251\/lidar_simulation.  jae251. 2019. lidar_simulation. https:\/\/github.com\/jae251\/lidar_simulation."},{"key":"e_1_3_2_2_15_1","volume-title":"2018 IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS). 1--8.","author":"Ku J.","unstructured":"J. Ku , M. Mozifian , J. Lee , A. Harakeh , and S. L. Waslander . 2018. Joint 3D Proposal Generation and Object Detection from View Aggregation . In 2018 IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS). 1--8. J. Ku, M. Mozifian, J. Lee, A. Harakeh, and S. L. Waslander. 2018. Joint 3D Proposal Generation and Object Detection from View Aggregation. In 2018 IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS). 1--8."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01298"},{"key":"e_1_3_2_2_17_1","volume-title":"Patch Refinement--Localized 3D Object Detection. arXiv preprint arXiv:1910.04093","author":"Lehner Johannes","year":"2019","unstructured":"Johannes Lehner , Andreas Mitterecker , Thomas Adler , Markus Hofmarcher , Bernhard Nessler , and Sepp Hochreiter . 2019. Patch Refinement--Localized 3D Object Detection. arXiv preprint arXiv:1910.04093 ( 2019 ). Johannes Lehner, Andreas Mitterecker, Thomas Adler, Markus Hofmarcher, Bernhard Nessler, and Sepp Hochreiter. 2019. Patch Refinement--Localized 3D Object Detection. arXiv preprint arXiv:1910.04093 (2019)."},{"key":"e_1_3_2_2_18_1","volume-title":"Certifiably Robust Interpretation in Deep Learning. CoRR","author":"Levine Alexander","year":"2019","unstructured":"Alexander Levine , Sahil Singla , and Soheil Feizi . 2019. Certifiably Robust Interpretation in Deep Learning. CoRR , Vol. arXiv: 1905 .12105 ( 2019 ). arxiv: 1905.12105 https:\/\/arxiv.org\/abs\/1905.12105 Alexander Levine, Sahil Singla, and Soheil Feizi. 2019. Certifiably Robust Interpretation in Deep Learning. CoRR, Vol. arXiv:1905.12105 (2019). arxiv: 1905.12105 https:\/\/arxiv.org\/abs\/1905.12105"},{"key":"e_1_3_2_2_19_1","volume-title":"Adversarial camera stickers: A physical camera-based attack on deep learning systems. CoRR","author":"Li Juncheng","year":"2019","unstructured":"Juncheng Li , Frank R. Schmidt , and J. Zico Kolter . 2019. Adversarial camera stickers: A physical camera-based attack on deep learning systems. CoRR , Vol. abs\/ 1904 .00759 ( 2019 ). arxiv: 1904.00759 http:\/\/arxiv.org\/abs\/1904.00759 Juncheng Li, Frank R. Schmidt, and J. Zico Kolter. 2019. Adversarial camera stickers: A physical camera-based attack on deep learning systems. CoRR, Vol. abs\/1904.00759 (2019). arxiv: 1904.00759 http:\/\/arxiv.org\/abs\/1904.00759"},{"key":"e_1_3_2_2_20_1","volume-title":"Extending Adversarial Attacks and Defenses to Deep 3D Point Cloud Classifiers. arXiv preprint arXiv:1901.03006","author":"Liu Daniel","year":"2019","unstructured":"Daniel Liu , Ronald Yu , and Hao Su. 2019. Extending Adversarial Attacks and Defenses to Deep 3D Point Cloud Classifiers. arXiv preprint arXiv:1901.03006 ( 2019 ). Daniel Liu, Ronald Yu, and Hao Su. 2019. Extending Adversarial Attacks and Defenses to Deep 3D Point Cloud Classifiers. arXiv preprint arXiv:1901.03006 (2019)."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46448-0_2"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"e_1_3_2_2_23_1","volume-title":"Transferability in machine learning: from phenomena to black-box attacks using adversarial samples. arXiv preprint arXiv:1605.07277","author":"Papernot Nicolas","year":"2016","unstructured":"Nicolas Papernot , Patrick McDaniel , and Ian Goodfellow . 2016a. Transferability in machine learning: from phenomena to black-box attacks using adversarial samples. arXiv preprint arXiv:1605.07277 ( 2016 ). Nicolas Papernot, Patrick McDaniel, and Ian Goodfellow. 2016a. Transferability in machine learning: from phenomena to black-box attacks using adversarial samples. arXiv preprint arXiv:1605.07277 (2016)."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"e_1_3_2_2_25_1","volume-title":"2016 IEEE Symposium on. IEEE, 582--597","author":"Papernot Nicolas","year":"2016","unstructured":"Nicolas Papernot , Patrick McDaniel , Xi Wu , Somesh Jha , and Ananthram Swami . 2016 c. Distillation as a defense to adversarial perturbations against deep neural networks. In Security and Privacy (S&P) , 2016 IEEE Symposium on. IEEE, 582--597 . Nicolas Papernot, Patrick McDaniel, Xi Wu, Somesh Jha, and Ananthram Swami. 2016c. Distillation as a defense to adversarial perturbations against deep neural networks. In Security and Privacy (S&P), 2016 IEEE Symposium on. IEEE, 582--597."