{"id":"https://openalex.org/W4308411153","doi":"https://doi.org/10.1145/3548606.3559390","title":"Physical Hijacking Attacks against Object Trackers","display_name":"Physical Hijacking Attacks against Object Trackers","publication_year":2022,"publication_date":"2022-11-07","ids":{"openalex":"https://openalex.org/W4308411153","doi":"https://doi.org/10.1145/3548606.3559390"},"language":"en","primary_location":{"id":"doi:10.1145/3548606.3559390","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3548606.3559390","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3548606.3559390","source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3548606.3559390","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065840778","display_name":"Raymond J. Muller","orcid":"https://orcid.org/0000-0002-4315-4160"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Raymond Muller","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007178406","display_name":"Yanmao Man","orcid":"https://orcid.org/0000-0002-3994-7416"},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yanmao Man","raw_affiliation_strings":["University of Arizona, Tucson, AZ, USA"],"affiliations":[{"raw_affiliation_string":"University of Arizona, Tucson, AZ, USA","institution_ids":["https://openalex.org/I138006243"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Z. Berkay Celik","orcid":null},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Z. Berkay Celik","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100351382","display_name":"Ming Li","orcid":"https://orcid.org/0000-0002-1218-2804"},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ming Li","raw_affiliation_strings":["University of Arizona, Tucson, AZ, USA"],"affiliations":[{"raw_affiliation_string":"University of Arizona, Tucson, AZ, USA","institution_ids":["https://openalex.org/I138006243"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042147260","display_name":"Ryan Gerdes","orcid":"https://orcid.org/0000-0003-0876-1181"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ryan Gerdes","raw_affiliation_strings":["Virginia Tech, Arlington, VA, USA"],"affiliations":[{"raw_affiliation_string":"Virginia Tech, Arlington, VA, USA","institution_ids":["https://openalex.org/I859038795"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5065840778"],"corresponding_institution_ids":["https://openalex.org/I219193219"],"apc_list":null,"apc_paid":null,"fwci":0.7162,"has_fulltext":true,"cited_by_count":12,"citation_normalized_percentile":{"value":0.79613993,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"2309","last_page":"2322"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10331","display_name":"Video Surveillance and Tracking Methods","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10331","display_name":"Video Surveillance and Tracking Methods","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12597","display_name":"Fire Detection and Safety Systems","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bittorrent-tracker","display_name":"BitTorrent tracker","score":0.8031100034713745},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7746689319610596},{"id":"https://openalex.org/keywords/object","display_name":"Object (grammar)","score":0.6957683563232422},{"id":"https://openalex.org/keywords/video-tracking","display_name":"Video tracking","score":0.6170710325241089},{"id":"https://openalex.org/keywords/minimum-bounding-box","display_name":"Minimum bounding box","score":0.5545529127120972},{"id":"https://openalex.org/keywords/pipeline","display_name":"Pipeline (software)","score":0.5371227264404297},{"id":"https://openalex.org/keywords/tracking","display_name":"Tracking (education)","score":0.5319212675094604},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.5156809091567993},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4840197265148163},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.48138073086738586},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4780631363391876},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.4237898588180542},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40522462129592896},{"id":"https://openalex.org/keywords/eye-tracking","display_name":"Eye tracking","score":0.16989529132843018},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.14074242115020752}],"concepts":[{"id":"https://openalex.org/C57501372","wikidata":"https://www.wikidata.org/wiki/Q2021268","display_name":"BitTorrent tracker","level":3,"score":0.8031100034713745},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7746689319610596},{"id":"https://openalex.org/C2781238097","wikidata":"https://www.wikidata.org/wiki/Q175026","display_name":"Object (grammar)","level":2,"score":0.6957683563232422},{"id":"https://openalex.org/C202474056","wikidata":"https://www.wikidata.org/wiki/Q1931635","display_name":"Video tracking","level":3,"score":0.6170710325241089},{"id":"https://openalex.org/C147037132","wikidata":"https://www.wikidata.org/wiki/Q6865426","display_name":"Minimum