{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T15:03:58Z","timestamp":1767798238307,"version":"3.49.0"},"reference-count":63,"publisher":"Association for Computing Machinery (ACM)","issue":"1","funder":[{"DOI":"10.13039\/501100001381","name":"National Research Foundation, Singapore","doi-asserted-by":"crossref","award":["AISG4-GC-2023-006-1B"],"award-info":[{"award-number":["AISG4-GC-2023-006-1B"]}],"id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2026,1,31]]},"abstract":"<jats:p>\n                    Camera-based computer vision is essential to autonomous vehicle\u2019s perception. This article presents an attack that uses light-emitting diodes and exploits the camera\u2019s rolling shutter effect to create adversarial stripes in the captured images to mislead traffic sign recognition. The attack is stealthy because the stripes on the traffic sign are invisible to humans. For the attack to be threatening, the recognition results need to be stable over consecutive image frames. To achieve this, we design and implement\n                    <jats:italic toggle=\"yes\">GhostStripe<\/jats:italic>\n                    , an attack system that controls the timing of the modulated light emission to adapt to camera operations and victim vehicle movements. Evaluated on real testbeds, GhostStripe can stably spoof the traffic sign recognition results for up to 94% of frames to a wrong class when the victim vehicle passes the road section. In reality, such attack effect may fool victim vehicles into life-threatening incidents. To counteract this threat, we propose\n                    <jats:italic toggle=\"yes\">GhostBuster<\/jats:italic>\n                    , a software-based defense module to detect and mitigate the effects of GhostStripe. GhostBuster incorporates a perturbation detector and a sign restorer, effectively restoring the natural appearance of compromised traffic signs and significantly reducing the attack\u2019s impact. We also discuss other countermeasures at the levels of camera sensor and autonomous driving system.\n                  <\/jats:p>","DOI":"10.1145\/3773031","type":"journal-article","created":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T10:59:34Z","timestamp":1761562774000},"page":"1-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Invisible Adversarial Stripes on Traffic Sign: Threat and Defense for Autonomous Vehicles"],"prefix":"10.1145","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7464-0823","authenticated-orcid":false,"given":"Dongfang","family":"Guo","sequence":"first","affiliation":[{"name":"College of Computing and Data Science, Nanyang Technological University","place":["Singapore, Singapore"]}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-1510-6464","authenticated-orcid":false,"given":"Yuting","family":"Wu","sequence":"additional","affiliation":[{"name":"College of Computing and Data Science, Nanyang Technological University","place":["Singapore, Singapore"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1836-1122","authenticated-orcid":false,"given":"Pengfei","family":"Zhou","sequence":"additional","affiliation":[{"name":"Department of Informatics and Networked Systems, University of Pittsburgh","place":["Pittsburgh, United States"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8910-5666","authenticated-orcid":false,"given":"Xin","family":"Lou","sequence":"additional","affiliation":[{"name":"Infocomm Technology Cluster, Singapore Institute of Technology","place":["Singapore, Singapore"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8441-9973","authenticated-orcid":false,"given":"Rui","family":"Tan","sequence":"additional","affiliation":[{"name":"College of Computing and Data Science, Nanyang Technological University","place":["Singapore, Singapore"]}]}],"member":"320","published-online":{"date-parts":[[2026,1,7]]},"reference":[{"key":"e_1_3_2_2_2","volume-title":"When