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00102"},{"key":"e_1_3_2_2_27_1","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 652--660","author":"Qi Charles R","year":"2017","unstructured":"Charles R Qi , Hao Su , Kaichun Mo , and Leonidas J Guibas . 2017 a. Pointnet: Deep learning on point sets for 3d classification and segmentation . In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 652--660 . Charles R Qi, Hao Su, Kaichun Mo, and Leonidas J Guibas. 2017a. Pointnet: Deep learning on point sets for 3d classification and segmentation. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 652--660."},{"key":"e_1_3_2_2_28_1","unstructured":"Charles Ruizhongtai Qi Li Yi Hao Su and Leonidas J Guibas. 2017b. Pointnet+: Deep hierarchical feature learning on point sets in a metric space. In Advances in neural information processing systems. 5099--5108.  Charles Ruizhongtai Qi Li Yi Hao Su and Leonidas J Guibas. 2017b. Pointnet+: Deep hierarchical feature learning on point sets in a metric space. In Advances in neural information processing systems. 5099--5108."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"e_1_3_2_2_30_1","unstructured":"Shaoqing Ren Kaiming He Ross Girshick and Jian Sun. 2015. Faster r-cnn: Towards real-time object detection with region proposal networks. In Advances in neural information processing systems. 91--99.  Shaoqing Ren Kaiming He Ross Girshick and Jian Sun. 2015. Faster r-cnn: Towards real-time object detection with region proposal networks. In Advances in neural information processing systems. 91--99."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"crossref","unstructured":"Guodong Rong Byung Hyun Shin Hadi Tabatabaee Qiang Lu Steve Lemke M?rti?? Mo?eiko Eric Boise Geehoon Uhm Mark Gerow Shalin Mehta Eugene Agafonov Tae Hyung Kim Eric Sterner Keunhae Ushiroda Michael Reyes Dmitry Zelenkovsky and Seonman Kim. 2020. LGSVL Simulator: A High Fidelity Simulator for Autonomous Driving. arxiv: 2005.03778 [cs.RO]  Guodong Rong Byung Hyun Shin Hadi Tabatabaee Qiang Lu Steve Lemke M?rti?? Mo?eiko Eric Boise Geehoon Uhm Mark Gerow Shalin Mehta Eugene Agafonov Tae Hyung Kim Eric Sterner Keunhae Ushiroda Michael Reyes Dmitry Zelenkovsky and Seonman Kim. 2020. LGSVL Simulator: A High Fidelity Simulator for Autonomous Driving. arxiv: 2005.03778 [cs.RO]","DOI":"10.1109\/ITSC45102.2020.9294422"},{"key":"e_1_3_2_2_32_1","volume-title":"Adversarial manipulation of deep representations. arXiv preprint arXiv:1511.05122","author":"Sabour Sara","year":"2015","unstructured":"Sara Sabour , Yanshuai Cao , Fartash Faghri , and David J Fleet . 2015. Adversarial manipulation of deep representations. arXiv preprint arXiv:1511.05122 ( 2015 ). Sara Sabour, Yanshuai Cao, Fartash Faghri, and David J Fleet. 2015. Adversarial manipulation of deep representations. arXiv preprint arXiv:1511.05122 (2015)."},{"key":"e_1_3_2_2_33_1","unstructured":"Shaoshuai Shi Chaoxu Guo Li Jiang Zhe Wang Jianping Shi Xiaogang Wang and Hongsheng Li. 2020. PV-RCNN: Point-Voxel Feature Set Abstraction for 3D Object Detection. In CVPR.  Shaoshuai Shi Chaoxu Guo Li Jiang Zhe Wang Jianping Shi Xiaogang Wang and Hongsheng Li. 2020. PV-RCNN: Point-Voxel Feature Set Abstraction for 3D Object Detection. In CVPR."},{"key":"e_1_3_2_2_34_1","volume-title":"PointRCNN: 3D Object Proposal Generation and Detection from Point Cloud. CoRR","author":"Shi Shaoshuai","year":"2018","unstructured":"Shaoshuai Shi , Xiaogang Wang , and Hongsheng Li. 2018. PointRCNN: 3D Object Proposal Generation and Detection from Point Cloud. CoRR , Vol. abs\/ 1812 .04244 ( 2018 ). arxiv: 1812.04244 http:\/\/arxiv.org\/abs\/1812.04244 Shaoshuai Shi, Xiaogang Wang, and Hongsheng Li. 2018. PointRCNN: 3D Object Proposal Generation and Detection from Point Cloud. CoRR, Vol. abs\/1812.04244 (2018). arxiv: 1812.04244 http:\/\/arxiv.org\/abs\/1812.04244"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00086"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_22"},{"key":"e_1_3_2_2_37_1","volume-title":"Qi Alfred Chen, and Z Morley Mao","author":"Sun Jiachen","year":"2020","unstructured":"Jiachen Sun , Yulong Cao , Qi Alfred Chen, and Z Morley Mao . 2020 . Towards robust lidar-based perception in autonomous driving: General black-box adversarial sensor attack and countermeasures. In 29th $$USENIX$$ Security Symposium ($$USENIX$$ Security 20). 