{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T23:55:23Z","timestamp":1775087723600,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-1932464, CNS-1929771, CNS-214549"],"award-info":[{"award-number":["CNS-1932464, CNS-1929771, CNS-214549"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"USDOT UTC Grant","award":["69A3552047138"],"award-info":[{"award-number":["69A3552047138"]}]},{"name":"JST CREST","award":["JPMJCR21D2"],"award-info":[{"award-number":["JPMJCR21D2"]}]},{"name":"JST SPRING","award":["JPMJSP2123"],"award-info":[{"award-number":["JPMJSP2123"]}]},{"name":"JSPS KAKENHI","award":["21K20413"],"award-info":[{"award-number":["21K20413"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3548606.3563537","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T11:41:28Z","timestamp":1667821288000},"page":"3459-3461","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Poster"],"prefix":"10.1145","author":[{"given":"Takami","family":"Sato","sequence":"first","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Yuki","family":"Hayakawa","sequence":"additional","affiliation":[{"name":"Keio University, Tokyo, Japan"}]},{"given":"Ryo","family":"Suzuki","sequence":"additional","affiliation":[{"name":"Keio University, Tokyo, Japan"}]},{"given":"Yohsuke","family":"Shiiki","sequence":"additional","affiliation":[{"name":"Keio University, Tokyo, Japan"}]},{"given":"Kentaro","family":"Yoshioka","sequence":"additional","affiliation":[{"name":"Keio University, Tokyo, Japan"}]},{"given":"Qi Alfred","family":"Chen","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00076"},{"key":"e_1_3_2_1_2_1","volume-title":"Adversarial Sensor Attack on Lidar-Based Perception in Autonomous Driving. In ACM CCS '19","author":"Cao Yulong","year":"2019","unstructured":"Yulong Cao , Chaowei Xiao , Benjamin Cyr , Yimeng Zhou , Won Park , Sara Rampazzi , Qi Alfred Chen , Kevin Fu , and Z Morley Mao . 2019 . Adversarial Sensor Attack on Lidar-Based Perception in Autonomous Driving. In ACM CCS '19 . Yulong Cao, Chaowei Xiao, Benjamin Cyr, Yimeng Zhou, Won Park, Sara Rampazzi, Qi Alfred Chen, Kevin Fu, and Z Morley Mao. 2019. Adversarial Sensor Attack on Lidar-Based Perception in Autonomous Driving. In ACM CCS '19."},{"key":"e_1_3_2_1_3_1","volume-title":"Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks on Autonomous Vehicles. In USENIX Security '22","author":"Hallyburton R Spencer","year":"2022","unstructured":"R Spencer Hallyburton , Yupei Liu , Yulong Cao , Z Morley Mao , and Miroslav Pajic . 2022 . Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks on Autonomous Vehicles. In USENIX Security '22 . R Spencer Hallyburton, Yupei Liu, Yulong Cao, Z Morley Mao, and Miroslav Pajic. 2022. Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks on Autonomous Vehicles. In USENIX Security '22."},{"key":"e_1_3_2_1_4_1","unstructured":"Zhongyuan Hau Kenneth Co Soteris Demetriou and Emil Lupu. 2021a. Object Removal Attacks on LiDAR-based 3D Object Detectors. In AutoSec.  Zhongyuan Hau Kenneth Co Soteris Demetriou and Emil Lupu. 2021a. Object Removal Attacks on LiDAR-based 3D Object Detectors. In AutoSec."},{"key":"e_1_3_2_1_5_1","volume-title":"Luis Mu noz-Gonz\u00e1lez, and Emil C Lupu","author":"Hau Zhongyuan","year":"2021","unstructured":"Zhongyuan Hau , Soteris Demetriou , Luis Mu noz-Gonz\u00e1lez, and Emil C Lupu . 