{"id":"https://openalex.org/W7119131254","doi":"https://doi.org/10.1109/vtc2025-fall65116.2025.11310068","title":"GhostLite: Data Minimization with Applications to Real-Time LiDAR Attacks","display_name":"GhostLite: Data Minimization with Applications to Real-Time LiDAR Attacks","publication_year":2025,"publication_date":"2025-10-19","ids":{"openalex":"https://openalex.org/W7119131254","doi":"https://doi.org/10.1109/vtc2025-fall65116.2025.11310068"},"language":null,"primary_location":{"id":"doi:10.1109/vtc2025-fall65116.2025.11310068","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vtc2025-fall65116.2025.11310068","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 102nd Vehicular Technology Conference (VTC2025-Fall)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023209347","display_name":"Richard Capraru","orcid":null},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Richard Capraru","raw_affiliation_strings":["NTU,School of Electrical and Electronic Engineering,Singapore,639798"],"affiliations":[{"raw_affiliation_string":"NTU,School of Electrical and Electronic Engineering,Singapore,639798","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065619732","display_name":"Emil Lupu","orcid":"https://orcid.org/0000-0002-2844-3917"},"institutions":[{"id":"https://openalex.org/I47508984","display_name":"Imperial College London","ror":"https://ror.org/041kmwe10","country_code":"GB","type":"education","lineage":["https://openalex.org/I47508984"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Emil C. Lupu","raw_affiliation_strings":["Imperial College,Department of Computer Science,London,UK,SW7 2AZ"],"affiliations":[{"raw_affiliation_string":"Imperial College,Department of Computer Science,London,UK,SW7 2AZ","institution_ids":["https://openalex.org/I47508984"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122251478","display_name":"Jian-Gang Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I3005327000","display_name":"Institute for Infocomm Research","ror":"https://ror.org/053rfa017","country_code":"SG","type":"facility","lineage":["https://openalex.org/I115228651","https://openalex.org/I3005327000","https://openalex.org/I91275662"]},{"id":"https://openalex.org/I115228651","display_name":"Agency for Science, Technology and Research","ror":"https://ror.org/036wvzt09","country_code":"SG","type":"government","lineage":["https://openalex.org/I115228651"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Jian-Gang Wang","raw_affiliation_strings":["Institute for Infocomm Research, A*STAR,Singapore,138632"],"affiliations":[{"raw_affiliation_string":"Institute for Infocomm Research, A*STAR,Singapore,138632","institution_ids":["https://openalex.org/I3005327000","https://openalex.org/I115228651"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5122067890","display_name":"Boon Hee Soong","orcid":null},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Boon Hee Soong","raw_affiliation_strings":["NTU,School of Electrical and Electronic Engineering,Singapore,639798"],"affiliations":[{"raw_affiliation_string":"NTU,School of Electrical and Electronic Engineering,Singapore,639798","institution_ids":["https://openalex.org/I165932596"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5023209347"],"corresponding_institution_ids":["https://openalex.org/I165932596"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.85451371,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9379000067710876,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9379000067710876,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10036","display_name":"Advanced Neural Network Applications","score":0.03519999980926514,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.003100000089034438,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/object","display_name":"Object (grammar)","score":0.6610000133514404},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5752000212669373},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5637999773025513},{"id":"https://openalex.org/keywords/minification","display_name":"Minification","score":0.558899998664856},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5533000230789185},{"id":"https://openalex.org/keywords/object-detection","display_name":"Object detection","score":0.5041000247001648},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.45260000228881836},{"id":"https://openalex.org/keywords/point-cloud","display_name":"Point cloud","score":0.43230000138282776}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7652999758720398},{"id":"https://openalex.org/C2781238097","wikidata":"https://www.wikidata.org/wiki/Q175026","display_name":"Object (grammar)","level":2,"score":0.6610000133514404},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5752000212669373},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5637999773025513},{"id":"https://openalex.org/C147764199","wikidata":"https://www.wikidata.org/wiki/Q6865248","display_name":"Minification","level":2,"score":0.558899998664856},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5533000230789185},{"id":"https://openalex.org/C2776151529","wikidata":"https://www.wikidata.org/wiki/Q3045304","display_name":"Object detection","level":3,"score":0.5041000247001648},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.45260000228881836},{"id":"https://openalex.org/C131979681","wikidata":"https://www.wikidata.org/wiki/Q1899648","display_name":"Point cloud","level":2,"score":0.43230000138282776},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.38609999418258667},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.37950000166893005},{"id":"https://openalex.org/C58489278","wikidata":"https://www.wikidata.org/wiki/Q1172284","display_name":"Data set","level":2,"score":0.36570000648498535},{"id":"https://openalex.org/C51399673","wikidata":"https://www.wikidata.org/wiki/Q504027","display_name":"Lidar","level":2,"score":0.3474999964237213},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.34619998931884766},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3181999921798706},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3098999857902527},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3052999973297119},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.2937000095844269},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29280000925064087},{"id":"https://openalex.org/C160920958","wikidata":"https://www.wikidata.org/wiki/Q7662746","display_name":"Synthetic data","level":2,"score":0.28439998626708984},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.2612000107765198}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/vtc2025-fall65116.2025.11310068","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vtc2025-fall65116.2025.11310068","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 102nd Vehicular Technology Conference (VTC2025-Fall)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2115579991","https://openalex.org/W2211722331","https://openalex.org/W2740323046","https://openalex.org/W2959364614","https://openalex.org/W2963662610","https://openalex.org/W2968296999","https://openalex.org/W3008105217","https://openalex.org/W3035346742","https://openalex.org/W3195630664","https://openalex.org/W4214777292","https://openalex.org/W4385080259","https://openalex.org/W4405786052"],"related_works":[],"abstract_inverted_index":{"LiDAR-based":[0],"object":[1,15,74,121],"detection":[2,75,147],"plays":[3],"a":[4,30,60,110,132],"crucial":[5],"role":[6],"in":[7,42,164],"autonomous":[8],"driving,":[9],"yet":[10],"remains":[11,59],"vulnerable":[12],"to":[13,63,100,158],"ghost":[14,120],"attacks,":[16],"where":[17],"adversarially":[18,81],"crafted":[19,82],"point":[20],"clouds":[21],"trigger":[22],"false":[23],"detections.":[24],"Traditional":[25],"attack":[26,55,69,95,101,150,154,186],"methods":[27],"often":[28],"require":[29],"large":[31],"number":[32,52],"of":[33,53,117,135],"points":[34],"and":[35,68,113,153,160,175,191],"substantial":[36],"computational":[37,66,189],"resources,":[38],"making":[39],"them":[40],"inapplicable":[41],"real-world":[43,57,176],"scenarios.":[44],"Although":[45],"prior":[46],"research":[47],"has":[48,169],"explored":[49],"reducing":[50],"the":[51,64,102,125,194],"required":[54],"points,":[56,83,90,137,142],"feasibility":[58],"challenge":[61],"due":[62],"high":[65,146],"cost":[67],"generation":[70],"time.":[71],"While":[72],"LiDAR":[73],"can":[76],"be":[77],"compromised":[78],"given":[79],"enough":[80],"we":[84,92,108],"believe":[85],"there":[86],"are":[87,98],"some":[88],"critical":[89],"which":[91,97],"call":[93],"reduced":[94],"budget,":[96],"sufficient":[99],"detector.":[103],"Motivated":[104],"by":[105,123,156],"this":[106,165],"consideration,":[107],"propose":[109],"novel":[111],"geometric-":[112],"heuristic-based":[114],"approach":[115,144],"capable":[116],"generating":[118],"effective":[119],"attacks":[122],"leveraging":[124],"target\u2019s":[126],"contour":[127],"characteristics.":[128],"By":[129],"strategically":[130],"selecting":[131],"minimal":[133],"set":[134],"adversarial":[136],"as":[138,140],"few":[139],"20":[141],"our":[143,184],"maintains":[145],"confidence,":[148],"reduces":[149,188],"execution":[151],"time":[152],"budget":[155],"up":[157],"4":[159],"73":[161],"times,":[162],"respectively,":[163],"paper.":[166],"Our":[167],"method":[168],"been":[170],"verified":[171],"on":[172],"both":[173],"simulated":[174],"datasets":[177],"(KITTI).":[178],"The":[179],"experimental":[180],"results":[181],"demonstrate":[182],"that":[183],"optimized":[185],"significantly":[187],"overhead":[190],"consequently":[192],"improves":[193],"attack\u2019s":[195],"real-time":[196],"feasibility.":[197]},"counts_by_year":[],"updated_date":"2026-01-08T20:10:11.968330","created_date":"2026-01-08T00:00:00"}