to Use Different Shutter Speeds (A Complete List)","year":"2012","unstructured":"2012. When to Use Different Shutter Speeds (A Complete List). Retrieved 22 Nov. 2023 from https:\/\/expertphotography.com\/when-to-use-different-shutter-speeds\/"},{"key":"e_1_3_2_3_2","volume-title":"What are the Most Common Traffic Signs?","year":"2018","unstructured":"2018. What are the Most Common Traffic Signs? Retrieved 20 Oct. 2023 from https:\/\/topdriver.com\/education-blog\/what-are-the-most-common-traffic-signs\/"},{"key":"e_1_3_2_4_2","volume-title":"Teardown: Tesla\u015b Hardware Retrofits for Model 3","year":"2020","unstructured":"2020. Teardown: Tesla\u015b Hardware Retrofits for Model 3. Retrieved 24 June 2023 from https:\/\/www.eetasia.com\/teslas-hardware-retrofits-for-model-3\/"},{"key":"e_1_3_2_5_2","volume-title":"The Road to Everywhere: Are HD Maps for Autonomous Driving Sustainable?","year":"2021","unstructured":"2021. The Road to Everywhere: Are HD Maps for Autonomous Driving Sustainable? Retrieved 16 Nov. 2023 from https:\/\/www.autonomousvehicleinternational.com\/features\/the-road-to-everywhere-are-hd-maps-for-autonomous-driving-sustainable.html"},{"key":"e_1_3_2_6_2","volume-title":"Apollo Traffic Light Perception","year":"2022","unstructured":"2022. Apollo Traffic Light Perception. Retrieved 1 June 2023 from https:\/\/github.com\/ApolloAuto\/apollo\/blob\/master\/docs\/06_Perception\/traffic_light.md"},{"key":"e_1_3_2_7_2","volume-title":"Manual on Uniform Traffic Control Devices for Streets and Highways","year":"2022","unstructured":"2022. Manual on Uniform Traffic Control Devices for Streets and Highways. Retrieved 1 Jan. 2023 from https:\/\/mutcd.fhwa.dot.gov\/"},{"key":"e_1_3_2_8_2","volume-title":"Apollo hardware development platform","year":"2023","unstructured":"2023. Apollo hardware development platform. Retrieved 1 June 2023 from https:\/\/developer.apollo.auto\/platform\/hardware.html"},{"key":"e_1_3_2_9_2","first-page":"284","volume-title":"ICML","author":"Athalye Anish","year":"2018","unstructured":"Anish Athalye, Logan Engstrom, Andrew Ilyas, and Kevin Kwok. 2018. Synthesizing robust adversarial examples. In ICML. PMLR, 284\u2013293."},{"key":"e_1_3_2_10_2","unstructured":"Tom B. Brown Dandelion Man\u00e9 Aurko Roy Mart\u00edn Abadi and Justin Gilmer. 2017. Adversarial patch. arXiv:1712.09665. Retrieved from https:\/\/arxiv.org\/abs\/1712.09665"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00076"},{"key":"e_1_3_2_12_2","volume-title":"A Complete List of All (arXiv) Adversarial Example Papers","author":"Carlini Nicholas","year":"2023","unstructured":"Nicholas Carlini. 2023. A Complete List of All (arXiv) Adversarial Example Papers. Personal website. Retrieved from https:\/\/nicholas.carlini.com\/writing\/2019\/all-adversarial-example-papers.html"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2012.6477759"},{"key":"e_1_3_2_14_2","first-page":"1625","volume-title":"IEEE\/CVF CVPR","author":"Eykholt Kevin","year":"2018","unstructured":"Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Chaowei Xiao, Atul Prakash, Tadayoshi Kohno, and Dawn Song. 2018. Robust physical-world attacks on deep learning visual classification. In IEEE\/CVF CVPR. 1625\u20131634."},{"key":"e_1_3_2_15_2","volume-title":"Rolling Versus Global Shutter","year":"2020","unstructured":"GETCAMERAS. 2020. Rolling Versus Global Shutter. Retrieved 24 Sep. 2022 from https:\/\/www.get-cameras.com\/FAQ-ROLLING-VS-GLOBAL-SHUTTER"},{"key":"e_1_3_2_16_2","unstructured":"Ian J. Goodfellow Jonathon Shlens and Christian Szegedy. 2014. Explaining and harnessing adversarial examples. arXiv:1412.6572. Retrieved from https:\/\/arxiv.org\/abs\/1412.6572"},{"key":"e_1_3_2_17_2","first-page":"1","volume-title":"ICCP","author":"Gu Jinwei","year":"2010","unstructured":"Jinwei Gu, Yasunobu Hitomi, Tomoo Mitsunaga, and Shree Nayar. 