{"id":"https://openalex.org/W4392796949","doi":"https://doi.org/10.1109/tifs.2024.3376192","title":"PhaDe: Practical Phantom Spoofing Attack Detection for Autonomous Vehicles","display_name":"PhaDe: Practical Phantom Spoofing Attack Detection for Autonomous Vehicles","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4392796949","doi":"https://doi.org/10.1109/tifs.2024.3376192"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2024.3376192","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3376192","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078406349","display_name":"Feng Lin","orcid":"https://orcid.org/0000-0001-5240-5200"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Feng Lin","raw_affiliation_strings":["State Key Laboratory of Blockchain and Data Security, School of Cyber Science and Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Blockchain and Data Security, School of Cyber Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061478876","display_name":"Hao Yan","orcid":"https://orcid.org/0009-0003-0195-0446"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hao Yan","raw_affiliation_strings":["State Key Laboratory of Blockchain and Data Security, School of Cyber Science and Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Blockchain and Data Security, School of Cyber Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114488807","display_name":"Li Jin","orcid":"https://orcid.org/0009-0009-5596-4740"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jin Li","raw_affiliation_strings":["State Key Laboratory of Blockchain and Data Security, School of Cyber Science and Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Blockchain and Data Security, School of Cyber Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039921590","display_name":"Ziwei Liu","orcid":"https://orcid.org/0000-0003-2311-4193"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ziwei Liu","raw_affiliation_strings":["State Key Laboratory of Blockchain and Data Security, School of Cyber Science and Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Blockchain and Data Security, School of Cyber Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100658678","display_name":"Li L\u00fc","orcid":"https://orcid.org/0000-0001-5230-3749"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Lu","raw_affiliation_strings":["State Key Laboratory of Blockchain and Data Security, School of Cyber Science and Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Blockchain and Data Security, School of Cyber Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072485378","display_name":"Zhongjie Ba","orcid":"https://orcid.org/0000-0003-0921-8869"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhongjie Ba","raw_affiliation_strings":["State Key Laboratory of Blockchain and Data Security, School of Cyber Science and Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Blockchain and Data Security, School of Cyber Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5105297718","display_name":"Kui Ren","orcid":"https://orcid.org/0000-0002-1969-2591"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kui Ren","raw_affiliation_strings":["State Key Laboratory of Blockchain and Data Security, School of Cyber Science and Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Blockchain and Data Security, School of Cyber Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5078406349"],"corresponding_institution_ids":["https://openalex.org/I76130692"],"apc_list":null,"apc_paid":null,"fwci":1.8131,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.86292985,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":97},"biblio":{"volume":"19","issue":null,"first_page":"4199","last_page":"4214"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9872000217437744,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8035917282104492},{"id":"https://openalex.org/keywords/imaging-phantom","display_name":"Imaging phantom","score":0.7825990319252014},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.7093218564987183},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.38281023502349854},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3404993414878845},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.312278687953949},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.07291775941848755}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8035917282104492},{"id":"https://openalex.org/C104293457","wikidata":"https://www.wikidata.org/wiki/Q28324852","display_name":"Imaging phantom","level":2,"score":0.7825990319252014},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.7093218564987183},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.38281023502349854},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3404993414878845},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.312278687953949},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.07291775941848755},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2024.3376192","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3376192","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2051114290","display_name":null,"funder_award_id":"62172359","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3123248364","display_name":null,"funder_award_id":"62372406","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3489595043","display_name":null,"funder_award_id":"62032021