{"id":"https://openalex.org/W4386207886","doi":"https://doi.org/10.1109/iscc58397.2023.10218291","title":"Driving into Danger: Adversarial Patch Attack on End-to-End Autonomous Driving Systems Using Deep Learning","display_name":"Driving into Danger: Adversarial Patch Attack on End-to-End Autonomous Driving Systems Using Deep Learning","publication_year":2023,"publication_date":"2023-07-09","ids":{"openalex":"https://openalex.org/W4386207886","doi":"https://doi.org/10.1109/iscc58397.2023.10218291"},"language":"en","primary_location":{"id":"doi:10.1109/iscc58397.2023.10218291","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc58397.2023.10218291","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100450967","display_name":"Tong Wang","orcid":"https://orcid.org/0000-0001-6981-916X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Tong Wang","raw_affiliation_strings":["Institute of System Engineering, Academy of Military Sciences,Beijing,China","Institute of System Engineering, Academy of Military Sciences, Beijing, China","National Key Laboratory of Science and Technology on Information System Security, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of System Engineering, Academy of Military Sciences,Beijing,China","institution_ids":[]},{"raw_affiliation_string":"Institute of System Engineering, Academy of Military Sciences, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"National Key Laboratory of Science and Technology on Information System Security, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053431750","display_name":"Xiaohui Kuang","orcid":"https://orcid.org/0000-0003-3816-402X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiaohui Kuang","raw_affiliation_strings":["Institute of System Engineering, Academy of Military Sciences,Beijing,China","National Key Laboratory of Science and Technology on Information System Security, Beijing, China","Institute of System Engineering, Academy of Military Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of System Engineering, Academy of Military Sciences,Beijing,China","institution_ids":[]},{"raw_affiliation_string":"National Key Laboratory of Science and Technology on Information System Security, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"Institute of System Engineering, Academy of Military Sciences, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100444602","display_name":"Hu Li","orcid":"https://orcid.org/0000-0002-0420-855X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hu Li","raw_affiliation_strings":["Institute of System Engineering, Academy of Military Sciences,Beijing,China","Institute of System Engineering, Academy of Military Sciences, Beijing, China","National Key Laboratory of Science and Technology on Information System Security, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of System Engineering, Academy of Military Sciences,Beijing,China","institution_ids":[]},{"raw_affiliation_string":"Institute of System Engineering, Academy of Military Sciences, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"National Key Laboratory of Science and Technology on Information System Security, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104152401","display_name":"Qianjin Du","orcid":null},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qianjin Du","raw_affiliation_strings":["Institute of System Engineering, Academy of Military Sciences,Beijing,China","Institute of System Engineering, Academy of Military Sciences, Beijing, China","National Key Laboratory of Science and Technology on Information System Security, Beijing, China","Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of System Engineering, Academy of Military Sciences,Beijing,China","institution_ids":[]},{"raw_affiliation_string":"Institute of System Engineering, Academy of Military Sciences, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"National Key Laboratory of Science and Technology on Information System Security, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051762155","display_name":"Zhanhao Hu","orcid":"https://orcid.org/0000-0002-3746-1447"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhanhao Hu","raw_affiliation_strings":["Tsinghua University,Beijing,China","Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University,Beijing,China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011505911","display_name":"Huan Deng","orcid":"https://orcid.org/0000-0002-4298-3581"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Huan Deng","raw_affiliation_strings":["Institute of System Engineering, Academy of Military Sciences,Beijing,China","National Key Laboratory of Science and Technology on Information System Security, Beijing, China","Institute of System Engineering, Academy of Military Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of System Engineering, Academy of Military Sciences,Beijing,China","institution_ids":[]},{"raw_affiliation_string":"National Key Laboratory of Science and Technology on Information System Security, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"Institute of System Engineering, Academy of Military Sciences, Beijing, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101558477","display_name":"Gang Zhao","orcid":"https://orcid.org/0000-0002-5351-6903"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gang Zhao","raw_affiliation_strings":["Institute of System Engineering, Academy of Military Sciences,Beijing,China","Institute of System Engineering, Academy of Military Sciences, Beijing, China","National Key Laboratory of Science and Technology on Information System Security, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of System Engineering, Academy of Military Sciences,Beijing,China","institution_ids":[]},{"raw_affiliation_string":"Institute of System Engineering, Academy of Military Sciences, Beijing, China","institution_ids":[]},{"raw_affiliation_string":"National Key Laboratory of Science and Technology on