2010. Coded rolling shutter photography: Flexible space-time sampling. In ICCP. IEEE, 1\u20138."},{"key":"e_1_3_2_18_2","first-page":"534","volume-title":"ACM MobiSys","author":"Guo Dongfang","year":"2024","unstructured":"Dongfang Guo, Yuting Wu, Yimin Dai, Pengfei Zhou, Xin Lou, and Rui Tan. 2024. Invisible optical adversarial stripes on traffic sign against autonomous vehicles. In ACM MobiSys. 534\u2013546."},{"key":"e_1_3_2_19_2","first-page":"1","volume-title":"CoNEXT","author":"Hu Pengfei","year":"2015","unstructured":"Pengfei Hu, Parth H. Pathak, Xiaotao Feng, Hao Fu, and Prasant Mohapatra. 2015. Colorbars: Increasing data rate of led-to-camera communication using color shift keying. In CoNEXT. 1\u201313."},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2500437"},{"key":"e_1_3_2_21_2","volume-title":"Understanding Reflective vs. Non-Reflective Signage","year":"2023","unstructured":"Identimark. 2023. Understanding Reflective vs. Non-Reflective Signage. Retrieved 12 Feb. 2023 from https:\/\/identimark.com\/news\/when-do-i-use-reflective-vs-non-reflective-signage?"},{"key":"e_1_3_2_22_2","first-page":"1125","volume-title":"IEEE CVPR","author":"Isola Phillip","year":"2017","unstructured":"Phillip Isola, Jun-Yan Zhu, Tinghui Zhou, and Alexei A. Efros. 2017. Image-to-image translation with conditional adversarial networks. In IEEE CVPR. 1125\u20131134."},{"key":"e_1_3_2_23_2","first-page":"160","volume-title":"IEEE SP","author":"Ji Xiaoyu","year":"2021","unstructured":"Xiaoyu Ji, Yushi Cheng, Yuepeng Zhang, Kai Wang, Chen Yan, Wenyuan Xu, and Kevin Fu. 2021. Poltergeist: Acoustic adversarial machine learning against cameras and computer vision. In IEEE SP. IEEE, 160\u2013175."},{"key":"e_1_3_2_24_2","first-page":"3237","volume-title":"USENIX Security","author":"Jing Pengfei","year":"2021","unstructured":"Pengfei Jing, Qiyi Tang, Yuefeng Du, Lei Xue, Xiapu Luo, Ting Wang, Sen Nie, and Shi Wu. 2021. Too good to be safe: Tricking lane detection in autonomous driving with crafted perturbations. In USENIX Security. 3237\u20133254."},{"key":"e_1_3_2_25_2","volume-title":"YOLOv5 by Ultralytics","author":"Jocher Glenn","unstructured":"Glenn Jocher. 2020\u2013. YOLOv5 by Ultralytics. Retrieved 1 Jan. 2023 from https:\/\/github.com\/ultralytics\/yolov5"},{"key":"e_1_3_2_26_2","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1145\/3485832.3488016","volume-title":"ACSAC","author":"K\u00f6hler Sebastian","year":"2021","unstructured":"Sebastian K\u00f6hler, Giulio Lovisotto, Simon Birnbach, Richard Baker, and Ivan Martinovic. 2021. They see me rollin\u2018: Inherent vulnerability of the rolling shutter in cmos image sensors. In ACSAC. 399\u2013413."},{"key":"e_1_3_2_27_2","first-page":"447","volume-title":"MobiCom","author":"Kuo Ye-Sheng","year":"2014","unstructured":"Ye-Sheng Kuo, Pat Pannuto, Ko-Jen Hsiao, and Prabal Dutta. 2014. Luxapose: Indoor positioning with mobile phones and visible light. In MobiCom. 447\u2013458."},{"key":"e_1_3_2_28_2","first-page":"167","volume-title":"MobiSys","author":"Lee Hui-Yu","year":"2015","unstructured":"Hui-Yu Lee, Hao-Min Lin, Yu-Lin Wei, Hsin-I Wu, Hsin-Mu Tsai, and Kate Ching-Ju Lin. 2015. Rollinglight: Enabling line-of-sight light-to-camera communications. In MobiSys. 167\u2013180."},{"key":"e_1_3_2_29_2","unstructured":"Haoliang Li Yufei Wang Xiaofei Xie Yang Liu Shiqi Wang Renjie Wan Lap-Pui Chau and Alex C. Kot. 2020. Light can hack your face! black-box backdoor attack on face recognition systems. arXiv:2009.06996. Retrieved from https:\/\/arxiv.org\/abs\/2009.06996"},{"key":"e_1_3_2_30_2","first-page":"172","volume-title":"ACM MobiCom","author":"Liu Ziwei","year":"2022","unstructured":"Ziwei Liu, Tianyue Zheng, Chao Hu, Yanbing Yang, Yimao Sun, Yi Zhang, Zhe Chen, Liangyin Chen, and Jun Luo. 2022. CORE-lens: Simultaneous communication and object recognition with disentangled-GAN cameras. In ACM MobiCom. 