{"id":"https://openalex.org/W7128629771","doi":"https://doi.org/10.1109/icves65691.2025.11376412","title":"Robust Monocular Depth Estimation Against Adversarial Camouflage in Autonomous Vehicles","display_name":"Robust Monocular Depth Estimation Against Adversarial Camouflage in Autonomous Vehicles","publication_year":2025,"publication_date":"2025-10-27","ids":{"openalex":"https://openalex.org/W7128629771","doi":"https://doi.org/10.1109/icves65691.2025.11376412"},"language":null,"primary_location":{"id":"doi:10.1109/icves65691.2025.11376412","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icves65691.2025.11376412","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Vehicular Electronics and Safety (ICVES)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5125680372","display_name":"Saahil Khanna","orcid":null},"institutions":[{"id":"https://openalex.org/I188760350","display_name":"Ollscoil na Gaillimhe \u2013 University of Galway","ror":"https://ror.org/03bea9k73","country_code":"IE","type":"education","lineage":["https://openalex.org/I188760350"]}],"countries":["IE"],"is_corresponding":true,"raw_author_name":"Saahil Khanna","raw_affiliation_strings":["University of Galway,School of Computer Science,Galway,Ireland"],"affiliations":[{"raw_affiliation_string":"University of Galway,School of Computer Science,Galway,Ireland","institution_ids":["https://openalex.org/I188760350"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022481554","display_name":"Muhammad Adeel Hafeez","orcid":"https://orcid.org/0000-0002-3593-7448"},"institutions":[{"id":"https://openalex.org/I188760350","display_name":"Ollscoil na Gaillimhe \u2013 University of Galway","ror":"https://ror.org/03bea9k73","country_code":"IE","type":"education","lineage":["https://openalex.org/I188760350"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Muhammad Adeel Hafeez","raw_affiliation_strings":["University of Galway,School of Computer Science,Galway,Ireland"],"affiliations":[{"raw_affiliation_string":"University of Galway,School of Computer Science,Galway,Ireland","institution_ids":["https://openalex.org/I188760350"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079866727","display_name":"Muhammad Asad","orcid":"https://orcid.org/0000-0002-1663-7837"},"institutions":[{"id":"https://openalex.org/I188760350","display_name":"Ollscoil na Gaillimhe \u2013 University of Galway","ror":"https://ror.org/03bea9k73","country_code":"IE","type":"education","lineage":["https://openalex.org/I188760350"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Muhammad Asad","raw_affiliation_strings":["University of Galway,School of Computer Science,Galway,Ireland"],"affiliations":[{"raw_affiliation_string":"University of Galway,School of Computer Science,Galway,Ireland","institution_ids":["https://openalex.org/I188760350"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104346398","display_name":"Ganesh Sistu","orcid":"https://orcid.org/0009-0003-1683-9257"},"institutions":[{"id":"https://openalex.org/I4210126639","display_name":"Valeo (Ireland)","ror":"https://ror.org/031sgpn76","country_code":"IE","type":"company","lineage":["https://openalex.org/I220619192","https://openalex.org/I4210126639"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Ganesh Sistu","raw_affiliation_strings":["Valeo Vision Systems,Tuam,Ireland"],"affiliations":[{"raw_affiliation_string":"Valeo Vision Systems,Tuam,Ireland","institution_ids":["https://openalex.org/I4210126639"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006608063","display_name":"Michael G. Madden","orcid":"https://orcid.org/0000-0002-4443-7285"},"institutions":[{"id":"https://openalex.org/I188760350","display_name":"Ollscoil na Gaillimhe \u2013 University of Galway","ror":"https://ror.org/03bea9k73","country_code":"IE","type":"education","lineage":["https://openalex.org/I188760350"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Michael G. Madden","raw_affiliation_strings":["University of Galway,School of Computer Science,Galway,Ireland"],"affiliations":[{"raw_affiliation_string":"University of Galway,School of Computer Science,Galway,Ireland","institution_ids":["https://openalex.org/I188760350"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010571416","display_name":"Ihsan Ullah","orcid":"https://orcid.org/0000-0002-7964-5199"},"institutions":[{"id":"https://openalex.org/I188760350","display_name":"Ollscoil na Gaillimhe \u2013 University of Galway","ror":"https://ror.org/03bea9k73","country_code":"IE","type":"education","lineage":["https://openalex.org/I188760350"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Ihsan Ullah","raw_affiliation_strings":["University of Galway,School of Computer Science,Galway,Ireland"],"affiliations":[{"raw_affiliation_string":"University of Galway,School of Computer Science,Galway,Ireland","institution_ids":["https://openalex.org/I188760350"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5125680372"],"corresponding_institution_ids":["https://openalex.org/I188760350"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.88045422,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"49","last_page":"56"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9174000024795532,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9174000024795532,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12153","display_name":"Advanced Optical Sensing Technologies","score":0.03139999881386757,"subfield":{"id":"https://openalex.org/subfields/3105","display_name":"Instrumentation"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11105","display_name":"Advanced Image Processing