877--894. Jiachen Sun, Yulong Cao, Qi Alfred Chen, and Z Morley Mao. 2020. Towards robust lidar-based perception in autonomous driving: General black-box adversarial sensor attack and countermeasures. In 29th $$USENIX$$ Security Symposium ($$USENIX$$ Security 20). 877--894."},{"key":"e_1_3_2_2_38_1","volume-title":"Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199","author":"Szegedy Christian","year":"2013","unstructured":"Christian Szegedy , Wojciech Zaremba , Ilya Sutskever , Joan Bruna , Dumitru Erhan , Ian Goodfellow , and Rob Fergus . 2013. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 ( 2013 ). Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2013. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)."},{"key":"e_1_3_2_2_39_1","volume-title":"Ensemble adversarial training: Attacks and defenses. arXiv preprint arXiv:1705.07204","author":"Tram\u00e8r Florian","year":"2017","unstructured":"Florian Tram\u00e8r , Alexey Kurakin , Nicolas Papernot , Ian Goodfellow , Dan Boneh , and Patrick McDaniel . 2017. Ensemble adversarial training: Attacks and defenses. arXiv preprint arXiv:1705.07204 ( 2017 ). Florian Tram\u00e8r, Alexey Kurakin, Nicolas Papernot, Ian Goodfellow, Dan Boneh, and Patrick McDaniel. 2017. Ensemble adversarial training: Attacks and defenses. arXiv preprint arXiv:1705.07204 (2017)."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5443"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01373"},{"key":"e_1_3_2_2_42_1","volume-title":"2019 a. Voxel-FPN: multi-scale voxel feature aggregation in 3D object detection from point clouds. arXiv preprint arXiv:1907.05286","author":"Wang Bei","year":"2019","unstructured":"Bei Wang , Jianping An , and Jiayan Cao . 2019 a. Voxel-FPN: multi-scale voxel feature aggregation in 3D object detection from point clouds. arXiv preprint arXiv:1907.05286 ( 2019 ). Bei Wang, Jianping An, and Jiayan Cao. 2019 a. Voxel-FPN: multi-scale voxel feature aggregation in 3D object detection from point clouds. arXiv preprint arXiv:1907.05286 (2019)."},{"key":"e_1_3_2_2_43_1","volume-title":"The IEEE Conference on Computer Vision and Pattern Recognition (CVPR).","author":"Wang Yan","unstructured":"Yan Wang , Wei-Lun Chao , Divyansh Garg , Bharath Hariharan , Mark Campbell , and Kilian Q. Weinberger . 2019 b. Pseudo-LiDAR From Visual Depth Estimation: Bridging the Gap in 3D Object Detection for Autonomous Driving . In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR). Yan Wang, Wei-Lun Chao, Divyansh Garg, Bharath Hariharan, Mark Campbell, and Kilian Q. Weinberger. 2019 b. Pseudo-LiDAR From Visual Depth Estimation: Bridging the Gap in 3D Object Detection for Autonomous Driving. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR)."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00935"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.3390\/s18103337"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00798"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24178"},{"key":"e_1_3_2_2_48_1","volume-title":"Deflecting 3D Adversarial Point Clouds Through Outlier-Guided Removal. arXiv preprint arXiv:1812.11017","author":"Zhou Hang","year":"2018","unstructured":"Hang Zhou , Kejiang Chen , Weiming Zhang , Han Fang , Wenbo Zhou , and Nenghai Yu. 2018. Deflecting 3D Adversarial Point Clouds Through Outlier-Guided Removal. arXiv preprint arXiv:1812.11017 ( 2018 ). Hang Zhou, Kejiang Chen, Weiming Zhang, Han Fang, Wenbo Zhou, and Nenghai Yu. 2018. Deflecting 3D Adversarial Point Clouds Through Outlier-Guided Removal. arXiv preprint arXiv:1812.11017 (2018)."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00472"}],"event":{"name":"ASIA CCS '21: ACM Asia Conference on Computer and Communications Security","location":"Virtual Event Hong Kong","acronym":"ASIA CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3433210.3453106","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3433210.3453106","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:12Z","timestamp":1750193292000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3433210.3453106"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,24]]},"references-count":49,"alternative-id":["10.1145\/3433210.3453106","10.1145\/3433210"],"URL":"https:\/\/doi.org\/10.1145\/3433210.3453106","relation":{},"subject":[],"published":{"date-parts":[[2021,5,24]]},"assertion":[{"value":"2021-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}