{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T14:57:21Z","timestamp":1776783441735,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":77,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,13]],"date-time":"2022-11-13T00:00:00Z","timestamp":1668297600000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-1652669, CNS-1824491"],"award-info":[{"award-number":["CNS-1652669, CNS-1824491"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484766","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"1930-1944","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":60,"title":["I Can See the Light: Attacks on Autonomous Vehicles Using Invisible Lights"],"prefix":"10.1145","author":[{"given":"Wei","family":"Wang","sequence":"first","affiliation":[{"name":"University of Maryland, Baltimore County, Baltimore, MD, USA"}]},{"given":"Yao","family":"Yao","sequence":"additional","affiliation":[{"name":"University of Maryland, Baltimore County, Baltimore, MD, USA"}]},{"given":"Xin","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Maryland, Baltimore County, Baltimore, MD, USA"}]},{"given":"Xiang","family":"Li","sequence":"additional","affiliation":[{"name":"Cambricon SingGo, Nanjing, China"}]},{"given":"Pei","family":"Hao","sequence":"additional","affiliation":[{"name":"University of Maryland, Baltimore County, Baltimore, MD, USA"}]},{"given":"Ting","family":"Zhu","sequence":"additional","affiliation":[{"name":"University of Maryland, Baltimore County, Baltimore, MD, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2021. https:\/\/cleantechnica.com\/tesla-sales\/."},{"key":"e_1_3_2_1_2_1","unstructured":"2021. https:\/\/en.wikipedia.org\/wiki\/Automotive_paint."},{"key":"e_1_3_2_1_3_1","unstructured":"2021. https:\/\/en.wikipedia.org\/wiki\/Extended_Kalman_filter."},{"key":"e_1_3_2_1_4_1","unstructured":"2021. https:\/\/en.wikipedia.org\/wiki\/Infrared."},{"key":"e_1_3_2_1_5_1","unstructured":"2021. https:\/\/github.com\/raulmur\/ORB_SLAM2."},{"key":"e_1_3_2_1_6_1","unstructured":"2021. https:\/\/github.com\/ultralytics\/yolov5."},{"key":"e_1_3_2_1_7_1","unstructured":"2021. https:\/\/hci.iwr.uni-heidelberg.de\/content\/bosch-small-traffic-lights-dataset."},{"key":"e_1_3_2_1_8_1","unstructured":"2021. https:\/\/hub.hamamatsu.com\/jp\/en\/technical-note\/WITS-guide-detector-selection\/index.html."},{"key":"e_1_3_2_1_9_1","unstructured":"2021. https:\/\/science.nasa.gov\/ems\/09_visiblelight."},{"key":"e_1_3_2_1_10_1","unstructured":"2021. https:\/\/science.nasa.gov\/ems\/09_visiblelight."},{"key":"e_1_3_2_1_11_1","unstructured":"2021. https:\/\/www.bosch.com\/stories\/automated-valet-parking\/."},{"key":"e_1_3_2_1_12_1","unstructured":"2021. https:\/\/www.daimler.com\/innovation\/case\/autonomous\/driverless-parking.html."},{"key":"e_1_3_2_1_13_1","unstructured":"2021. https:\/\/www.dji.com\/robomaster-s1."},{"key":"e_1_3_2_1_14_1","unstructured":"2021. https:\/\/www.edmundoptics.com\/knowledge-center\/application-notes\/optics\/the-correct-material-for-infrared-applications\/."},{"key":"e_1_3_2_1_15_1","unstructured":"2021. https:\/\/www.engineeringtoolbox.com\/light-material-reflecting-factor-d_1842.html."},{"key":"e_1_3_2_1_16_1","unstructured":"2021. https:\/\/www.gartner.com\/en\/newsroom\/press-releases."},{"key":"e_1_3_2_1_17_1","unstructured":"2021. https:\/\/www.globenewswire.com\/news-release\/2020\/12\/07\/2140428\/0\/en\/."},{"key":"e_1_3_2_1_18_1","unstructured":"2021. https:\/\/www.mouser.com\/ProductDetail\/FRAMOS\/Depth-Camera-D455e-Starter-Kit?qs=QNEnbhJQKvZvXjcsxT4qKw%3D%3D."},{"key":"e_1_3_2_1_19_1","unstructured":"2021. https:\/\/www.perkinelmer.com\/lab-solutions\/resources\/docs\/TCH_reflection-Measurements.pdf."},{"key":"e_1_3_2_1_20_1","unstructured":"2021. https:\/\/www.redsun.bg\/en\/infraredheating\/infrared-heat-waves\/."},{"key":"e_1_3_2_1_21_1","unstructured":"2021. https:\/\/www.robotshop.com\/en\/m8--1-ultra-lidar-sensor.html."