172\u2013185."},{"key":"e_1_3_2_31_2","first-page":"1865","volume-title":"USENIX Security 21","author":"Lovisotto Giulio","year":"2021","unstructured":"Giulio Lovisotto, Henry Turner, Ivo Sluganovic, Martin Strohmeier, and Ivan Martinovic. 2021. Slap: Improving physical adversarial examples with short-lived adversarial perturbations. In USENIX Security 21. 1865\u20131882."},{"key":"e_1_3_2_32_2","volume-title":"ICLR","author":"Madry Aleksander","year":"2018","unstructured":"Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. 2018. Towards deep learning models resistant to adversarial attacks. In ICLR."},{"key":"e_1_3_2_33_2","first-page":"317","volume-title":"RAID","author":"Man Yanmao","year":"2020","unstructured":"Yanmao Man, Ming Li, and Ryan Gerdes. 2020. GhostImage: Remote perception attacks against camera-based image classification systems. In RAID. 317\u2013332."},{"key":"e_1_3_2_34_2","volume-title":"Traffic signs for car parks and roadworks","author":"signage maneki","year":"2025","unstructured":"maneki signage. 2025. Traffic signs for car parks and roadworks. Retrieved from https:\/\/www.maneki-signage.sg\/online-catalog\/traffic-signs"},{"issue":"10","key":"e_1_3_2_35_2","doi-asserted-by":"crossref","first-page":"1096","DOI":"10.3390\/medicina57101096","article-title":"Critical flicker fusion frequency: A narrative review","volume":"57","author":"Mankowska Natalia D.","year":"2021","unstructured":"Natalia D. Mankowska, Anna B. Marcinkowska, Monika Waskow, Rita I. Sharma, Jacek Kot, and Pawel J. Winklewski. 2021. Critical flicker fusion frequency: A narrative review. Medicina 57, 10 (2021), 1096.","journal-title":"Medicina"},{"issue":"4","key":"e_1_3_2_36_2","first-page":"94","article-title":"A review of sensor technologies for perception in automated driving","volume":"11","author":"Marti Enrique","year":"2019","unstructured":"Enrique Marti, Miguel Angel De Miguel, Fernando Garcia, and Joshue Perez. 2019. A review of sensor technologies for perception in automated driving. IEEE ITS Magazine 11, 4 (2019), 94\u2013108.","journal-title":"IEEE ITS Magazine"},{"key":"e_1_3_2_37_2","volume-title":"IFIP","author":"Mockus Jonas","year":"2005","unstructured":"Jonas Mockus. 2005. The Bayesian approach to global optimization. In IFIP. Springer."},{"key":"e_1_3_2_38_2","first-page":"293","volume-title":"ACM CCS","author":"Nassi Ben","year":"2020","unstructured":"Ben Nassi, Yisroel Mirsky, Dudi Nassi, Raz Ben-Netanel, Oleg Drokin, and Yuval Elovici. 2020. Phantom of the ADAS: Securing advanced driver-assistance systems from split-second phantom attacks. In ACM CCS. 293\u2013308."},{"key":"e_1_3_2_39_2","volume-title":"Bayesian Optimization: Open Source Constrained Global Optimization Tool for Python","author":"Nogueira Fernando","year":"2014","unstructured":"Fernando Nogueira. 2014. Bayesian Optimization: Open Source Constrained Global Optimization Tool for Python. GitHub. Retrieved from https:\/\/github.com\/fmfn\/BayesianOptimization"},{"key":"e_1_3_2_40_2","volume-title":"BlackHat Europe 11","author":"Petit Jonathan","year":"2015","unstructured":"Jonathan Petit, Bas Stottelaar, Michael Feiri, and Frank Kargl. 2015. Remote attacks on automated vehicles sensors: Experiments on camera and lidar. In BlackHat Europe 11."},{"key":"e_1_3_2_41_2","first-page":"249","volume-title":"IPSN","author":"Rajagopal Niranjini","year":"2014","unstructured":"Niranjini Rajagopal, Patrick Lazik, and Anthony Rowe. 2014. Visual light landmarks for mobile devices. In IPSN. IEEE, 249\u2013260."},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"e_1_3_2_43_2","volume-title":"NDSS","author":"Sato Takami","year":"2024","unstructured":"Takami Sato, S. Hrushikesh Bhupathiraju, Michael Clifford, Takeshi Sugawara, Qi Alfred Chen, and Sara Rampazzi. 