{"id":"https://openalex.org/W4402351737","doi":"https://doi.org/10.1109/ijcnn60899.2024.10650950","title":"PUBA: A Physical Undirected Backdoor Attack in Vision-based UAV Detection and Tracking Systems","display_name":"PUBA: A Physical Undirected Backdoor Attack in Vision-based UAV Detection and Tracking Systems","publication_year":2024,"publication_date":"2024-06-30","ids":{"openalex":"https://openalex.org/W4402351737","doi":"https://doi.org/10.1109/ijcnn60899.2024.10650950"},"language":"en","primary_location":{"id":"doi:10.1109/ijcnn60899.2024.10650950","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn60899.2024.10650950","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014985338","display_name":"Haoyu Jiang","orcid":"https://orcid.org/0000-0002-8807-4113"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haoyu Jiang","raw_affiliation_strings":["Shanghai Jiao Tong University,School of Cyber Science and Engineering,Shanghai,China,200240"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University,School of Cyber Science and Engineering,Shanghai,China,200240","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100685860","display_name":"Nan Li","orcid":"https://orcid.org/0000-0001-6201-9354"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Nan Li","raw_affiliation_strings":["Shanghai Jiao Tong University,School of Cyber Science and Engineering,Shanghai,China,200240"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University,School of Cyber Science and Engineering,Shanghai,China,200240","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100709379","display_name":"Ping Yi","orcid":"https://orcid.org/0000-0003-4530-5118"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ping Yi","raw_affiliation_strings":["Shanghai Jiao Tong University,School of Cyber Science and Engineering,Shanghai,China,200240"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University,School of Cyber Science and Engineering,Shanghai,China,200240","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5014985338"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":0.3637,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.66478455,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10331","display_name":"Video Surveillance and Tracking Methods","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.9402238726615906},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7049617171287537},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.6296257972717285},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6087058186531067},{"id":"https://openalex.org/keywords/tracking","display_name":"Tracking (education)","score":0.5420973300933838},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.26857805252075195},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.06433933973312378}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.9402238726615906},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7049617171287537},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.6296257972717285},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6087058186531067},{"id":"https://openalex.org/C2775936607","wikidata":"https://www.wikidata.org/wiki/Q466845","display_name":"Tracking (education)","level":2,"score":0.5420973300933838},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26857805252075195},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.06433933973312378},{"id":"https://openalex.org/C19417346","wikidata":"https://www.wikidata.org/wiki/Q7922","display_name":"Pedagogy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ijcnn60899.2024.10650950","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn60899.2024.10650950","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5400000214576721,"id":"https://metadata.un.org/sdg/7","display_name":"Affordable and clean energy"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W2124781496","https://openalex.org/W2138302688","https://openalex.org/W2165698076","https://openalex.org/W2252355370","https://openalex.org/W2395579298","https://openalex.org/W2511791013","https://openalex.org/W2523026762","https://openalex.org/W2603203130","https://openalex.org/W2615547864","https://openalex.org/W2774423163","https://openalex.org/W2942091739","https://openalex.org/W2963037989","https://openalex.org/W3042368254","https://openalex.org/W3086436251","https://openalex.org/W3092151103","https://openalex.org/W3104218139","https://openalex.org/W3104778224","https://openalex.org/W3140988292","https://openalex.org/W3156790900","https://openalex.org/W3175215793","https://openalex.org/W3183898570","https://openalex.org/W3210997334","https://openalex.org/W4224884895","https://openalex.org/W4283748233","https://openalex.org/W4286904999","https://openalex.org/W4319300181","https://openalex.org/W4320736757","https://openalex.org/W4386076325","https://openalex.org/W6746897123","https://openalex.org/W6783596713","https://openalex.org/W6792327856","https://openalex.org/W6810907425","https://openalex.org/W6839744764"],"related_works":["https://openalex.org/W2058170566","https://openalex.org/W2755342338","https://openalex.org/W2772917594","https://openalex.org/W2775347418","https://openalex.org/W2166024367","https://openalex.org/W3116076068","https://openalex.org/W2229312674","https://openalex.org/W2951359407","https://openalex.org/W2079911747","https://openalex.org/W1969923398"],"abstract_inverted_index":{"As":[0],"artificial":[1],"intelligence":[2],"advances,":[3],"deep":[4],"learning":[5],"and":[6,26,56,66,98,126,131,139,151,159],"machine":[7],"vision":[8],"technologies":[9],"have":[10],"been":[11],"widely":[12],"applied":[13],"in":[14,114,119,135,162,173],"unmanned":[15],"aerial":[16],"vehicle":[17],"(UAV)":[18],"platforms":[19,61],"for":[20,62,73],"tasks":[21,153],"such":[22],"as":[23],"target":[24,96,100,149,163,178],"tracking":[25,152],"visual":[27],"avoidance.":[28],"The":[29,46],"reliability":[30],"of":[31,43,48,133,148,176],"drones":[32,155],"equipped":[33],"with":[34],"AI":[35,49,74],"models":[36,50,165],"is":[37],"critically":[38],"dependent":[39],"on":[40,59,154],"the":[41,120,128,145,174],"security":[42,78,171],"these":[44],"models.":[45,68],"training":[47],"often":[51],"requires":[52],"substantial":[53],"computational":[54,63],"resources":[55],"typically":[57],"relies":[58],"third-party":[60],"power,":[64],"datasets,":[65],"pre-trained":[67],"This":[69,83,142],"reliance":[70],"creates":[71],"opportunities":[72],"backdoor":[75,90,112,124],"attacks,":[76],"posing":[77],"risks":[79],"to":[80,102],"AI-powered":[81],"drones.":[82,141],"paper":[84],"introduces":[85],"a":[86],"novel":[87],"undirected":[88],"physical":[89,115],"attack":[91],"method,":[92],"PUBA,":[93],"that":[94],"utilizes":[95],"disappearance":[97],"false":[99],"generation":[101],"poison":[103],"labels.":[104],"By":[105],"integrating":[106],"data":[107,158],"poisoning":[108,157],"techniques,":[109],"PUBA":[110,134],"implements":[111],"attacks":[113],"space,":[116],"collects":[117],"datasets":[118],"real":[121,140],"world,":[122],"trains":[123],"models,":[125],"evaluates":[127],"effectiveness,":[129],"stealth,":[130],"robustness":[132],"both":[136],"simulated":[137],"systems":[138],"study":[143],"disrupts":[144],"normal":[146],"execution":[147],"recognition":[150,164],"by":[156,167],"implanting":[160],"backdoors":[161],"used":[166],"UAVs,":[168],"exposing":[169],"potential":[170],"vulnerabilities":[172],"domain":[175],"drone":[177],"tracking.":[179]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
