{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,11]],"date-time":"2026-01-11T01:16:41Z","timestamp":1768094201209,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,8,25]]},"DOI":"10.1145\/3708821.3710836","type":"proceedings-article","created":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T06:30:56Z","timestamp":1755066656000},"page":"605-620","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Comprehensive Evaluation of Cloaking Backdoor Attacks on Object Detector in Real-World"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9069-7731","authenticated-orcid":false,"given":"Hua","family":"Ma","sequence":"first","affiliation":[{"name":"Data61, CSIRO, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9695-7947","authenticated-orcid":false,"given":"Alsharif","family":"Abuadbba","sequence":"additional","affiliation":[{"name":"Data61, CSIRO, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6029-5064","authenticated-orcid":false,"given":"Yansong","family":"Gao","sequence":"additional","affiliation":[{"name":"Depeartment of Computer Science and Software Engineering, The University of Western Australia, Perth, WA, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1605-3866","authenticated-orcid":false,"given":"Hyoungshick","family":"Kim","sequence":"additional","affiliation":[{"name":"Sungkyunkwan University, Sungkyunkwan, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3289-6599","authenticated-orcid":false,"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[{"name":"Data61, CSIRO, Sydney, NSW, Australia"}]}],"member":"320","published-online":{"date-parts":[[2025,8,24]]},"reference":[{"key":"e_1_3_3_2_2_2","unstructured":"Alexey Bochkovskiy Chien-Yao Wang and Hong-Yuan\u00a0Mark Liao. 2020. Yolov4: Optimal speed and accuracy of object detection. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2004.10934 (2020)."},{"key":"e_1_3_3_2_3_2","volume-title":"yolo3-pytorch","year":"2020","unstructured":"bubbliiiing. 2020. yolo3-pytorch. https:\/\/github.com\/bubbliiiing\/yolo3-pytorch"},{"key":"e_1_3_3_2_4_2","unstructured":"Anirban Chakraborty Manaar Alam Vishal Dey Anupam Chattopadhyay and Debdeep Mukhopadhyay. 2018. Adversarial attacks and defences: A survey. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1810.00069 (2018)."},{"key":"e_1_3_3_2_5_2","first-page":"396","volume-title":"European Conference on Computer Vision","author":"Chan Shih-Han","year":"2022","unstructured":"Shih-Han Chan, Yinpeng Dong, Jun Zhu, Xiaolu Zhang, and Jun Zhou. 2022. Baddet: Backdoor attacks on object detection. In European Conference on Computer Vision. Springer, 396\u2013412."},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"crossref","unstructured":"Zhenzhu Chen Shang Wang Anmin Fu Yansong Gao Shui Yu and Robert\u00a0H Deng. 2022. LinkBreaker: Breaking the backdoor-trigger link in DNNs via neurons consistency check. IEEE Transactions on Information Forensics and Security 17 (2022) 2000\u20132014.","DOI":"10.1109\/TIFS.2022.3175616"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_3_2_8_2","volume-title":"Annual Computer Security Applications Conference","author":"Doan Bao\u00a0Gia","year":"2024","unstructured":"Bao\u00a0Gia Doan, Dang\u00a0Quang Nguyen, Callum Lindquist, Paul Montague, Tamas Abraham, Olivier De\u00a0Vel, Seyit Camtepe, Salil\u00a0S Kanhere, Ehsan Abbasnejad, and Damith\u00a0C Ranasinghe. 2024. On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World. In Annual Computer Security Applications Conference."},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00667"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"crossref","unstructured":"Mark Everingham SM\u00a0Ali Eslami Luc Van\u00a0Gool Christopher\u00a0KI Williams John Winn and Andrew Zisserman. 2015. The pascal visual object classes challenge: A retrospective. International Journal of Computer Vision 111 1 (2015) 98\u2013136.","DOI":"10.1007\/s11263-014-0733-5"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"crossref","unstructured":"Mark Everingham Luc Van\u00a0Gool Christopher\u00a0KI Williams John Winn and Andrew Zisserman. 2010. The pascal visual object classes (VOC) challenge. International Journal of Computer Vision 88 2 (2010) 303\u2013338.","DOI":"10.1007\/s11263-009-0275-4"},{"key":"e_1_3_3_2_12_2","unstructured":"M. Everingham L. Van\u00a0Gool C.\u00a0K.\u00a0I. Williams J. Winn and A. Zisserman. [n.d.]. The PASCAL Visual Object Classes Challenge 2007 (VOC2007) Results. http:\/\/www.pascal-network.org\/challenges\/VOC\/voc2007\/workshop\/index.html."},{"key":"e_1_3_3_2_13_2","unstructured":"M. Everingham L. Van\u00a0Gool C.\u00a0K.\u00a0I. Williams J. Winn and A. Zisserman. [n.d.]. The PASCAL Visual Object Classes Challenge 2012 (VOC2012) Results. http:\/\/www.pascal-network.org\/challenges\/VOC\/voc2012\/workshop\/index.html."},{"key":"e_1_3_3_2_14_2","unstructured":"Yansong Gao Bao\u00a0Gia Doan Zhi Zhang Siqi Ma Anmin Fu Surya Nepal and Hyoungshick Kim. 2020. Backdoor attacks and countermeasures on deep learning: A comprehensive review. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2007.10760 (2020)."},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359790"},{"key":"e_1_3_3_2_16_2","unstructured":"Tianyu Gu Brendan Dolan-Gavitt and Siddharth Garg. 2017. Badnets: Identifying vulnerabilities in the machine learning model supply chain. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1708.06733 (2017)."