2024. Invisible reflections: Leveraging infrared laser reflections to target traffic sign perception. In NDSS."},{"key":"e_1_3_2_44_2","first-page":"3309","volume-title":"USENIX Security","author":"Sato Takami","year":"2021","unstructured":"Takami Sato, Junjie Shen, Ningfei Wang, Yunhan Jia, Xue Lin, and Qi Alfred Chen. 2021. Dirty road can attack: Security of deep learning based automated lane centering under physical-world attack. In USENIX Security. 3309\u20133326."},{"key":"e_1_3_2_45_2","first-page":"14666","volume-title":"IEEE\/CVF CVPR","author":"Sayles Athena","year":"2021","unstructured":"Athena Sayles, Ashish Hooda, Mohit Gupta, Rahul Chatterjee, and Earlence Fernandes. 2021. Invisible perturbations: Physical adversarial examples exploiting the rolling shutter effect. In IEEE\/CVF CVPR. 14666\u201314675."},{"key":"e_1_3_2_46_2","first-page":"1528","volume-title":"ACM CCS","author":"Sharif Mahmood","year":"2016","unstructured":"Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, and Michael K. Reiter. 2016. Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition. In ACM CCS. 1528\u20131540."},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2011.6033395"},{"key":"e_1_3_2_48_2","volume-title":"Illuminance - recommended light levels","author":"ToolBox The Engineering","year":"2004","unstructured":"The Engineering ToolBox. 2004. Illuminance - recommended light levels. Retrieved 1 Oct. 2023 from https:\/\/www.engineeringtoolbox.com\/light-level-rooms-d_708.html"},{"issue":"2","key":"e_1_3_2_49_2","doi-asserted-by":"crossref","first-page":"887","DOI":"10.1364\/OE.444864","article-title":"Shuffled rolling shutter for snapshot temporal imaging","volume":"30","author":"Vera Esteban","year":"2022","unstructured":"Esteban Vera, Felipe Guzm\u00e1n, and Nelson D\u00edaz. 2022. Shuffled rolling shutter for snapshot temporal imaging. Optics Express 30, 2 (2022), 887\u2013901.","journal-title":"Optics Express"},{"key":"e_1_3_2_50_2","first-page":"1930","volume-title":"ACM CCS","author":"Wang Wei","year":"2021","unstructured":"Wei Wang, Yao Yao, Xin Liu, Xiang Li, Pei Hao, and Ting Zhu. 2021. I can see the light: Attacks on autonomous vehicles using invisible lights. In ACM CCS. 1930\u20131944."},{"key":"e_1_3_2_51_2","doi-asserted-by":"crossref","unstructured":"Hui Wei Hao Tang Xuemei Jia Zhixiang Wang Hanxun Yu Zhubo Li Shin\u2019ichi Satoh Luc Van Gool and Zheng Wang. 2022. Physical adversarial attack meets computer vision: A decade survey. IEEE Transactions on Pattern Analysis and Machine Intelligence 46 12 (2024) 9797\u20139817.","DOI":"10.1109\/TPAMI.2024.3430860"},{"key":"e_1_3_2_52_2","unstructured":"Xingxing Wei Bangzheng Pu Jiefan Lu and Baoyuan Wu. 2022. Visually adversarial attacks and defenses in the physical world: A survey. arXiv:2211.01671. Retrieved from https:\/\/arxiv.org\/abs\/2211.01671"},{"key":"e_1_3_2_53_2","first-page":"665","volume-title":"ECCV","author":"Xu Kaidi","year":"2020","unstructured":"Kaidi Xu, Gaoyuan Zhang, Sijia Liu, Quanfu Fan, Mengshu Sun, Hongge Chen, Pin-Yu Chen, Yanzhi Wang, and Xue Lin. 2020. Adversarial t-shirt! evading person detectors in a physical world. In ECCV. Springer, 665\u2013681."},{"issue":"8","key":"e_1_3_2_54_2","first-page":"109","article-title":"Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle","volume":"24","author":"Yan Chen","year":"2016","unstructured":"Chen Yan, Wenyuan Xu, and Jianhao Liu. 2016. Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle. Def Con 24, 8 (2016), 109.","journal-title":"Def Con"},{"key":"e_1_3_2_55_2","first-page":"1957","volume-title":"USENIX Security","author":"Yan Chen","year":"2022","unstructured":"Chen Yan, Zhijian Xu, Zhanyuan Yin, Stefan Mangard, Xiaoyu Ji, Wenyuan Xu, Kaifa Zhao, Yajin Zhou, Ting Wang, Guofei Gu, et\u00a0al. 2022. Rolling colors: Adversarial laser exploits against traffic light recognition. In USENIX Security. 