Techniques","score":0.00800000037997961,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.9135000109672546},{"id":"https://openalex.org/keywords/camouflage","display_name":"Camouflage","score":0.7663999795913696},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.7358999848365784},{"id":"https://openalex.org/keywords/monocular","display_name":"Monocular","score":0.585099995136261},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5059000253677368},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.5044999718666077},{"id":"https://openalex.org/keywords/estimation","display_name":"Estimation","score":0.3723999857902527}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.9135000109672546},{"id":"https://openalex.org/C2776196576","wikidata":"https://www.wikidata.org/wiki/Q196113","display_name":"Camouflage","level":2,"score":0.7663999795913696},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.7358999848365784},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6601999998092651},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.618399977684021},{"id":"https://openalex.org/C65909025","wikidata":"https://www.wikidata.org/wiki/Q1945033","display_name":"Monocular","level":2,"score":0.585099995136261},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5059000253677368},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.5044999718666077},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4575999975204468},{"id":"https://openalex.org/C96250715","wikidata":"https://www.wikidata.org/wiki/Q965330","display_name":"Estimation","level":2,"score":0.3723999857902527},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.33559998869895935},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29420000314712524},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.2854999899864197},{"id":"https://openalex.org/C2987248590","wikidata":"https://www.wikidata.org/wiki/Q4419860","display_name":"Unmanned surface vehicle","level":2,"score":0.2802000045776367},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.2766999900341034},{"id":"https://openalex.org/C2775977338","wikidata":"https://www.wikidata.org/wiki/Q2302880","display_name":"Unexploded ordnance","level":2,"score":0.274399995803833},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.2678000032901764},{"id":"https://openalex.org/C51399673","wikidata":"https://www.wikidata.org/wiki/Q504027","display_name":"Lidar","level":2,"score":0.26249998807907104},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.2597000002861023},{"id":"https://openalex.org/C67226441","wikidata":"https://www.wikidata.org/wiki/Q1665389","display_name":"Robust statistics","level":3,"score":0.25949999690055847},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2572000026702881}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icves65691.2025.11376412","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icves65691.2025.11376412","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Vehicular Electronics and Safety (ICVES)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W2617994934","https://openalex.org/W2798302089","https://openalex.org/W2910263088","https://openalex.org/W2917485473","https://openalex.org/W2963037989","https://openalex.org/W2963302614","https://openalex.org/W2985775862","https://openalex.org/W3084299414","https://openalex.org/W3103942840","https://openalex.org/W3173727695","https://openalex.org/W3175682855","https://openalex.org/W3183870986","https://openalex.org/W3196107314","https://openalex.org/W3210962254","https://openalex.org/W4214520160","https://openalex.org/W4285803579","https://openalex.org/W4313177625","https://openalex.org/W4316021701","https://openalex.org/W4323660286","https://openalex.org/W4362714293","https://openalex.org/W4379053291","https://openalex.org/W4382198211","https://openalex.org/W4387092541","https://openalex.org/W4390871805","https://openalex.org/W4390873864","https://openalex.org/W4390874575","https://openalex.org/W4400077923","https://openalex.org/W4402772363","https://openalex.org/W4411232065","https://openalex.org/W4415798746"],"related_works":[],"abstract_inverted_index":{"Autonomous":[0],"vehicle":[1],"(AV)":[2],"researchers":[3],"are":[4],"increasingly":[5],"exploring":[6],"the":[7,51,73,83,105,111,136,144],"use":[8],"of":[9,53,75,102,138,148],"monocular":[10],"depth":[11,112],"estimation":[12],"(MDE)":[13],"models":[14,31,55,89],"for":[15],"real-time":[16],"perception,":[17],"in":[18,110],"combination":[19],"with":[20,107],"other":[21],"depth-sensing":[22],"technologies":[23],"such":[24,90],"as":[25,91],"LIDAR":[26],"and":[27,42,61,95,146],"radar.":[28],"However,":[29],"MDE":[30,54,88,139],"remain":[32],"vulnerable":[33],"to":[34,44,56,64,143],"adversarial":[35,58,79,120,131],"attacks,":[36,117],"which":[37,122],"can":[38,133],"degrade":[39],"their":[40],"accuracy":[41],"lead":[43],"potentially":[45],"hazardous":[46],"misinterpretations.":[47],"This":[48],"paper":[49],"investigates":[50],"susceptibility":[52],"2D":[57,78],"patch":[59,80],"attacks":[60],"proposes":[62],"methods":[63],"improve":[65],"model":[66,125],"robustness.":[67],"In":[68],"this":[69],"work,":[70],"we":[71,118],"test":[72],"effects":[74],"an":[76],"optimized":[77],"derived":[81],"from":[82],"3D2Fool":[84],"algorithm":[85],"on":[86],"state-of-the-art":[87],"Monodepth2,":[92],"DenseDepth,":[93],"DepthAnythingV2,":[94],"ZoeDepth.":[96],"Our":[97,127],"experiments":[98],"reveal":[99],"varying":[100],"levels":[101],"vulnerability":[103],"among":[104],"models,":[106],"significant":[108],"disruptions":[109],"predictions.":[113],"To":[114],"counter":[115],"these":[116],"implemented":[119],"training,":[121],"significantly":[123],"improved":[124],"resilience.":[126],"results":[128],"demonstrate":[129],"that":[130],"training":[132],"substantially":[134],"enhance":[135],"robustness":[137],"systems,":[140],"thus":[141],"contributing":[142],"safety":[145],"cybersecurity":[147],"AV":[149],"technologies.":[150]},"counts_by_year":[],"updated_date":"2026-02-13T13:36:01.753593","created_date":"2026-02-12T00:00:00"}
