{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T23:19:47Z","timestamp":1769728787027,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Hong Kong RGC Theme-based Research Scheme","award":["T43-513\/23N-2"],"award-info":[{"award-number":["T43-513\/23N-2"]}]},{"name":"Hong Kong RGC Collaborative Research Fund","award":["C7004-22G, C1029-22G and C6015-23G"],"award-info":[{"award-number":["C7004-22G, C1029-22G and C6015-23G"]}]},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2232023Y-01"],"award-info":[{"award-number":["2232023Y-01"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Hong Kong RGC Research Impact Fund","award":["R6021-20"],"award-info":[{"award-number":["R6021-20"]}]},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100007219","name":"Natural Science Foundation of Shanghai","doi-asserted-by":"publisher","award":["22ZR1400200"],"award-info":[{"award-number":["22ZR1400200"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100007219","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Hong Kong RGC General Research Fund","award":["16200221, 16207922 and 16207423"],"award-info":[{"award-number":["16200221, 16207922 and 16207423"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,28]]},"DOI":"10.1145\/3664647.3681474","type":"proceedings-article","created":{"date-parts":[[2024,10,26]],"date-time":"2024-10-26T06:59:33Z","timestamp":1729925973000},"page":"2739-2747","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["DepthCloak: Projecting Optical Camouflage Patches for Erroneous Monocular Depth Estimation of Vehicles"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-6682-8927","authenticated-orcid":false,"given":"Huixiang","family":"Wen","sequence":"first","affiliation":[{"name":"Donghua University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-9526-0303","authenticated-orcid":false,"given":"Shizong","family":"Yan","sequence":"additional","affiliation":[{"name":"Donghua University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5253-2549","authenticated-orcid":false,"given":"Shan","family":"Chang","sequence":"additional","affiliation":[{"name":"Donghua University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-4539-6387","authenticated-orcid":false,"given":"Jie","family":"Xu","sequence":"additional","affiliation":[{"name":"Donghua University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8657-5064","authenticated-orcid":false,"given":"Hongzi","family":"Zhu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6317-1956","authenticated-orcid":false,"given":"Yanting","family":"Zhang","sequence":"additional","affiliation":[{"name":"Donghua University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2083-9105","authenticated-orcid":false,"given":"Bo","family":"Li","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology, Hong Kong, China"}]}],"member":"320","published-online":{"date-parts":[[2024,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19839-7_30"},{"key":"e_1_3_2_1_2_1","unstructured":"Vehicle Stopping Distance. 2011. (May 2011). http:\/\/www.csgnetwork.com\/stopdistcalc.html"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW54120.2021.00016"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (CVPR '22)","author":"Gnanasambandam Abhiram","year":"2022","unstructured":"Abhiram Gnanasambandam, Alex M Sherman, and Stanley H Chan. 2022. Shadows can be dangerous: Stealthy and effective physical-world adversarial attack by natural phenomenon. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (CVPR '22). New Orleans, USA, 15345--15354."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00393"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2403.11515"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3353042"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2023.104861"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1911.08790"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2403.17301"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/VR51125.2022.00073"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (CVPR '12)","author":"Jiao Yang","year":"2012","unstructured":"Yang Jiao, Zequn Jie, Shaoxiang Chen, Jingjing Chen, Lin Ma, and Yu-Gang Jiang. 2012. Are we ready for autonomous driving? the kitti vision benchmark suite. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (CVPR '12). Rhode Island, USA, 3354--3361."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02073"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413706"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 31st USENIX Security Symposium (USENIX Security '22)","author":"Li Yanjie","year":"2023","unstructured":"Yanjie Li, Yiquan Li, Xuelong Dai, Songtao Guo, and Bin Xiao. 2023. DoubleStar: Long-range attack towards depth estimation based obstacle avoidance in autonomous systems. In Proceedings of the 31st USENIX Security Symposium (USENIX Security '22). Vancouver, CA, 1885--1902."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02366"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 31st USENIX Security Symposium (USENIX Security '21)","author":"Li Yanjie","year":"2023","unstructured":"Yanjie Li, Yiquan Li, Xuelong Dai, Songtao Guo, and Bin Xiao. 2023. SLAP: Improving physical adversarial examples with Short-Lived adversarial perturbations. In Proceedings of the 31st USENIX Security Symposium (USENIX Security '21). Vancouver, CA, 1865--1882."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.740"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2861800"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the ACM SIGSAC conference on computer and communications security (CCS '22)","author":"Muller Raymond","year":"2023","unstructured":"Raymond Muller, Yanmao Man, Z Berkay Celik, Ming Li, and Ryan Gerdes. 2023. Physical hijacking attacks against object trackers. In Proceedings of the ACM SIGSAC conference on computer and communications security (CCS '22). Los Angeles, USA, 2309--2322."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00415"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978392"},{"key":"e_1_3_2_1_24_1","unstructured":"Tesla use per-pixel depth estimation with self-supervised learning. 2020. (April 2020). https:\/\/youtu.be\/hx7BXih7zx8?t=1334"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00225"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00122"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the IEEE\/CVF international conference on computer vision (ICCV '19)","author":"Wong Alex","year":"2019","unstructured":"Alex Wong, Safa Cicek, and Stefano Soatto. 2019. How do neural networks see depth in single images?. In Proceedings of the IEEE\/CVF international conference on computer vision (ICCV '19). Seoul, SKO, 2183--2191."},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the international conference on advances in neural information processing systems (NeurIPS '20)","author":"Wong Alex","year":"2020","unstructured":"Alex Wong, Safa Cicek, and Stefano Soatto. 2020. Targeted adversarial perturbations for monocular depth prediction. In Proceedings of the international conference on advances in neural information processing systems (NeurIPS '20). Vancouver, CA, 8486--8497."},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the 2023 ACM SIGSAC conference on computer and communications security (CCS '23)","author":"Wong Alex","year":"2023","unstructured":"Alex Wong, Safa Cicek, and Stefano Soatto. 2023. Unveiling the impact of patch placement: adversarial patch attacks on monocular depth estimation. In Proceedings of the 2023 ACM SIGSAC conference on computer and communications security (CCS '23). Copenhagen, DK, 3639--3641."},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the ACM international conference on multimedia (ACM MM '22)","author":"Xu Jialei","year":"2022","unstructured":"Jialei Xu, Xianming Liu, Yuanchao Bai, Junjun Jiang, Kaixuan Wang, Xiaozhi Chen, and Xiangyang Ji. 2022. Ds-mvsnet: Unsupervised multi-view stereo via depth synthesis. In Proceedings of the ACM international conference on multimedia (ACM MM '22). Lisbon, PT, 5593--5601."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3548394"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3027372"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2003.10315showDOI"}],"event":{"name":"MM '24: The 32nd ACM International Conference on Multimedia","location":"Melbourne VIC Australia","acronym":"MM '24","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 32nd ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664647.3681474","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664647.3681474","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:57:47Z","timestamp":1750294667000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664647.3681474"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,28]]},"references-count":33,"alternative-id":["10.1145\/3664647.3681474","10.1145\/3664647"],"URL":"https:\/\/doi.org\/10.1145\/3664647.3681474","relation":{},"subject":[],"published":{"date-parts":[[2024,10,28]]},"assertion":[{"value":"2024-10-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}