{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T19:56:01Z","timestamp":1776887761537,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":74,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the US National Science Foundation","award":["CNS-1626374,ECCS-2028872,CNS-2120369,CNS-1737590,CNS-1652503"],"award-info":[{"award-number":["CNS-1626374,ECCS-2028872,CNS-2120369,CNS-1737590,CNS-1652503"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3485377","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:33Z","timestamp":1636805133000},"page":"1945-1960","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":66,"title":["Can We Use Arbitrary Objects to Attack LiDAR Perception in Autonomous Driving?"],"prefix":"10.1145","author":[{"given":"Yi","family":"Zhu","sequence":"first","affiliation":[{"name":"State University of New York at Buffalo, Buffalo, NY, USA"}]},{"given":"Chenglin","family":"Miao","sequence":"additional","affiliation":[{"name":"University of Georgia, Athens, GA, USA"}]},{"given":"Tianhang","family":"Zheng","sequence":"additional","affiliation":[{"name":"University of Toronto, Toronto, ON, Canada"}]},{"given":"Foad","family":"Hajiaghajani","sequence":"additional","affiliation":[{"name":"State University of New York at Buffalo, Buffalo, NY, USA"}]},{"given":"Lu","family":"Su","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Chunming","family":"Qiao","sequence":"additional","affiliation":[{"name":"State University of New York at Buffalo, Buffalo, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. Baidu Apollo. https:\/\/apollo.auto\/."},{"key":"e_1_3_2_1_2_1","unstructured":"[n. d.]. Driverless taxis to be available in Phoenix 'in weeks'. https:\/\/www.bbc.com\/news\/technology-54476524."},{"key":"e_1_3_2_1_3_1","volume-title":"Towards Universal Physical Attacks On Cascaded Camera-Lidar 3D Object Detection Models. arXiv preprint arXiv:2101.10747","author":"Abdelfattah Mazen","year":"2021","unstructured":"Mazen Abdelfattah, Kaiwen Yuan, Z Jane Wang, and Rabab Ward. 2021. Towards Universal Physical Attacks On Cascaded Camera-Lidar 3D Object Detection Models. arXiv preprint arXiv:2101.10747 (2021)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363280"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.23919\/DATE48585.2020.9116560"},{"key":"e_1_3_2_1_6_1","volume-title":"Mingyan Liu, and Bo Li.","author":"Cao Yulong","year":"2021","unstructured":"Yulong Cao, Ningfei Wang, Chaowei Xiao, Dawei Yang, Jin Fang, Ruigang Yang, Qi Alfred Chen, Mingyan Liu, and Bo Li. 2021. Invisible for both Camera and LiDAR: Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks. arXiv preprint arXiv:2106.09249 (2021)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339815"},{"key":"e_1_3_2_1_8_1","volume-title":"2019 b. Adversarial objects against lidar-based autonomous driving systems. arXiv preprint arXiv:1907.05418","author":"Cao Yulong","year":"2019","unstructured":"Yulong Cao, Chaowei Xiao, Dawei Yang, Jing Fang, Ruigang Yang, Mingyan Liu, and Bo Li. 2019 b. Adversarial objects against lidar-based autonomous driving systems. arXiv preprint arXiv:1907.05418 (2019)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASP-DAC47756.2020.9045597"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23222"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.181"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26250-1_18"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the IEEE Connected and Automated Vehicles Symposium (CAVS)","volume":"5","author":"DeBruhl Bruce","year":"2018","unstructured":"Bruce DeBruhl and Patrick Tague. 2018. Optimizing a MisInformation and MisBehavior (MIB) Attack Targeting Connected Cars. en. In Proceedings of the IEEE Connected and Automated Vehicles Symposium (CAVS), Vol. 5."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218490"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3176402"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380397"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2012.6248074"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.23047"},{"key":"e_1_3_2_1_20_1","volume-title":"Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572","author":"Goodfellow Ian J","year":"2014","unstructured":"Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)."},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the International Conference on Machine Learning. PMLR, 2484--2493","author":"Guo Chuan","year":"2019","unstructured":"Chuan Guo, Jacob Gardner, Yurong You, Andrew Gordon Wilson, and Kilian Weinberger. 2019. Simple black-box adversarial attacks. In Proceedings of the International Conference on Machine Learning. PMLR, 2484--2493."