{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:58Z","timestamp":1750220098682,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,19]],"date-time":"2021-10-19T00:00:00Z","timestamp":1634601600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,19]]},"DOI":"10.1145\/3487075.3487186","type":"proceedings-article","created":{"date-parts":[[2021,12,7]],"date-time":"2021-12-07T20:35:15Z","timestamp":1638909315000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Extreme Scenario Generation Based on Adversarial Attack"],"prefix":"10.1145","author":[{"given":"Haoxin","family":"Ma","sequence":"first","affiliation":[{"name":"Department of Automation, Tsinghua University, China"}]},{"given":"Jianming","family":"Hu","sequence":"additional","affiliation":[{"name":"Department of Automation, Tsinghua University, China"}]}],"member":"320","published-online":{"date-parts":[[2021,12,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tra.2016.09.010"},{"key":"e_1_3_2_1_2_1","volume-title":"Sweden.","author":"Christensen A","year":"2015","unstructured":"Christensen A , Cunningham A , Engelman J , ( 2015 ). Key considerations in the development of driving automation systems. 24th enhanced safety vehicles conference. Gothenburg , Sweden. Christensen A, Cunningham A, Engelman J, (2015). Key considerations in the development of driving automation systems. 24th enhanced safety vehicles conference. Gothenburg, Sweden."},{"key":"e_1_3_2_1_3_1","volume-title":"Effective evaluation of automated driving systems. SAE Technical Paper","author":"Benmimoun M","year":"2017","unstructured":"Benmimoun M ( 2017 ). Effective evaluation of automated driving systems. SAE Technical Paper . Benmimoun M (2017). Effective evaluation of automated driving systems. SAE Technical Paper."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1002\/rob.20255"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2011.5940568"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2012.2196273"},{"key":"e_1_3_2_1_7_1","volume-title":"Autonomous Vehicle Technology: A Guide for Policymakers[M]","author":"Anderson J M","year":"2014","unstructured":"Anderson J M , Nidhi K , Stanley K D , ( 2014 ). Autonomous Vehicle Technology: A Guide for Policymakers[M] . New York : Rand Corporation . Anderson J M, Nidhi K, Stanley K D, (2014). Autonomous Vehicle Technology: A Guide for Policymakers[M]. New York: Rand Corporation."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2017.55"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCIAIG.2012.2186810"},{"key":"e_1_3_2_1_10_1","volume-title":"Human-level control through deep reinforcement learning. nature, 518(7540), 529-533","author":"Mnih V","year":"2015","unstructured":"Mnih V , Kavukcuoglu K , Silver D , ( 2015 ). Human-level control through deep reinforcement learning. nature, 518(7540), 529-533 . Mnih V, Kavukcuoglu K, Silver D, (2015). Human-level control through deep reinforcement learning. nature, 518(7540), 529-533."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10295"},{"key":"e_1_3_2_1_12_1","volume-title":"International conference on machine learning. PMLR","author":"Wang Z","year":"2016","unstructured":"Wang Z , Schaul T , Hessel M , ( 2016 ). Dueling network architectures for deep reinforcement learning . International conference on machine learning. PMLR , 1995-2003. Wang Z, Schaul T, Hessel M, (2016). Dueling network architectures for deep reinforcement learning. International conference on machine learning. PMLR, 1995-2003."},{"key":"e_1_3_2_1_13_1","volume-title":"Deep attention recurrent Q-network. arXiv preprint arXiv:1512.01693","author":"Sorokin I","year":"2015","unstructured":"Sorokin I , Seleznev A , Pavlov M , ( 2015 ). Deep attention recurrent Q-network. arXiv preprint arXiv:1512.01693 . Sorokin I, Seleznev A, Pavlov M, (2015). Deep attention recurrent Q-network. arXiv preprint arXiv:1512.01693."},{"key":"e_1_3_2_1_14_1","volume-title":"Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572","author":"Goodfellow I J","year":"2014","unstructured":"Goodfellow I J , Shlens J , Szegedy C ( 2014 ). Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 . Goodfellow I J, Shlens J, Szegedy C (2014). Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572."},{"key":"e_1_3_2_1_15_1","volume-title":"Adversarial machine learning at scale. arXiv preprint arXiv:1611.01236","author":"Kurakin A","year":"2016","unstructured":"Kurakin A , Goodfellow I , Bengio S ( 2016 ). Adversarial machine learning at scale. arXiv preprint arXiv:1611.01236 . Kurakin A, Goodfellow I, Bengio S (2016). Adversarial machine learning at scale. arXiv preprint arXiv:1611.01236."},{"key":"e_1_3_2_1_16_1","volume-title":"Adversarial examples in the physical world. arXiv preprint arXiv:1607.02533","author":"Kurakin A","year":"2016","unstructured":"Kurakin A , Goodfellow I J , Bengio S ( 2016 ). Adversarial examples in the physical world. arXiv preprint arXiv:1607.02533 . Kurakin A, Goodfellow I J, Bengio S (2016). Adversarial examples in the physical world. arXiv preprint arXiv:1607.02533."},{"key":"e_1_3_2_1_17_1","volume-title":"Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083","author":"Madry A","year":"2017","unstructured":"Madry A , Makelov A , Schmidt L , ( 2017 ). Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083 . Madry A, Makelov A, Schmidt L, (2017). Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083."},{"key":"e_1_3_2_1_18_1","volume-title":"Tactics of adversarial attack on deep reinforcement learning agents. arXiv preprint arXiv:1703.06748","author":"Lin Y C","year":"2017","unstructured":"Lin Y C , Hong Z W , Liao Y H , ( 2017 ). Tactics of adversarial attack on deep reinforcement learning agents. arXiv preprint arXiv:1703.06748 . Lin Y C, Hong Z W, Liao Y H, (2017). Tactics of adversarial attack on deep reinforcement learning agents. arXiv preprint arXiv:1703.06748."}],"event":{"name":"CSAE 2021: The 5th International Conference on Computer Science and Application Engineering","acronym":"CSAE 2021","location":"Sanya China"},"container-title":["Proceedings of the 5th International Conference on Computer Science and Application Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487075.3487186","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3487075.3487186","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:11Z","timestamp":1750183811000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487075.3487186"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,19]]},"references-count":18,"alternative-id":["10.1145\/3487075.3487186","10.1145\/3487075"],"URL":"https:\/\/doi.org\/10.1145\/3487075.3487186","relation":{},"subject":[],"published":{"date-parts":[[2021,10,19]]},"assertion":[{"value":"2021-12-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}