Information System Security, Beijing, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5100450967"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.6983,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.7559516,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"995","last_page":"1000"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11099","display_name":"Autonomous Vehicle Technology and Safety","score":0.989300012588501,"subfield":{"id":"https://openalex.org/subfields/2203","display_name":"Automotive Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10800","display_name":"Forensic Toxicology and Drug Analysis","score":0.9463000297546387,"subfield":{"id":"https://openalex.org/subfields/3005","display_name":"Toxicology"},"field":{"id":"https://openalex.org/fields/30","display_name":"Pharmacology, Toxicology and Pharmaceutics"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7745855450630188},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7604578733444214},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.7037695646286011},{"id":"https://openalex.org/keywords/pedestrian","display_name":"Pedestrian","score":0.5811262130737305},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5533299446105957},{"id":"https://openalex.org/keywords/end-to-end-principle","display_name":"End-to-end principle","score":0.5099176168441772},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4564022123813629},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.336294025182724},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.18385478854179382},{"id":"https://openalex.org/keywords/transport-engineering","display_name":"Transport engineering","score":0.0859009325504303}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7745855450630188},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7604578733444214},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.7037695646286011},{"id":"https://openalex.org/C2777113093","wikidata":"https://www.wikidata.org/wiki/Q221488","display_name":"Pedestrian","level":2,"score":0.5811262130737305},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5533299446105957},{"id":"https://openalex.org/C74296488","wikidata":"https://www.wikidata.org/wiki/Q2527392","display_name":"End-to-end principle","level":2,"score":0.5099176168441772},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4564022123813629},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.336294025182724},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.18385478854179382},{"id":"https://openalex.org/C22212356","wikidata":"https://www.wikidata.org/wiki/Q775325","display_name":"Transport engineering","level":1,"score":0.0859009325504303}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscc58397.2023.10218291","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc58397.2023.10218291","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE Symposium on Computers and Communications (ISCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4699999988079071,"id":"https://metadata.un.org/sdg/11","display_name":"Sustainable cities and communities"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W2112009428","https://openalex.org/W2612690371","https://openalex.org/W2905423756","https://openalex.org/W2963726920","https://openalex.org/W2965333252","https://openalex.org/W2976698043","https://openalex.org/W3039575763","https://openalex.org/W3046359723","https://openalex.org/W3089221115","https://openalex.org/W3097573595","https://openalex.org/W3140377724","https://openalex.org/W3196072164","https://openalex.org/W3196107314","https://openalex.org/W3204155906","https://openalex.org/W4226067060","https://openalex.org/W4288283367","https://openalex.org/W4292347911","https://openalex.org/W4319964781","https://openalex.org/W6739901393","https://openalex.org/W6765977438"],"related_works":["https://openalex.org/W2502115930","https://openalex.org/W2482350142","https://openalex.org/W4246396837","https://openalex.org/W3126451824","https://openalex.org/W1561927205","https://openalex.org/W3191453585","https://openalex.org/W4297672492","https://openalex.org/W4310988119","https://openalex.org/W4285226279","https://openalex.org/W4288019534"],"abstract_inverted_index":{"Deep":[0],"learning-based":[1],"autonomous":[2,90,140],"driving":[3,91,141],"systems":[4,22],"have":[5,23],"been":[6,24],"extensively":[7],"researched":[8],"due":[9],"to":[10,15,43,70,131],"their":[11],"superior":[12],"performance":[13],"compared":[14],"traditional":[16],"methods.":[17],"Specifically,":[18],"end-to-end":[19,89],"deep":[20,38],"learning":[21,39],"developed,":[25],"which":[26,73],"directly":[27],"output":[28,53],"control":[29],"signals":[30],"for":[31,128],"vehicles":[32],"using":[33,98],"various":[34,109],"sensor":[35],"inputs.":[36],"However,":[37],"techniques":[40],"are":[41],"vulnerable":[42],"security":[44,116],"issues,":[45],"generating":[46],"adversarial":[47,62],"examples":[48],"that":[49,66],"can":[50,74],"attack":[51],"the":[52,55,79,83,88,99,103,115,126,137],"of":[54,118,121,139],"relevant":[56],"model.":[57],"This":[58,123],"paper":[59],"proposes":[60],"an":[61],"example":[63],"generation":[64],"method":[65,95],"applies":[67],"a":[68],"patch":[69],"pedestrians'":[71],"clothing,":[72],"generate":[75],"dangerous":[76],"behaviors":[77],"when":[78],"pedestrian":[80],"appears":[81],"within":[82],"camera":[84],"lens,":[85],"thereby":[86],"attacking":[87],"system.":[92,122],"The":[93],"proposed":[94],"is":[96],"validated":[97],"CARLA":[100],"simulator,":[101],"and":[102,111,135],"results":[104],"demonstrate":[105],"successful":[106],"attacks":[107],"in":[108],"weather":[110],"lighting":[112],"conditions,":[113],"exposing":[114],"vulnerabilities":[117,134],"this":[119],"type":[120],"study":[124],"highlights":[125],"need":[127],"further":[129],"research":[130],"address":[132],"these":[133],"ensure":[136],"safety":[138],"systems.":[142]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