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3032970.3032987"},{"key":"e_1_3_2_1_23_1","volume-title":"Object removal attacks on lidar-based 3d object detectors. arXiv preprint arXiv:2102.03722","author":"Hau Zhongyuan","year":"2021","unstructured":"Zhongyuan Hau, Kenneth T Co, Soteris Demetriou, and Emil C Lupu. 2021. Object removal attacks on lidar-based 3d object detectors. arXiv preprint arXiv:2102.03722 (2021)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP48549.2020.00035"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3375706.3380552"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00012"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the International Conference on Learning Representations (ICLR'20)","author":"Jia Yunhan Jia","year":"2020","unstructured":"Yunhan Jia Jia, Yantao Lu, Junjie Shen, Qi Alfred Chen, Hao Chen, Zhenyu Zhong, and Tao Wei Wei. 2020. Fooling detection alone is not enough: Adversarial attack against multiple object tracking. In Proceedings of the International Conference on Learning Representations (ICLR'20) ."},{"key":"e_1_3_2_1_28_1","volume-title":"A unified framework for analyzing and detecting malicious examples of dnn models. arXiv preprint arXiv:2006.14871","author":"Jin Kaidi","year":"2020","unstructured":"Kaidi Jin, Tianwei Zhang, Chao Shen, Yufei Chen, Ming Fan, Chenhao Lin, and Ting Liu. 2020. A unified framework for analyzing and detecting malicious examples of dnn models. arXiv preprint arXiv:2006.14871 (2020)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01298"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2019.8803770"},{"key":"e_1_3_2_1_31_1","volume-title":"FLGUARD: Secure and Private Federated Learning. arXiv preprint arXiv:2101.02281","author":"Nguyen Thien Duc","year":"2021","unstructured":"Thien Duc Nguyen, Phillip Rieger, Hossein Yalame, Helen M\u00f6llering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Ahmad-Reza Sadeghi, Thomas Schneider, et al. 2021. FLGUARD: Secure and Private Federated Learning. arXiv preprint arXiv:2101.02281 (2021)."},{"key":"e_1_3_2_1_32_1","volume-title":"Practical black-box attacks against deep learning systems using adversarial examples. arXiv preprint arXiv:1602.02697","author":"Papernot Nicolas","year":"2016","unstructured":"Nicolas Papernot, Patrick McDaniel, Ian Goodfellow, Somesh Jha, Z Berkay Celik, and Ananthram Swami. 2016a. Practical black-box attacks against deep learning systems using adversarial examples. arXiv preprint arXiv:1602.02697, Vol. 1, 2 (2016), 3."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.36"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00102"},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the IEEE conference on computer vision and pattern recognition. 652--660","author":"Qi Charles R","year":"2017","unstructured":"Charles R Qi, Hao Su, Kaichun Mo, and Leonidas J Guibas. 2017a. Pointnet: Deep learning on point sets for 3d classification and segmentation. In Proceedings of the IEEE conference on computer vision and pattern recognition. 652--660."},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the Advances in neural information processing systems. 5099--5108","author":"Qi Charles Ruizhongtai","year":"2017","unstructured":"Charles Ruizhongtai Qi, Li Yi, Hao Su, and Leonidas J Guibas. 2017b. Pointnet+: Deep hierarchical feature learning on point sets in a metric space. In Proceedings of the Advances in neural information processing systems. 5099--5108."},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of the 29th USENIX Security Symposium (USENIX Security 20)","author":"Quinonez Raul","year":"2020","unstructured":"Raul Quinonez, Jairo Giraldo, Luis Salazar, Erick Bauman, Alvaro Cardenas, and Zhiqiang Lin. 2020. SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants. In Proceedings of the 29th USENIX Security Symposium (USENIX Security 20). 895--912."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2948775"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2532840"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.1600039WC"},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of the 29th USENIX Security Symposium (USENIX Security 20)","author":"Shen Junjie","year":"2020","unstructured":"Junjie Shen, Jun Yeon Won, Zeyuan Chen, and Qi Alfred Chen. 2020. Drift with Devil: Security of Multi-Sensor Fusion based Localization in High-Level Autonomous Driving under GPS Spoofing. In Proceedings of the 29th USENIX Security Symposium (USENIX Security 20). 931--948."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00086"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2019.2890858"},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings of the 29th USENIX Security Symposium (USENIX Security 20)","author":"Sugawara Takeshi","year":"2020","unstructured":"Takeshi Sugawara, Benjamin Cyr, Sara Rampazzi, Daniel Genkin, and Kevin Fu. 2020. Light commands: laser-based audio injection attacks on voice-controllable systems. In Proceedings of the 29th USENIX Security Symposium (USENIX Security 20). 2631--2648."},{"key":"e_1_3_2_1_45_1","volume-title":"Proceedings of 29th USENIX Security Symposium (USENIX Security 20)","author":"Sun Jiachen","year":"2020","unstructured":"Jiachen Sun, Yulong Cao, Qi Alfred Chen, and Z Morley Mao. 2020 b. Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box Adversarial Sensor Attack and Countermeasures. In Proceedings of 29th USENIX Security Symposium (USENIX Security 20). 