},{"key":"e_1_3_2_1_22_1","unstructured":"2021. https:\/\/www.sony-semicon.co.jp\/e\/products\/IS\/camera\/."},{"key":"e_1_3_2_1_23_1","unstructured":"2021. https:\/\/www.statista.com\/chart\/17144\/test-miles-and-reportable-miles-per-disengagement\/."},{"key":"e_1_3_2_1_24_1","unstructured":"2021. https:\/\/www.tesla.com\/autopilot."},{"key":"e_1_3_2_1_25_1","unstructured":"2021. https:\/\/www.therobotreport.com\/cruise-waymo-lead-way-calif-autonomous-vehicle-tests\/."},{"key":"e_1_3_2_1_26_1","unstructured":"2021. https:\/\/www.uqgoptics.com\/catalogue\/filters\/cut-off-blocking-filters\/ir-cut-off-filters\/."},{"key":"e_1_3_2_1_27_1","unstructured":"2021. https:\/\/www.wipro.com\/engineeringNXT\/."},{"key":"e_1_3_2_1_28_1","unstructured":"2021. http:\/\/www.cvlibs.net\/datasets\/kitti\/."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2807385"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.23919\/ECC.2018.8550510"},{"key":"e_1_3_2_1_31_1","unstructured":"Radhesh Bhat et al. 2019. Learning based demosaicing and color correction for RGB-IR patterned image sensors. Electronic Imaging (2019)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Adith Boloor Karthik Garimella Xin He Christopher Gill Yevgeniy Vorobeychik and Xuan Zhang. 2020. Attacking vision-based perception in end-to-end autonomous driving models. (2020) 101766.","DOI":"10.1016\/j.sysarc.2020.101766"},{"key":"e_1_3_2_1_33_1","volume-title":"Jos\u00e9 MM Montiel, and Juan D Tard\u00f3s.","author":"Campos Carlos","year":"2020","unstructured":"Carlos Campos, Richard Elvira, Juan J G\u00f3mez Rodr\u00edguez, Jos\u00e9 MM Montiel, and Juan D Tard\u00f3s. 2020. ORB-SLAM3: An accurate open-source library for visual, visual-inertial and multi-map SLAM. arXiv preprint arXiv:2007.11898 (2020)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339815"},{"key":"e_1_3_2_1_35_1","volume-title":"Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer.","author":"Chen Shang-Tse","year":"2018","unstructured":"Shang-Tse Chen, Cory Cornelius, Jason Martin, and Duen Horng Polo Chau. 2018. Shapeshifter: Robust physical adversarial attack on faster r-cnn object detector. In Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer."},{"key":"e_1_3_2_1_36_1","volume-title":"Single-image svbrdf capture with a rendering-aware deep network. ACM Transactions on Graphics (ToG)","author":"Deschaintre Valentin","year":"2018","unstructured":"Valentin Deschaintre, Miika Aittala, Fredo Durand, George Drettakis, and Adrien Bousseau. 2018. Single-image svbrdf capture with a rendering-aware deep network. ACM Transactions on Graphics (ToG) (2018)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062241"},{"key":"e_1_3_2_1_38_1","volume-title":"Robust physical-world attacks on machine learning models. arXiv preprint arXiv:1707.08945","author":"Evtimov Ivan","year":"2017","unstructured":"Ivan Evtimov, Kevin Eykholt, Earlence Fernandes, Tadayoshi Kohno, Bo Li, Atul Prakash, Amir Rahmati, and Dawn Song. 2017. Robust physical-world attacks on machine learning models. arXiv preprint arXiv:1707.08945 (2017)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.351"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2018.8569635"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.2352\/CIC.2008.16.1.art00034"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12239-020-0027-6"},{"key":"e_1_3_2_1_43_1","unstructured":"Hyungsub Kim Muslum Ozgur Ozmen Antonio Bianchi Z Berkay Celik and Dongyan Xu. [n.d.]. PGFUZZ: Policy-Guided Fuzzing for Robotic Vehicles. ([n. d.])."},{"key":"e_1_3_2_1_44_1","volume-title":"International Conference on Machine Learning.","author":"Li Juncheng","year":"2019","unstructured":"Juncheng Li, Frank Schmidt, and Zico Kolter. 2019. Adversarial camera stickers: A physical camera-based attack on deep learning systems. In International Conference on Machine Learning."