2021 b. Shadow-Catcher: Looking into Shadows to Detect Ghost Objects in Autonomous Vehicle 3D Sensing. In ESORICS. Springer . Zhongyuan Hau, Soteris Demetriou, Luis Mu noz-Gonz\u00e1lez, and Emil C Lupu. 2021b. Shadow-Catcher: Looking into Shadows to Detect Ghost Objects in Autonomous Vehicle 3D Sensing. In ESORICS. Springer."},{"key":"e_1_3_2_1_6_1","first-page":"2015","article-title":"Remote Attacks on Automated Vehicles Sensors: Experiments on Camera and Lidar","volume":"11","author":"Petit Jonathan","year":"2015","unstructured":"Jonathan Petit , Bas Stottelaar , Michael Feiri , and Frank Kargl . 2015 . Remote Attacks on Automated Vehicles Sensors: Experiments on Camera and Lidar . Black Hat Europe , Vol. 11 (2015), 2015 . Jonathan Petit, Bas Stottelaar, Michael Feiri, and Frank Kargl. 2015. Remote Attacks on Automated Vehicles Sensors: Experiments on Camera and Lidar. Black Hat Europe , Vol. 11 (2015), 2015.","journal-title":"Black Hat Europe"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2022.108796"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Hocheol Shin Dohyun Kim Yujin Kwon and Yongdae Kim. 2017. Illusion and Dazzle: Adversarial Optical Channel Exploits Against Lidars for Automotive Applications. In CHES.  Hocheol Shin Dohyun Kim Yujin Kwon and Yongdae Kim. 2017. Illusion and Dazzle: Adversarial Optical Channel Exploits Against Lidars for Automotive Applications. In CHES.","DOI":"10.1007\/978-3-319-66787-4_22"},{"key":"e_1_3_2_1_9_1","volume-title":"Qi Alfred Chen, and Z. Morley Mao","author":"Sun Jiachen","year":"2020","unstructured":"Jiachen Sun , Yulong Cao , Qi Alfred Chen, and Z. Morley Mao . 2020 . Towards Robust LiDAR-based Perception in Autonomous Driving : General Black-box Adversarial Sensor Attack and Countermeasures. In USENIX Security '20. Jiachen Sun, Yulong Cao, Qi Alfred Chen, and Z. Morley Mao. 2020. Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box Adversarial Sensor Attack and Countermeasures. In USENIX Security '20."},{"key":"e_1_3_2_1_10_1","volume-title":"Tartan Racing: A Multi-Modal Approach to the DARPA Urban challenge.","author":"Urmson Chris","year":"2007","unstructured":"Chris Urmson , J Andrew Bagnell , Christopher Baker , 2007 . Tartan Racing: A Multi-Modal Approach to the DARPA Urban challenge. (2007). Chris Urmson, J Andrew Bagnell, Christopher Baker, et al. 2007. Tartan Racing: A Multi-Modal Approach to the DARPA Urban challenge. (2007)."},{"key":"e_1_3_2_1_11_1","volume-title":"A Tutorial and Review of Automobile Direct ToF LiDAR SoCs: Evolution of Next-Generation LiDARs. IEICE","author":"Yoshioka Kentaro","year":"2022","unstructured":"Kentaro Yoshioka . 2022. A Tutorial and Review of Automobile Direct ToF LiDAR SoCs: Evolution of Next-Generation LiDARs. IEICE ( 2022 ). Kentaro Yoshioka. 2022. A Tutorial and Review of Automobile Direct ToF LiDAR SoCs: Evolution of Next-Generation LiDARs. IEICE (2022)."}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","location":"Los Angeles CA USA","acronym":"CCS '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3563537","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3563537","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3563537","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:06Z","timestamp":1750182666000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3563537"}},"subtitle":["Towards Large-Scale Measurement Study on LiDAR Spoofing Attacks against Object Detection"],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":11,"alternative-id":["10.1145\/3548606.3563537","10.1145\/3548606"],"URL":"https:\/\/doi.org\/10.1145\/3548606.3563537","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}