877--894."},{"key":"e_1_3_2_1_46_1","volume-title":"2020 a. Impacts of constrained sensing and communication based attacks on vehicular platoons","author":"Sun Mingshun","year":"2020","unstructured":"Mingshun Sun, Ali Al-Hashimi, Ming Li, and Ryan Gerdes. 2020 a. Impacts of constrained sensing and communication based attacks on vehicular platoons. IEEE transactions on vehicular technology, Vol. 69, 5 (2020), 4773--4787."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2017.8228654"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2019.100106"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5443"},{"key":"e_1_3_2_1_50_1","volume-title":"Exploring Adversarial Robustness of Multi-Sensor Perception Systems in Self Driving. arXiv preprint arXiv:2101.06784","author":"Tu James","year":"2021","unstructured":"James Tu, Huichen Li, Xinchen Yan, Mengye Ren, Yun Chen, Ming Liang, Eilyan Bitar, Ersin Yumer, and Raquel Urtasun. 2021. Exploring Adversarial Robustness of Multi-Sensor Perception Systems in Self Driving. arXiv preprint arXiv:2101.06784 (2021)."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01373"},{"key":"e_1_3_2_1_52_1","volume-title":"Proceedings of the CEUR Workshop Proceedings","volume":"2640","author":"Vargas Danilo Vasconcellos","year":"2020","unstructured":"Danilo Vasconcellos Vargas and Jiawei Su. 2020. Understanding the one-pixel attack: Propagation maps and locality analysis. In Proceedings of the CEUR Workshop Proceedings, Vol. 2640. CEUR-WS."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3026543"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417254"},{"key":"e_1_3_2_1_55_1","volume-title":"Proceedings of the 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID","author":"Wang Shu","year":"2020","unstructured":"Shu Wang, Jiahao Cao, Kun Sun, and Qi Li. 2020 b. SIEVE: Secure In-Vehicle Automatic Speech Recognition Systems. In Proceedings of the 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). 365--379."},{"key":"e_1_3_2_1_56_1","volume-title":"Proceedings of the 29th USENIX Security Symposium (USENIX Security 20)","author":"Wen Haohuang","year":"2020","unstructured":"Haohuang Wen, Qi Alfred Chen, and Zhiqiang Lin. 2020. Plug-N-pwned: Comprehensive vulnerability analysis of OBD-II dongles as a new over-the-air attack surface in automotive IoT. In Proceedings of the 29th USENIX Security Symposium (USENIX Security 20). 949--965."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01204"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00935"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00706"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2867917"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3126594.3126631"},{"key":"e_1_3_2_1_62_1","first-page":"109","article-title":"Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle","volume":"24","author":"Yan Chen","year":"2016","unstructured":"Chen Yan, Wenyuan Xu, and Jianhao Liu. 2016. Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle. Def Con, Vol. 24, 8 (2016), 109.","journal-title":"Def Con"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00798"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5459"},{"key":"e_1_3_2_1_65_1","volume-title":"Adversarial examples: Attacks and defenses for deep learning","author":"Yuan Xiaoyong","year":"2019","unstructured":"Xiaoyong Yuan, Pan He, Qile Zhu, and Xiaolin Li. 2019. Adversarial examples: Attacks and defenses for deep learning. IEEE transactions on neural networks and learning systems, Vol. 30, 9 (2019), 2805--2824."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134052"},{"key":"e_1_3_2_1_67_1","volume-title":"Adversarial attack and defense on point sets. arXiv preprint arXiv:1902.10899","author":"Zhang Qiang","year":"2019","unstructured":"Qiang Zhang, Jiancheng Yang, Rongyao Fang, Bingbing Ni, Jinxian Liu, and Qi Tian. 2019. Adversarial attack and defense on point sets. arXiv preprint arXiv:1902.10899 (2019)."},{"key":"e_1_3_2_1_68_1","unstructured":"Zihan Zhang Mingxuan Liu Chao Zhang Yiming Zhang Zhou Li Qi Li Haixin Duan and Donghong Sun. [n. d.]. Argot: Generating Adversarial Readable Chinese Texts. ( [n. d.])."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00128"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00168"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2017.8288289"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01037"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2876419"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00472"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485377","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3485377","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:50:02Z","timestamp":1763499002000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485377"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":74,"alternative-id":["10.1145\/3460120.3485377","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3485377","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}