{"id":"https://openalex.org/W3207043982","doi":"https://doi.org/10.1109/icra48506.2021.9561817","title":"Adversarial Attacks on Optimization based Planners","display_name":"Adversarial Attacks on Optimization based Planners","publication_year":2021,"publication_date":"2021-05-30","ids":{"openalex":"https://openalex.org/W3207043982","doi":"https://doi.org/10.1109/icra48506.2021.9561817","mag":"3207043982"},"language":"en","primary_location":{"id":"doi:10.1109/icra48506.2021.9561817","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icra48506.2021.9561817","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Robotics and Automation (ICRA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050296324","display_name":"Sai Vemprala","orcid":"https://orcid.org/0000-0001-7554-5417"},"institutions":[{"id":"https://openalex.org/I1290206253","display_name":"Microsoft (United States)","ror":"https://ror.org/00d0nc645","country_code":"US","type":"company","lineage":["https://openalex.org/I1290206253"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sai Vemprala","raw_affiliation_strings":["Microsoft Corporation, Redmond, USA"],"affiliations":[{"raw_affiliation_string":"Microsoft Corporation, Redmond, USA","institution_ids":["https://openalex.org/I1290206253"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101933711","display_name":"Ashish Kapoor","orcid":"https://orcid.org/0009-0004-3764-8449"},"institutions":[{"id":"https://openalex.org/I1290206253","display_name":"Microsoft (United States)","ror":"https://ror.org/00d0nc645","country_code":"US","type":"company","lineage":["https://openalex.org/I1290206253"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ashish Kapoor","raw_affiliation_strings":["Microsoft Corporation, Redmond, USA"],"affiliations":[{"raw_affiliation_string":"Microsoft Corporation, Redmond, USA","institution_ids":["https://openalex.org/I1290206253"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5050296324"],"corresponding_institution_ids":["https://openalex.org/I1290206253"],"apc_list":null,"apc_paid":null,"fwci":0.8158,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.78547845,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"9943","last_page":"9949"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9882000088691711,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12072","display_name":"Machine Learning and Algorithms","score":0.9815999865531921,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7820103168487549},{"id":"https://openalex.org/keywords/trajectory","display_name":"Trajectory","score":0.7031600475311279},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6933695673942566},{"id":"https://openalex.org/keywords/planner","display_name":"Planner","score":0.6477783918380737},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6311869621276855},{"id":"https://openalex.org/keywords/trajectory-optimization","display_name":"Trajectory optimization","score":0.6244299411773682},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6226957440376282},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.6193986535072327},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5926368832588196},{"id":"https://openalex.org/keywords/robot","display_name":"Robot","score":0.5692171454429626},{"id":"https://openalex.org/keywords/optimization-problem","display_name":"Optimization problem","score":0.47004714608192444},{"id":"https://openalex.org/keywords/iterative-method","display_name":"Iterative method","score":0.4405214488506317},{"id":"https://openalex.org/keywords/motion-planning","display_name":"Motion planning","score":0.42165300250053406},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4154474139213562},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.24307313561439514},{"id":"https://openalex.org/keywords/optimal-control","display_name":"Optimal control","score":0.20882543921470642},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.13365575671195984},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12486511468887329},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.10118681192398071}],"concepts":[{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7820103168487549},{"id":"https://openalex.org/C13662910","wikidata":"https://www.wikidata.org/wiki/Q193139","display_name":"Trajectory","level":2,"score":0.7031600475311279},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6933695673942566},{"id":"https://openalex.org/C2776999362","wikidata":"https://www.wikidata.org/wiki/Q2349274","display_name":"Planner","level":2,"score":0.6477783918380737},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6311869621276855},{"id":"https://openalex.org/C173246807","wikidata":"https://www.wikidata.org/wiki/Q7833062","display_name":"Trajectory optimization","level":3,"score":0.6244299411773682},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6226957440376282},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.6193986535072327},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5926368832588196},{"id":"https://openalex.org/C90509273","wikidata":"https://www.wikidata.org/wiki/Q11012","display_name":"Robot","level":2,"score":0.5692171454429626},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.47004714608192444},{"id":"https://openalex.org/C159694833","wikidata":"https://www.wikidata.org/wiki/Q2321565","display_name":"Iterative