","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5043574788","display_name":null,"funder_award_id":"62102354","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":58,"referenced_works":["https://openalex.org/W79321830","https://openalex.org/W639708223","https://openalex.org/W1755205674","https://openalex.org/W1945616565","https://openalex.org/W2131953535","https://openalex.org/W2159132531","https://openalex.org/W2230740169","https://openalex.org/W2243397390","https://openalex.org/W2598634450","https://openalex.org/W2602244503","https://openalex.org/W2798302089","https://openalex.org/W2890883923","https://openalex.org/W2906405631","https://openalex.org/W2941957370","https://openalex.org/W2962858109","https://openalex.org/W2963118547","https://openalex.org/W2963542245","https://openalex.org/W2963857521","https://openalex.org/W2983044655","https://openalex.org/W3009971095","https://openalex.org/W3018757597","https://openalex.org/W3033852357","https://openalex.org/W3035564946","https://openalex.org/W3036080349","https://openalex.org/W3037946152","https://openalex.org/W3091791645","https://openalex.org/W3105806188","https://openalex.org/W3109104051","https://openalex.org/W3114686421","https://openalex.org/W3138516171","https://openalex.org/W3148327892","https://openalex.org/W3173433428","https://openalex.org/W3183864931","https://openalex.org/W3196850540","https://openalex.org/W3211853936","https://openalex.org/W3213319487","https://openalex.org/W4287728573","https://openalex.org/W4293478066","https://openalex.org/W4293584584","https://openalex.org/W4293846201","https://openalex.org/W4320002812","https://openalex.org/W4385245566","https://openalex.org/W4387835420","https://openalex.org/W6640425456","https://openalex.org/W6689238212","https://openalex.org/W6739868092","https://openalex.org/W6750227808","https://openalex.org/W6751839145","https://openalex.org/W6752654261","https://openalex.org/W6772048929","https://openalex.org/W6779943705","https://openalex.org/W6780233385","https://openalex.org/W6780574220","https://openalex.org/W6795213574","https://openalex.org/W6796161053","https://openalex.org/W6797613833","https://openalex.org/W6810678098","https://openalex.org/W6842019321"],"related_works":["https://openalex.org/W2772917594","https://openalex.org/W2036807459","https://openalex.org/W2058170566","https://openalex.org/W2755342338","https://openalex.org/W2166024367","https://openalex.org/W3116076068","https://openalex.org/W2229312674","https://openalex.org/W2951359407","https://openalex.org/W2079911747","https://openalex.org/W1969923398"],"abstract_inverted_index":{"Despite":[0],"their":[1],"prevalence":[2],"and":[3,39,112,128,198],"indispensability":[4],"in":[5,51,83],"the":[6,21,48,67,78,146,183,216],"perception":[7],"modules":[8],"of":[9,26,69,111,141,149,185,193,203],"autonomous":[10,52],"vehicles,":[11],"cameras":[12],"have":[13],"shown":[14],"susceptibility":[15],"to":[16,42,91,124,161,182],"numerous":[17],"attacks.":[18,76],"Among":[19],"them,":[20],"phantom":[22,105],"spoofing":[23,106],"attack":[24,115],"is":[25],"significant":[27],"concern.":[28],"In":[29,89],"such":[30],"attacks,":[31,155],"malefactors":[32],"employ":[33],"electronic":[34],"display":[35,40],"devices":[36,70],"like":[37],"projectors":[38],"monitors":[41],"generate":[43],"deceptive":[44],"objects,":[45],"thereby":[46],"duping":[47],"object":[49],"detectors":[50],"vehicles.":[53],"However,":[54],"existing":[55],"detection":[56,200],"methodologies":[57],"are":[58],"narrowly":[59],"focused":[60],"on":[61,170,195,205],"a":[62,97,109,131,199,211],"single":[63],"device":[64,179],"category,":[65],"ignoring":[66],"multitude":[68],"that":[71],"could":[72],"be":[73],"leveraged":[74],"for":[75,137],"Furthermore,":[77],"artificial":[79,126],"modality-based":[80],"solution":[81],"presently":[82],"use":[84],"lacks":[85],"efficacious":[86],"fusion":[87,135],"mechanisms.":[88],"response":[90,213],"these":[92],"limitations,":[93],"we":[94,156],"propose":[95],"PhaDe,":[96],"practical":[98],"deep":[99],"learning-based":[100],"system":[101,151],"adept":[102],"at":[103],"detecting":[104],"attacks":[107],"from":[108,165,177],"variety":[110],"even":[113],"unfamiliar":[114,206],"devices.":[116],"Our":[117,188],"approach":[118],"introduces":[119],"two":[120,158],"image":[121],"processing":[122],"techniques":[123],"construct":[125],"modalities":[127],"further":[129],"advances":[130],"multi-head":[132],"self-attention":[133],"MSA-based":[134],"module":[136],"more":[138],"versatile":[139],"integration":[140],"disparate":[142],"modalities.":[143],"To":[144],"boost":[145],"generalization":[147],"capacity":[148],"our":[150,171,186],"against":[152],"novel,":[153],"unseen":[154],"incorporate":[157],"representation-level":[159],"losses":[160],"align":[162],"feature":[163],"distributions":[164],"various":[166],"domains.":[167,207],"Evaluations":[168],"conducted":[169],"own":[172],"dataset,":[173],"encompassing":[174],"fake":[175],"objects":[176],"several":[178],"types,":[180],"attest":[181],"efficacy":[184],"system.":[187],"results":[189],"indicate":[190],"an":[191],"accuracy":[192],"98.80%":[194],"familiar":[196],"domains":[197],"success":[201],"rate":[202],"94.03%":[204],"Additionally,":[208],"PhaDe":[209],"demonstrates":[210],"swift":[212],"time,":[214],"fulfilling":[215],"practicality":[217],"requisites.":[218]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