},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.322"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_3_2_19_2","unstructured":"Yinshan Li Hua Ma Zhi Zhang Yansong Gao Alsharif Abuadbba Minhui Xue Anmin Fu Yifeng Zheng Said\u00a0F Al-Sarawi and Derek Abbott. 2023. Ntd: Non-transferability enabled deep learning backdoor detection. IEEE Transactions on Information Forensics and Security (2023)."},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423362"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10602-1_48"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"crossref","unstructured":"Li Liu Wanli Ouyang Xiaogang Wang Paul Fieguth Jie Chen Xinwang Liu and Matti Pietik\u00e4inen. 2020. Deep learning for generic object detection: A survey. International Journal of Computer Vision 128 2 (2020) 261\u2013318.","DOI":"10.1007\/s11263-019-01247-4"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363216"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP49357.2023.10095980"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS60354.2023.00018"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3670361"},{"key":"e_1_3_3_2_27_2","unstructured":"Yaguan Qian Boyuan Ji Shuke He Shenhui Huang Xiang Ling Bin Wang and Wei Wang. 2023. Robust backdoor attacks on object detection in real world. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2309.08953 (2023)."},{"key":"e_1_3_3_2_28_2","unstructured":"Huming Qiu Hua Ma Zhi Zhang Alsharif Abuadbba Wei Kang Anmin Fu and Yansong Gao. 2023. Towards a critical evaluation of robustness for deep learning backdoor countermeasures. IEEE Transactions on Information Forensics and Security (2023)."},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"e_1_3_3_2_30_2","unstructured":"Joseph Redmon and Ali Farhadi. 2018. Yolov3: An incremental improvement. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1804.02767 (2018)."},{"key":"e_1_3_3_2_31_2","unstructured":"Shaoqing Ren Kaiming He Ross Girshick and Jian Sun. 2015. Faster R-CNN: Towards real-time object detection with region proposal networks. Advances in Neural Information Processing Systems 201 (2015)."},{"key":"e_1_3_3_2_32_2","unstructured":"Guangyu Shen Siyuan Cheng Guanhong Tao Kaiyuan Zhang Yingqi Liu Shengwei An Shiqing Ma and Xiangyu Zhang. 2023. Django: Detecting trojans in object detection models via gaussian focus calibration. Advances in Neural Information Processing Systems 36 (2023) 51253\u201351272."},{"key":"e_1_3_3_2_33_2","unstructured":"Christian Szegedy Wojciech Zaremba Ilya Sutskever Joan Bruna Dumitru Erhan Ian Goodfellow and Rob Fergus. 2013. Intriguing properties of neural networks. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1312.6199 (2013)."},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00012"},{"key":"e_1_3_3_2_35_2","volume-title":"LabelImg","year":"2015","unstructured":"Tzutalin. 2015. LabelImg. https:\/\/github.com\/tzutalin\/labelImg"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00031"},{"key":"e_1_3_3_2_37_2","unstructured":"Emily Wenger Roma Bhattacharjee Arjun\u00a0Nitin Bhagoji Josephine Passananti Emilio Andere Heather Zheng and Ben Zhao. 2022. Finding naturally occurring physical backdoors in image datasets. Advances in Neural Information Processing Systems 35 (2022) 22103\u201322116."},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00614"},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/3560830.3563730"},{"key":"e_1_3_3_2_40_2","unstructured":"Zuxuan Wu Ser-Nam Lim Larry Davis and Tom Goldstein. 2019. Making an invisibility cloak: Real world adversarial attacks on object detectors. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1910.14667 (2019)."},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58548-8_1"},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179319"},{"key":"e_1_3_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.153"},{"key":"e_1_3_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58558-7_39"},{"key":"e_1_3_3_2_45_2","unstructured":"Xiaojun Xu Qi Wang Huichen Li Nikita Borisov Carl\u00a0A Gunter and Bo Li. 2019. Detecting AI Trojans Using Meta Neural Analysis. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1910.03137 (2019)."},{"key":"e_1_3_3_2_46_2","unstructured":"Mingfu Xue Can He Shichang Sun Jian Wang and Weiqiang Liu. 2021. Robust Backdoor Attacks against Deep Neural Networks in Real Physical World. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2104.07395 (2021)."},{"key":"e_1_3_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01210"},{"key":"e_1_3_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.1145\/3560905.3568539"},{"key":"e_1_3_3_2_49_2","unstructured":"Zhengxia Zou Zhenwei Shi Yuhong Guo and Jieping Ye. 2019. Object detection in 20 years: A survey. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1905.05055 (2019)."}],"event":{"name":"ASIA CCS '25: 20th ACM Asia Conference on Computer and Communications Security","location":"Hanoi Vietnam","acronym":"ASIA CCS '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 20th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3708821.3710836","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T07:29:23Z","timestamp":1755070163000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3708821.3710836"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,24]]},"references-count":48,"alternative-id":["10.1145\/3708821.3710836","10.1145\/3708821"],"URL":"https:\/\/doi.org\/10.1145\/3708821.3710836","relation":{},"subject":[],"published":{"date-parts":[[2025,8,24]]},"assertion":[{"value":"2025-08-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}