{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T00:30:09Z","timestamp":1766449809349,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T00:00:00Z","timestamp":1730678400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,4]]},"DOI":"10.1145\/3666025.3699345","type":"proceedings-article","created":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T18:48:26Z","timestamp":1730746106000},"page":"380-393","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["An Online Defense against Object-based LiDAR Attacks in Autonomous Driving"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5562-8001","authenticated-orcid":false,"given":"Yan","family":"Zhang","sequence":"first","affiliation":[{"name":"Iowa State University, Ames, Iowa, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6956-8126","authenticated-orcid":false,"given":"Zihao","family":"Liu","sequence":"additional","affiliation":[{"name":"Iowa State University, Ames, Iowa, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-6534-0569","authenticated-orcid":false,"given":"Chongliu","family":"Jia","sequence":"additional","affiliation":[{"name":"Iowa State University, Ames, Iowa, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3000-3918","authenticated-orcid":false,"given":"Yi","family":"Zhu","sequence":"additional","affiliation":[{"name":"Wayne State University, Detroit, Michigan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9646-7099","authenticated-orcid":false,"given":"Chenglin","family":"Miao","sequence":"additional","affiliation":[{"name":"Iowa State University, Ames, Iowa, United States"}]}],"member":"320","published-online":{"date-parts":[[2024,11,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP42928.2021.9506016"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i19.30085"},{"key":"e_1_3_2_1_3_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Cao Yulong","year":"2023","unstructured":"Yulong Cao, S Hrushikesh Bhupathiraju, Pirouz Naghavi, Takeshi Sugawara, Z Morley Mao, and Sara Rampazzi. 2023. You Can't See Me: Physical Removal Attacks on {LiDAR-based} Autonomous Vehicles Driving Frameworks. In 32nd USENIX Security Symposium (USENIX Security 23). 2993--3010."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00076"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339815"},{"key":"e_1_3_2_1_6_1","volume-title":"Adversarial objects against lidar-based autonomous driving systems. arXiv preprint arXiv:1907.05418","author":"Cao Yulong","year":"2019","unstructured":"Yulong Cao, Chaowei Xiao, Dawei Yang, Jing Fang, Ruigang Yang, Mingyan Liu, and Bo Li. 2019. Adversarial objects against lidar-based autonomous driving systems. arXiv preprint arXiv:1907.05418 (2019)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00987"},{"key":"e_1_3_2_1_8_1","volume-title":"21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24)","author":"Cui Jiahe","year":"2024","unstructured":"Jiahe Cui, Shuyao Shi, Yuze He, Jianwei Niu, Guoliang Xing, and Zhenchao Ouyang. 2024. {VILAM}: Infrastructure-assisted 3D Visual Localization and Mapping for Autonomous Driving. In 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). 1831--1845."},{"key":"e_1_3_2_1_9_1","volume-title":"See beyond seeing: Robust 3d object detection from point clouds via cross-modal hallucination. arXiv preprint arXiv:2309.17336","author":"Deng Jianning","year":"2023","unstructured":"Jianning Deng, Gabriel Chan, Hantao Zhong, and Chris Xiaoxuan Lu. 2023. See beyond seeing: Robust 3d object detection from point clouds via cross-modal hallucination. arXiv preprint arXiv:2309.17336 (2023)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i2.16207"},{"key":"e_1_3_2_1_11_1","first-page":"2","article-title":"Overview of the RANSAC Algorithm","volume":"4","author":"Derpanis Konstantinos G","year":"2010","unstructured":"Konstantinos G Derpanis. 2010. Overview of the RANSAC Algorithm. Image Rochester NY 4, 1 (2010), 2--3.","journal-title":"Image Rochester NY"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 1st Annual Conference on Robot Learning. 1--16","author":"Dosovitskiy Alexey","year":"2017","unstructured":"Alexey Dosovitskiy, German Ros, Felipe Codevilla, Antonio Lopez, and Vladlen Koltun. 2017. CARLA: An Open Urban Driving Simulator. In Proceedings of the 1st Annual Conference on Robot Learning. 1--16."},{"key":"e_1_3_2_1_13_1","volume-title":"The KITTI Vision Benchmark Suite. In Conference on Computer Vision and Pattern Recognition (CVPR).","author":"Geiger Andreas","year":"2012","unstructured":"Andreas Geiger, Philip Lenz, and Raquel Urtasun. 2012. Are we ready for Autonomous Driving? The KITTI Vision Benchmark Suite. In Conference on Computer Vision and Pattern Recognition (CVPR)."},{"key":"e_1_3_2_1_14_1","volume-title":"Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572","author":"Goodfellow Ian J","year":"2014","unstructured":"Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3643832.3661854"},{"key":"e_1_3_2_1_16_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Hallyburton R Spencer","year":"2022","unstructured":"R Spencer Hallyburton, Yupei Liu, Yulong Cao, Z Morley Mao, and Miroslav Pajic. 2022. Security analysis of {Camera-LiDAR} fusion against {Black-Box} attacks on autonomous vehicles. In 31st USENIX Security Symposium (USENIX Security 22). 1903--1920."