{"id":"https://openalex.org/W4389076229","doi":"https://doi.org/10.1109/tdsc.2023.3334618","title":"Adversarial Computer Vision via Acoustic Manipulation of Camera Sensors","display_name":"Adversarial Computer Vision via Acoustic Manipulation of Camera Sensors","publication_year":2023,"publication_date":"2023-11-28","ids":{"openalex":"https://openalex.org/W4389076229","doi":"https://doi.org/10.1109/tdsc.2023.3334618"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2023.3334618","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2023.3334618","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063893376","display_name":"Yushi Cheng","orcid":"https://orcid.org/0000-0002-0888-2322"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yushi Cheng","raw_affiliation_strings":["Ubiquitous System Security Lab (USSLAB), Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Ubiquitous System Security Lab (USSLAB), Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017116027","display_name":"Xiaoyu Ji","orcid":"https://orcid.org/0000-0002-1101-0007"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyu Ji","raw_affiliation_strings":["Ubiquitous System Security Lab (USSLAB), Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Ubiquitous System Security Lab (USSLAB), Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115076788","display_name":"Wenjun Zhu","orcid":"https://orcid.org/0009-0000-9595-9203"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenjun Zhu","raw_affiliation_strings":["Ubiquitous System Security Lab (USSLAB), Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Ubiquitous System Security Lab (USSLAB), Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5115076802","display_name":"Shibo Zhang","orcid":"https://orcid.org/0009-0009-1545-8106"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shibo Zhang","raw_affiliation_strings":["Ubiquitous System Security Lab (USSLAB), Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Ubiquitous System Security Lab (USSLAB), Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113708992","display_name":"Kevin Fu","orcid":null},"institutions":[{"id":"https://openalex.org/I12912129","display_name":"Northeastern University","ror":"https://ror.org/04t5xt781","country_code":"US","type":"education","lineage":["https://openalex.org/I12912129"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kevin Fu","raw_affiliation_strings":["Security and Privacy Research Group (SPQR), Northeastern University, Boston, MI, USA"],"affiliations":[{"raw_affiliation_string":"Security and Privacy Research Group (SPQR), Northeastern University, Boston, MI, USA","institution_ids":["https://openalex.org/I12912129"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060351020","display_name":"Wenyuan Xu","orcid":"https://orcid.org/0000-0002-5043-9148"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenyuan Xu","raw_affiliation_strings":["Ubiquitous System Security Lab (USSLAB), Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Ubiquitous System Security Lab (USSLAB), Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5063893376"],"corresponding_institution_ids":["https://openalex.org/I76130692"],"apc_list":null,"apc_paid":null,"fwci":1.222,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.8375701,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"21","issue":"4","first_page":"3734","last_page":"3750"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11515","display_name":"Bacillus and Francisella bacterial research","score":0.9886999726295471,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8039447069168091},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.6346145272254944},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.612704873085022},{"id":"https://openalex.org/keywords/object","display_name":"Object (grammar)","score":0.4924834668636322},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.45080018043518066},{"id":"https://openalex.org/keywords/image-sensor","display_name":"Image sensor","score":0.44569963216781616},{"id":"https://openalex.org/keywords/compensation","display_name":"Compensation (psychology)","score":0.43001365661621094},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2531461715698242}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8039447069168091},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.6346145272254944},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.612704873085022},{"id":"https://openalex.org/C2781238097","wikidata":"https://www.wikidata.org/wiki/Q175026","display_name":"Object (grammar)","level":2,"score":0.4924834668636322},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.45080018043518066},{"id":"https://openalex.org/C76935873","wikidata":"https://www.wikidata.org/wiki/Q209121","display_name":"Image sensor","level":2,"score":0.44569963216781616},{"id":"https://openalex.org/C2780023022","wikidata":"https://www.wikidata.org/wiki/Q1338171","display_name":"Compensation (psychology)","level":2,"score":0.43001365661621094},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2531461715698242},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C11171543","wikidata":"https://www.wikidata.org/wiki/Q41630","display_name":"Psychoanalysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2023.3334618","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2023.3334618","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2461859056","display_name":null,"funder_award_id":"62071428","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2509534683","display_name":null,"funder_award_id":"62222114","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4914349744","display_name":null,"funder_award_id":"62271280","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994516692","display_name":null,"funder_award_id":"61925109","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4388150944","https://openalex.org/W4242235492","https://openalex.org/W4237162029","https://openalex.org/W2367268135","https://openalex.org/W2385701518","https://openalex.org/W4237464767","https://openalex.org/W2068562251","https://openalex.org/W4252295672","https://openalex.org/W1480190076","https://openalex.org/W2395750098"],"abstract_inverted_index":{"Autonomous":[0],"vehicles":[1],"increasingly":[2],"rely":[3],"on":[4],"camera-based":[5],"computer":[6,64],"vision":[7,65],"systems":[8],"to":[9,28,60,68],"perceive":[10],"environments":[11],"and":[12,63,92,122,136,155,157,162,189],"make":[13],"critical":[14],"driving":[15],"decisions.":[16],"To":[17],"improve":[18],"image":[19,21,30,56],"quality,":[20],"stabilizers":[22],"with":[23],"inertial":[24,85],"sensors":[25],"are":[26],"added":[27],"reduce":[29],"blurring":[31],"caused":[32],"by":[33],"camera":[34,101],"jitters.":[35],"However,":[36],"this":[37],"trend":[38],"creates":[39],"a":[40,47,95,174,183],"new":[41,175],"attack":[42,125],"surface.":[43],"This":[44],"paper":[45],"identifies":[46],"system-level":[48,178],"vulnerability":[49],"resulting":[50,181],"from":[51,182],"the":[52,81,100,116,142,167],"combination":[53,184],"of":[54,83,118,132,144,169,177,185,192],"emerging":[55],"stabilizer":[57],"hardware":[58],"susceptible":[59],"acoustic":[61,75,120],"manipulation":[62,121],"algorithms":[66],"subject":[67],"adversarial":[69,186],"examples.":[70],"By":[71],"emitting":[72],"deliberately":[73],"designed":[74],"signals,":[76],"an":[77,84,124],"adversary":[78],"can":[79,107,128],"control":[80],"output":[82],"sensor,":[86],"which":[87],"triggers":[88],"unnecessary":[89],"motion":[90],"compensation":[91],"results":[93,140],"in":[94],"blurred":[96,105],"image,":[97],"even":[98],"when":[99],"is":[102],"stable.":[103],"These":[104],"images":[106],"induce":[108],"object":[109,149],"misclassification,":[110],"affecting":[111],"safety-critical":[112],"decision-making.":[113],"We":[114,164],"model":[115],"feasibility":[117],"such":[119],"design":[123],"framework":[126],"that":[127],"accomplish":[129],"three":[130],"types":[131],"attacks:":[133],"hiding,":[134],"creating,":[135],"altering":[137],"objects.":[138],"Evaluation":[139],"demonstrate":[141],"effectiveness":[143],"our":[145],"attacks":[146],"against":[147],"five":[148],"detectors":[150,160],"(YOLO":[151],"V3/V4/V5,":[152],"Faster":[153],"R-CNN,":[154],"Apollo)":[156],"two":[158],"lane":[159],"(UFLD":[161],"LaneAF).":[163],"further":[165],"introduce":[166],"concept":[168],"<monospace":[170],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[171],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">AMpLe</monospace>":[172],"attacks,":[173],"class":[176],"security":[179],"vulnerabilities":[180],"machine":[187],"learning":[188],"physics-based":[190],"injection":[191],"information-carrying":[193],"signals":[194],"into":[195],"hardware.":[196]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
