{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:13:27Z","timestamp":1750220007272,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation","award":["CNS-2145493","CNS-1929771","CNS-1932464"],"award-info":[{"award-number":["CNS-2145493","CNS-1929771","CNS-1932464"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3548606.3563539","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T11:41:28Z","timestamp":1667821288000},"page":"3479-3481","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Poster"],"prefix":"10.1145","author":[{"given":"Ningfei","family":"Wang","sequence":"first","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Yunpeng","family":"Luo","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Takami","family":"Sato","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Kaidi","family":"Xu","sequence":"additional","affiliation":[{"name":"Drexel University, Philadelphia, PA, USA"}]},{"given":"Qi Alfred","family":"Chen","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2022. Baidu Apollo. http:\/\/apollo.auto.  2022. Baidu Apollo. http:\/\/apollo.auto."},{"key":"e_1_3_2_1_2_1","unstructured":"2022. California Driver Handbook. https:\/\/www.dmv.ca.gov\/portal\/handbook\/ california-driver-handbook\/.  2022. California Driver Handbook. https:\/\/www.dmv.ca.gov\/portal\/handbook\/ california-driver-handbook\/."},{"key":"e_1_3_2_1_3_1","unstructured":"2022. Control Theory. https:\/\/en.wikipedia.org\/wiki\/Control_theory.  2022. Control Theory. https:\/\/en.wikipedia.org\/wiki\/Control_theory."},{"key":"e_1_3_2_1_4_1","unstructured":"2022. Driving in California. https:\/\/www.visitcalifornia.com.  2022. Driving in California. https:\/\/www.visitcalifornia.com."},{"key":"e_1_3_2_1_5_1","unstructured":"2022. LGSVL Simulator. https:\/\/www.lgsvlsimulator.com\/.  2022. LGSVL Simulator. https:\/\/www.lgsvlsimulator.com\/."},{"key":"e_1_3_2_1_6_1","unstructured":"2022. OpenPilot. https:\/\/github.com\/commaai\/openpilot.  2022. OpenPilot. https:\/\/github.com\/commaai\/openpilot."},{"key":"e_1_3_2_1_7_1","volume-title":"Mingyan Liu, and Bo Li.","author":"Cao Yulong","year":"2021","unstructured":"Yulong Cao , Ningfei Wang , Chaowei Xiao , Dawei Yang , Jin Fang , Ruigang Yang , Qi Alfred Chen , Mingyan Liu, and Bo Li. 2021 . Invisible for both Camera and LiDAR: Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical World Attacks. In IEEE S &P 2021. Yulong Cao, Ningfei Wang, Chaowei Xiao, Dawei Yang, Jin Fang, Ruigang Yang, Qi Alfred Chen, Mingyan Liu, and Bo Li. 2021. Invisible for both Camera and LiDAR: Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical World Attacks. In IEEE S&P 2021."},{"volume-title":"ShapeShifter: Robust Physical Adversarial Attack on Faster R-CNN Object Detector","author":"Chen Shang-Tse","key":"e_1_3_2_1_8_1","unstructured":"Shang-Tse Chen , Cory Cornelius , Jason Martin , and Duen Horng Polo Chau . 2018. ShapeShifter: Robust Physical Adversarial Attack on Faster R-CNN Object Detector . In ECML PKDD. Springer , 52--68. Shang-Tse Chen, Cory Cornelius, Jason Martin, and Duen Horng Polo Chau. 2018. ShapeShifter: Robust Physical Adversarial Attack on Faster R-CNN Object Detector. In ECML PKDD. Springer, 52--68."},{"key":"e_1_3_2_1_9_1","unstructured":"Kevin Eykholt Ivan Evtimov Earlence Fernandes Bo Li Amir Rahmati Florian Tramer Atul Prakash Tadayoshi Kohno and Dawn Song. 2018. Physical Adversarial Examples for Object Detectors. In WOOT.  Kevin Eykholt Ivan Evtimov Earlence Fernandes Bo Li Amir Rahmati Florian Tramer Atul Prakash Tadayoshi Kohno and Dawn Song. 2018. Physical Adversarial Examples for Object Detectors. In WOOT."},{"volume-title":"Autonomous Automobile Trajectory Tracking for off-road Driving: Controller Design, Experimental Validation and Racing. In 2007 American control conference","author":"Hoffmann Gabriel M","key":"e_1_3_2_1_10_1","unstructured":"Gabriel M Hoffmann , Claire J Tomlin , Michael Montemerlo , and Sebastian Thrun . 2007. Autonomous Automobile Trajectory Tracking for off-road Driving: Controller Design, Experimental Validation and Racing. In 2007 American control conference . IEEE , 2296--2301. Gabriel M Hoffmann, Claire J Tomlin, Michael Montemerlo, and Sebastian Thrun. 