},{"key":"e_1_3_2_1_17_1","volume-title":"Object removal attacks on lidar-based 3d object detectors. arXiv preprint arXiv:2102.03722","author":"Hau Zhongyuan","year":"2021","unstructured":"Zhongyuan Hau, Kenneth T Co, Soteris Demetriou, and Emil C Lupu. 2021. Object removal attacks on lidar-based 3d object detectors. arXiv preprint arXiv:2102.03722 (2021)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW54247.2022.9833890"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00823"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3570361.3613280"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3560905.3568519"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447993.3483276"},{"key":"e_1_3_2_1_23_1","volume-title":"International Conference on Learning Representations (ICLR'20)","author":"Jia Yunhan Jia","year":"2020","unstructured":"Yunhan Jia Jia, Yantao Lu, Junjie Shen, Qi Alfred Chen, Hao Chen, Zhenyu Zhong, and Tao Wei Wei. 2020. Fooling detection alone is not enough: Adversarial attack against multiple object tracking. In International Conference on Learning Representations (ICLR'20)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.3390\/s20030704"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01298"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475314"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00746"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01270-0_39"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.3233\/FAIA230441"},{"key":"e_1_3_2_1_30_1","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Lou Yang","year":"2024","unstructured":"Yang Lou, Yi Zhu, Qun Song, Rui Tan, Chunming Qiao, Wei-Bin Lee, and Jianping Wang. 2024. A First Physical-World Trajectory Prediction Attack via LiDAR-induced Deceptions in Autonomous Driving. In 33rd USENIX Security Symposium (USENIX Security 24)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01296"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9747582"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2948775"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.128"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3563537"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3495243.3560539"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01054"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3636534.3649352"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00086"},{"key":"e_1_3_2_1_40_1","volume-title":"3d part-aware and aggregation neural network for object detection from point cloud. arXiv preprint arXiv:1907.03670 2, 3","author":"Shi Shaoshuai","year":"2019","unstructured":"Shaoshuai Shi, Zhe Wang, Xiaogang Wang, and Hongsheng Li. 2019. Part-a^ 2 net: 3d part-aware and aggregation neural network for object detection from point cloud. arXiv preprint arXiv:1907.03670 2, 3 (2019)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_22"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6876"},{"key":"e_1_3_2_1_43_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Sun Jiachen","year":"2020","unstructured":"Jiachen Sun, Yulong Cao, Qi Alfred Chen, and Z Morley Mao. 2020. Towards robust {LiDAR-based} perception in autonomous driving: General black-box adversarial sensor attack and countermeasures. In 29th USENIX Security Symposium (USENIX Security 20). 877--894."},{"key":"e_1_3_2_1_44_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Suya Fnu","year":"2020","unstructured":"Fnu Suya, Jianfeng Chi, David Evans, and Yuan Tian. 2020. Hybrid batch attacks: Finding black-box adversarial examples with limited queries. In 29th USENIX Security Symposium (USENIX Security 20). 1327--1344."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01373"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-023-01784-z"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W58399.2023.00034"},{"key":"e_1_3_2_1_48_1","volume-title":"Timely Fusion of Surround Radar\/Lidar for Object Detection in Autonomous Driving Systems. arXiv preprint arXiv:2309.04806","author":"Xie Wenjing","year":"2023","unstructured":"Wenjing Xie, Tao Hu, Neiwen Ling, Guoliang Xing, Shaoshan Liu, and Nan Guan. 2023. Timely Fusion of Surround Radar\/Lidar for Object Detection in Autonomous Driving Systems. arXiv preprint arXiv:2309.04806 (2023)."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i16.17663"},{"key":"e_1_3_2_1_50_1","volume-title":"Proceedings, Part V 16","author":"Xu Kaidi","year":"2020","unstructured":"Kaidi Xu, Gaoyuan Zhang, Sijia Liu, Quanfu Fan, Mengshu Sun, Hongge Chen, Pin-Yu Chen, Yanzhi Wang, and Xue Lin. 2020. Adversarial t-shirt! evading person detectors in a physical world. In Computer Vision-ECCV 2020: 16th European Conference, Glasgow, UK, August 23--28, 2020, Proceedings, Part V 16. Springer, 665--681."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00798"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58574-7_41"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00204"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cag.2021.07.003"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2023.3280133"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3560905.3568539"},{"key":"e_1_3_2_1_57_1","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Zhu Shenchen","year":"2024","unstructured":"Shenchen Zhu, Yue Zhao, Kai Chen, Bo Wang, Hualong Ma, and Cheng'an Wei. 2024. AE-Morpher: Improve Physical Robustness of Adversarial Objects against LiDAR-based Detectors via Object Reconstruction. In 33rd USENIX Security Symposium (USENIX Security 24)."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485730.3485935"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616661"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485377"}],"event":{"name":"SenSys '24: 22nd ACM Conference on Embedded Networked Sensor Systems","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems","SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Hangzhou China","acronym":"SenSys '24"},"container-title":["Proceedings of the 22nd ACM Conference on Embedded Networked Sensor Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3666025.3699345","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3666025.3699345","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:10Z","timestamp":1750295890000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3666025.3699345"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,4]]},"references-count":60,"alternative-id":["10.1145\/3666025.3699345","10.1145\/3666025"],"URL":"https:\/\/doi.org\/10.1145\/3666025.3699345","relation":{},"subject":[],"published":{"date-parts":[[2024,11,4]]},"assertion":[{"value":"2024-11-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}