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2015.84"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2018.04.007"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2005.1470486"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338508.3359567"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"e_1_3_2_1_50_1","volume-title":"Fooling a real car with adversarial traffic signs. arXiv preprint arXiv:1907.00374","author":"Morgulis Nir","year":"2019","unstructured":"Nir Morgulis, Alexander Kreines, Shachar Mendelowitz, and Yuval Weisglass. 2019. Fooling a real car with adversarial traffic signs. arXiv preprint arXiv:1907.00374 (2019)."},{"key":"e_1_3_2_1_51_1","volume-title":"Orb-slam2: An open-source slam system for monocular, stereo, and rgb-d cameras","author":"Mur-Artal Raul","year":"2017","unstructured":"Raul Mur-Artal and Juan D Tard\u00f3s. 2017. Orb-slam2: An open-source slam system for monocular, stereo, and rgb-d cameras. IEEE Transactions on Robotics (2017)."},{"key":"e_1_3_2_1_52_1","volume-title":"Phantom of the ADAS: Phantom Attacks on Driver-Assistance Systems. IACR Cryptol. ePrint Arch. 2020","author":"Nassi Ben","year":"2020","unstructured":"Ben Nassi, Dudi Nassi, Raz Ben-Netanel, Yisroel Mirsky, Oleg Drokin, and Yuval Elovici. 2020. Phantom of the ADAS: Phantom Attacks on Driver-Assistance Systems. IACR Cryptol. ePrint Arch. 2020 (2020)."},{"key":"e_1_3_2_1_53_1","volume-title":"Free-fall: Hacking tesla from wireless to can bus. Briefing, Black Hat USA","author":"Nie Sen","year":"2017","unstructured":"Sen Nie, Ling Liu, and Yuefeng Du. 2017. Free-fall: Hacking tesla from wireless to can bus. Briefing, Black Hat USA (2017)."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1410162111"},{"key":"e_1_3_2_1_55_1","volume-title":"Absorption and attenuation of visible and near-infrared light in water: dependence on temperature and salinity. Applied optics","author":"Pegau W Scott","year":"1997","unstructured":"W Scott Pegau, Deric Gray, and J Ronald V Zaneveld. 1997. Absorption and attenuation of visible and near-infrared light in water: dependence on temperature and salinity. Applied optics (1997)."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2342271"},{"key":"e_1_3_2_1_57_1","unstructured":"J. Petit Bas Stottelaar and M. Feiri. 2015. Remote Attacks on Automated Vehicles Sensors: Experiments on Camera and LiDAR."},{"key":"e_1_3_2_1_58_1","volume-title":"Remote attacks on automated vehicles sensors: Experiments on camera and lidar. Black Hat Europe 11","author":"Petit Jonathan","year":"2015","unstructured":"Jonathan Petit, Bas Stottelaar, Michael Feiri, and Frank Kargl. 2015. Remote attacks on automated vehicles sensors: Experiments on camera and lidar. Black Hat Europe 11 (2015)."},{"key":"e_1_3_2_1_59_1","volume-title":"29th {USENIX }Security Symposium ( {USENIX }Security 20). 895--912.","author":"Quinonez Raul","unstructured":"Raul Quinonez, Jairo Giraldo, Luis Salazar, Erick Bauman, Alvaro Cardenas, and Zhiqiang Lin. 2020. {SAVIOR }: Securing Autonomous Vehicles with Robust Physical Invariants. In 29th {USENIX }Security Symposium ( {USENIX }Security 20). 895--912."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/11744023_34"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2011.6126544"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11688"},{"key":"e_1_3_2_1_64_1","volume-title":"Understanding adversarial training: Increasing local stability of neural nets through robust optimization. arXiv preprint arXiv:1511.05432","author":"Shaham Uri","year":"2015","unstructured":"Uri Shaham, Yutaro Yamada, and Sahand Negahban. 2015. Understanding adversarial training: Increasing local stability of neural nets through robust optimization. arXiv preprint arXiv:1511.05432 (2015)."