2007. Autonomous Automobile Trajectory Tracking for off-road Driving: Controller Design, Experimental Validation and Racing. In 2007 American control conference. IEEE, 2296--2301."},{"key":"e_1_3_2_1_11_1","volume-title":"Fooling the Eyes of Autonomous Vehicles: Robust Physical Adversarial Examples Against Traffic Sign Recognition Systems. NDSS","author":"Jia Wei","year":"2022","unstructured":"Wei Jia , Zhaojun Lu , Haichun Zhang , Zhenglin Liu , Jie Wang , and Gang Qu. 2022. Fooling the Eyes of Autonomous Vehicles: Robust Physical Adversarial Examples Against Traffic Sign Recognition Systems. NDSS ( 2022 ). Wei Jia, Zhaojun Lu, Haichun Zhang, Zhenglin Liu, Jie Wang, and Gang Qu. 2022. Fooling the Eyes of Autonomous Vehicles: Robust Physical Adversarial Examples Against Traffic Sign Recognition Systems. NDSS (2022)."},{"key":"e_1_3_2_1_12_1","volume-title":"Adversarial Examples that Fool Detectors. arXiv preprint arXiv:1712.02494","author":"Lu Jiajun","year":"2017","unstructured":"Jiajun Lu , Hussein Sibai , and Evan Fabry . 2017. Adversarial Examples that Fool Detectors. arXiv preprint arXiv:1712.02494 ( 2017 ). Jiajun Lu, Hussein Sibai, and Evan Fabry. 2017. Adversarial Examples that Fool Detectors. arXiv preprint arXiv:1712.02494 (2017)."},{"key":"e_1_3_2_1_13_1","volume-title":"No Need to Worry about Adversarial Examples in Object Detection in Autonomous Vehicles. arXiv preprint arXiv:1707.03501","author":"Lu Jiajun","year":"2017","unstructured":"Jiajun Lu , Hussein Sibai , Evan Fabry , and David Forsyth . 2017. No Need to Worry about Adversarial Examples in Object Detection in Autonomous Vehicles. arXiv preprint arXiv:1707.03501 ( 2017 ). Jiajun Lu, Hussein Sibai, Evan Fabry, and David Forsyth. 2017. No Need to Worry about Adversarial Examples in Object Detection in Autonomous Vehicles. arXiv preprint arXiv:1707.03501 (2017)."},{"key":"e_1_3_2_1_14_1","first-page":"103448","article-title":"Multiple Object Tracking","volume":"293","author":"Luo Wenhan","year":"2021","unstructured":"Wenhan Luo , Junliang Xing , Anton Milan , Xiaoqin Zhang , Wei Liu , and Tae-Kyun Kim . 2021 . Multiple Object Tracking : A Literature Review. AI 293 (2021), 103448 . Wenhan Luo, Junliang Xing, Anton Milan, Xiaoqin Zhang, Wei Liu, and Tae-Kyun Kim. 2021. Multiple Object Tracking: A Literature Review. AI 293 (2021), 103448.","journal-title":"A Literature Review. AI"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Takami Sato Junjie Shen Ningfei Wang Yunhan Jia Xue Lin and Qi Alfred Chen. 2021. Dirty Road Can Attack: Security of Deep Learning based Automated Lane Centering under Physical-World Attack. In USENIX Security.  Takami Sato Junjie Shen Ningfei Wang Yunhan Jia Xue Lin and Qi Alfred Chen. 2021. Dirty Road Can Attack: Security of Deep Learning based Automated Lane Centering under Physical-World Attack. In USENIX Security.","DOI":"10.1109\/SPW53761.2021.00041"},{"key":"e_1_3_2_1_16_1","unstructured":"Junjie Shen Ningfei Wang Ziwen Wan Yunpeng Luo Takami Sato Zhisheng Hu Xinyang Zhang Shengjian Guo Zhenyu Zhong Kang Li etal 2022. SoK: On the Semantic AI Security in Autonomous Driving. arXiv (2022).  Junjie Shen Ningfei Wang Ziwen Wan Yunpeng Luo Takami Sato Zhisheng Hu Xinyang Zhang Shengjian Guo Zhenyu Zhong Kang Li et al. 2022. SoK: On the Semantic AI Security in Autonomous Driving. arXiv (2022)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102694"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354259"}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Los Angeles CA USA","acronym":"CCS '22"},"container-title":["Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3563539","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3563539","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:06Z","timestamp":1750182666000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3563539"}},"subtitle":["On the System-Level Effectiveness of Physical Object-Hiding Adversarial Attack in Autonomous Driving"],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":18,"alternative-id":["10.1145\/3548606.3563539","10.1145\/3548606"],"URL":"https:\/\/doi.org\/10.1145\/3548606.3563539","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}