1957\u20131974."},{"issue":"12","key":"e_1_3_2_56_2","first-page":"3308","article-title":"CeilingTalk: Lightweight indoor broadcast through LED-camera communication","volume":"16","author":"Yang Yanbing","year":"2017","unstructured":"Yanbing Yang, Jie Hao, and Jun Luo. 2017. CeilingTalk: Lightweight indoor broadcast through LED-camera communication. IEEE TMC 16, 12 (2017), 3308\u20133319.","journal-title":"IEEE TMC"},{"issue":"7","key":"e_1_3_2_57_2","first-page":"2022","article-title":"Towards real-time traffic sign detection and classification","volume":"17","author":"Yang Yi","year":"2015","unstructured":"Yi Yang, Hengliang Luo, Huarong Xu, and Fuchao Wu. 2015. Towards real-time traffic sign detection and classification. IEEE TITS 17, 7 (2015), 2022\u20132031.","journal-title":"IEEE TITS"},{"issue":"3","key":"e_1_3_2_58_2","first-page":"528","article-title":"Composite amplitude-shift keying for effective LED-camera VLC","volume":"19","author":"Yang Yanbing","year":"2019","unstructured":"Yanbing Yang and Jun Luo. 2019. Composite amplitude-shift keying for effective LED-camera VLC. IEEE TMC 19, 3 (2019), 528\u2013539.","journal-title":"IEEE TMC"},{"key":"e_1_3_2_59_2","first-page":"372","volume-title":"MobiCom","author":"Zhang Lan","year":"2015","unstructured":"Lan Zhang, Cheng Bo, Jiahui Hou, Xiang-Yang Li, Yu Wang, Kebin Liu, and Yunhao Liu. 2015. Kaleido: You can watch it but cannot record it. In MobiCom. 372\u2013385."},{"key":"e_1_3_2_60_2","first-page":"330","volume-title":"MobiSys","author":"Zhang Xiao","year":"2023","unstructured":"Xiao Zhang, Griffin Klevering, Juexing Wang, Li Xiao, and Tianxing Li. 2023. Rofin: 3d hand pose reconstructing via 2d rolling fingertips. In MobiSys. 330\u2013342."},{"key":"e_1_3_2_61_2","first-page":"347","volume-title":"IEEE\/ACM ICSE","author":"Zhou Husheng","year":"2020","unstructured":"Husheng Zhou, Wei Li, Zelun Kong, Junfeng Guo, Yuqun Zhang, Bei Yu, Lingming Zhang, and Cong Liu. 2020. Deepbillboard: Systematic physical-world testing of autonomous driving systems. In IEEE\/ACM ICSE. IEEE, 347\u2013358."},{"key":"e_1_3_2_62_2","first-page":"2223","volume-title":"IEEE ICCV","author":"Zhu Jun-Yan","year":"2017","unstructured":"Jun-Yan Zhu, Taesung Park, Phillip Isola, and Alexei A. Efros. 2017. Unpaired image-to-image translation using cycle-consistent adversarial networks. In IEEE ICCV. 2223\u20132232."},{"key":"e_1_3_2_63_2","first-page":"329","volume-title":"MobiCom","author":"Zhu Shilin","year":"2017","unstructured":"Shilin Zhu, Chi Zhang, and Xinyu Zhang. 2017. Automating visual privacy protection using a smart led. In MobiCom. 329\u2013342."},{"key":"e_1_3_2_64_2","first-page":"2110","volume-title":"IEEE CVPR","author":"Zhu Zhe","year":"2016","unstructured":"Zhe Zhu, Dun Liang, Songhai Zhang, Xiaolei Huang, Baoli Li, and Shimin Hu. 2016. Traffic-sign detection and classification in the wild. In IEEE CVPR. 2110\u20132118."}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3773031","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T12:16:24Z","timestamp":1767788184000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3773031"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,7]]},"references-count":63,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,1,31]]}},"alternative-id":["10.1145\/3773031"],"URL":"https:\/\/doi.org\/10.1145\/3773031","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"value":"1550-4859","type":"print"},{"value":"1550-4867","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,7]]},"assertion":[{"value":"2024-08-10","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-18","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2026-01-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}