},{"key":"e_1_3_2_1_65_1","volume-title":"Attacks on Machine Learning: Adversarial Examples in Connected and Autonomous Vehicles. In 2019 IEEE International Symposium on Technologies for Homeland Security (HST).","author":"Sharma Prinkle","year":"2019","unstructured":"Prinkle Sharma, David Austin, and Hong Liu. 2019. Attacks on Machine Learning: Adversarial Examples in Connected and Autonomous Vehicles. In 2019 IEEE International Symposium on Technologies for Homeland Security (HST)."},{"key":"e_1_3_2_1_66_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Shen Junjie","year":"2020","unstructured":"Junjie Shen, Jun Yeon Won, Zeyuan Chen, and Qi Alfred Chen. 2020. Drift with Devil: Security of Multi-Sensor Fusion based Localization in High-Level Autonomous Driving under GPS Spoofing. In 29th USENIX Security Symposium (USENIX Security 20). 931--948."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_22"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_4"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813679"},{"key":"e_1_3_2_1_70_1","volume-title":"Arsalan Mosenia, Mung Chiang, and Prateek Mittal.","author":"Sitawarin Chawin","year":"2018","unstructured":"Chawin Sitawarin, Arjun Nitin Bhagoji, Arsalan Mosenia, Mung Chiang, and Prateek Mittal. 2018. Darts: Deceiving autonomous cars with toxic signs. arXiv preprint arXiv:1802.06430."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPHOT.2015.7168367"},{"key":"e_1_3_2_1_72_1","unstructured":"Emma Thil\u00e9n. 2017. Robust model predictive control for autonomous driving."},{"key":"e_1_3_2_1_73_1","unstructured":"Vrizlynn LL Thing and Jiaxi Wu. 2016. Autonomous vehicle security: A taxonomy of attacks and defenses. In 2016 ieee international conference on internet of things (ithings) and ieee green computing and communications (greencom) and IEEE cyber physical and social computing (cpscom) and ieee smart data (smartdata). IEEE."},{"key":"e_1_3_2_1_74_1","volume-title":"Xinyu Xing, Lin Lin, C Lee Giles, Xue Liu, Peng Liu, and Gang Xiong.","author":"Wang Qinglong","year":"2016","unstructured":"Qinglong Wang, Wenbo Guo, Alexander G Ororbia II, Xinyu Xing, Lin Lin, C Lee Giles, Xue Liu, Peng Liu, and Gang Xiong. 2016. Using non-invertible data transformations to build adversarial-robust neural networks. arXiv preprint arXiv:1610.01934 (2016)."},{"key":"e_1_3_2_1_75_1","volume-title":"23rd International Symposium on Research in Attacks, Intrusions and Defenses ( {RAID }2020)","author":"Wang Shu","year":"2020","unstructured":"Shu Wang, Jiahao Cao, Kun Sun, and Qi Li. 2020. {SIEVE }: Secure In-Vehicle Automatic Speech Recognition Systems. In 23rd International Symposium on Research in Attacks, Intrusions and Defenses ( {RAID }2020). 365--379."},{"key":"e_1_3_2_1_76_1","volume-title":"Feature squeezing: Detecting adversarial examples in deep neural networks. arXiv preprint arXiv:1704.01155","author":"Xu Weilin","year":"2017","unstructured":"Weilin Xu, David Evans, and Yanjun Qi. 2017. Feature squeezing: Detecting adversarial examples in deep neural networks. arXiv preprint arXiv:1704.01155 (2017)."},{"key":"e_1_3_2_1_77_1","volume-title":"Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle. DEF CON 24","author":"Yan Chen","year":"2016","unstructured":"Chen Yan, Wenyuan Xu, and Jianhao Liu. 2016. Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle. DEF CON 24 (2016)."}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484766","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484766","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484766","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:51:37Z","timestamp":1763499097000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484766"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":77,"alternative-id":["10.1145\/3460120.3484766","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484766","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}