method","level":2,"score":0.4405214488506317},{"id":"https://openalex.org/C81074085","wikidata":"https://www.wikidata.org/wiki/Q366872","display_name":"Motion planning","level":3,"score":0.42165300250053406},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4154474139213562},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.24307313561439514},{"id":"https://openalex.org/C91575142","wikidata":"https://www.wikidata.org/wiki/Q1971426","display_name":"Optimal control","level":2,"score":0.20882543921470642},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13365575671195984},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12486511468887329},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.10118681192398071},{"id":"https://openalex.org/C1276947","wikidata":"https://www.wikidata.org/wiki/Q333","display_name":"Astronomy","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icra48506.2021.9561817","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icra48506.2021.9561817","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Robotics and Automation (ICRA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/11","display_name":"Sustainable cities and communities","score":0.7200000286102295}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":52,"referenced_works":["https://openalex.org/W1502922572","https://openalex.org/W1673923490","https://openalex.org/W1945616565","https://openalex.org/W2019965290","https://openalex.org/W2099893201","https://openalex.org/W2103728338","https://openalex.org/W2158390457","https://openalex.org/W2235028240","https://openalex.org/W2482392012","https://openalex.org/W2535873859","https://openalex.org/W2559854331","https://openalex.org/W2560504659","https://openalex.org/W2564322318","https://openalex.org/W2585698528","https://openalex.org/W2588802774","https://openalex.org/W2604410735","https://openalex.org/W2752340395","https://openalex.org/W2761373498","https://openalex.org/W2797742547","https://openalex.org/W2798302089","https://openalex.org/W2798766386","https://openalex.org/W2807095006","https://openalex.org/W2951930445","https://openalex.org/W2953610242","https://openalex.org/W2962787639","https://openalex.org/W2962822210","https://openalex.org/W2963207607","https://openalex.org/W2963433607","https://openalex.org/W2964153729","https://openalex.org/W2995631631","https://openalex.org/W3003747652","https://openalex.org/W3011042361","https://openalex.org/W3091945716","https://openalex.org/W3098925401","https://openalex.org/W3098934356","https://openalex.org/W3105750153","https://openalex.org/W3106010854","https://openalex.org/W3106333735","https://openalex.org/W4250739957","https://openalex.org/W4255045719","https://openalex.org/W4294399973","https://openalex.org/W4301909677","https://openalex.org/W6629804754","https://openalex.org/W6637162671","https://openalex.org/W6640425456","https://openalex.org/W6689917546","https://openalex.org/W6730294168","https://openalex.org/W6732652919","https://openalex.org/W6751839145","https://openalex.org/W6760116675","https://openalex.org/W6765410593","https://openalex.org/W6771607980"],"related_works":["https://openalex.org/W2083550201","https://openalex.org/W2005354226","https://openalex.org/W2065492591","https://openalex.org/W1680735664","https://openalex.org/W4210847363","https://openalex.org/W2790483871","https://openalex.org/W3095132291","https://openalex.org/W3118331990","https://openalex.org/W2000140632","https://openalex.org/W3207043982"],"abstract_inverted_index":{"Trajectory":[0,13],"planning":[1],"is":[2,94],"a":[3,11,88,109],"key":[4,91],"piece":[5],"in":[6,98,124],"the":[7,33,42,46,52,74,83,99,104,114,129,142],"algorithmic":[8],"architecture":[9],"of":[10,108,128,141,156],"robot.":[12],"planners":[14,43,65,145],"typically":[15],"use":[16],"iterative":[17,62,158],"optimization":[18,63,105,159],"schemes":[19],"for":[20,30],"generating":[21],"smooth":[22],"trajectories":[23],"that":[24,60,72,95,148],"avoid":[25],"collisions":[26],"and":[27,146],"are":[28],"optimal":[29],"tracking":[31],"given":[32],"robot\u2019s":[34],"physical":[35],"specifications.":[36],"Starting":[37],"from":[38],"an":[39,96,149,157],"initial":[40],"estimate,":[41],"iteratively":[44],"refine":[45],"solution":[47],"so":[48],"as":[49],"to":[50,69,77,86,122,132],"satisfy":[51],"desired":[53],"constraints.":[54],"In":[55],"this":[56],"paper,":[57],"we":[58],"show":[59],"such":[61],"based":[64],"can":[66,101,116,151],"be":[67],"vulnerable":[68],"adversarial":[70],"attacks":[71],"force":[73],"planner":[75],"either":[76],"fail":[78],"completely,":[79],"or":[80],"significantly":[81],"increase":[82],"time":[84],"required":[85],"find":[87],"solution.":[89],"The":[90],"insight":[92],"here":[93],"adversary":[97,115,150],"environment":[100],"directly":[102],"affect":[103],"cost":[106],"function":[107],"planner.":[110],"We":[111,134],"demonstrate":[112,147],"how":[113],"adjust":[117],"its":[118],"own":[119],"state":[120,140],"configurations":[121],"result":[123],"poorly":[125],"conditioned":[126],"eigenstructure":[127],"objective":[130],"leading":[131],"failures.":[133],"apply":[135],"our":[136],"method":[137],"against":[138],"two":[139],"art":[143],"trajectory":[144],"consistently":[152],"exploit":[153],"certain":[154],"weaknesses":[155],"scheme.":[160]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":4},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