bounding box","level":3,"score":0.5545529127120972},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.5371227264404297},{"id":"https://openalex.org/C2775936607","wikidata":"https://www.wikidata.org/wiki/Q466845","display_name":"Tracking (education)","level":2,"score":0.5319212675094604},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.5156809091567993},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4840197265148163},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.48138073086738586},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4780631363391876},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.4237898588180542},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40522462129592896},{"id":"https://openalex.org/C56461940","wikidata":"https://www.wikidata.org/wiki/Q970687","display_name":"Eye tracking","level":2,"score":0.16989529132843018},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.14074242115020752},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C19417346","wikidata":"https://www.wikidata.org/wiki/Q7922","display_name":"Pedagogy","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/3548606.3559390","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3548606.3559390","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3548606.3559390","source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:repository.arizona.edu:10150/670382","is_oa":false,"landing_page_url":"http://hdl.handle.net/10150/670382","pdf_url":null,"source":{"id":"https://openalex.org/S4306400271","display_name":"UA Campus Repository (The University of Arizona)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I138006243","host_organization_name":"University of Arizona","host_organization_lineage":["https://openalex.org/I138006243"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"Proceedings of the ACM Conference on Computer and Communications Security","raw_type":"text"},{"id":"pmh:oai:vtechworks.lib.vt.edu:10919/113804","is_oa":true,"landing_page_url":"http://hdl.handle.net/10919/113804","pdf_url":null,"source":{"id":"https://openalex.org/S4306400248","display_name":"VTechWorks (Virginia Tech)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I859038795","host_organization_name":"Virginia Tech","host_organization_lineage":["https://openalex.org/I859038795"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Text"}],"best_oa_location":{"id":"doi:10.1145/3548606.3559390","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3548606.3559390","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3548606.3559390","source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3117913780","display_name":null,"funder_award_id":"1801611","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7153579904","display_name":null,"funder_award_id":"W911NF2110320","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G7452299184","display_name":null,"funder_award_id":"W911NF","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G8411576471","display_name":"CAREER: Compositional IoT Safety and Security in Physical Spaces","funder_award_id":"2144645","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8998121839","display_name":null,"funder_award_id":"911NF","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4308411153.pdf","grobid_xml":"https://content.openalex.org/works/W4308411153.grobid-xml"},"referenced_works_count":57,"referenced_works":["https://openalex.org/W112162037","https://openalex.org/W569478347","https://openalex.org/W576301840","https://openalex.org/W1483870316","https://openalex.org/W1992067978","https://openalex.org/W2055289854","https://openalex.org/W2110226160","https://openalex.org/W2158827467","https://openalex.org/W2163605009","https://openalex.org/W2169796049","https://openalex.org/W2350778671","https://openalex.org/W2419072270","https://openalex.org/W2426702661","https://openalex.org/W2559655401","https://openalex.org/W2604505099","https://openalex.org/W2613718673","https://openalex.org/W2693668331","https://openalex.org/W2741933435","https://openalex.org/W2785781023","https://openalex.org/W2799058067","https://openalex.org/W2805597339","https://openalex.org/W2886910176","https://openalex.org/W2959364614","https://openalex.org/W2971831522","https://openalex.org/W2996180708","https://openalex.org/W3012842798","https://openalex.org/W3015377530","https://openalex.org/W3034823537","https://openalex.org/W3037245397","https://openalex.org/W3046411575","https://openalex.org/W3048707286","https://openalex.org/W3098881644","https://openalex.org/W3105806188","https://openalex.org/W3107524501","https://openalex.org/W3109104051","https://openalex.org/W3132455321","https://openalex.org/W3154528133","https://openalex.org/W3156877806","https://openalex.org/W3160908140","https://openalex.org/W3174820339","https://openalex.org/W3176686930","https://openalex.org/W3195373975","https://openalex.org/W3195583930","https://openalex.org/W3210780202","https://openalex.org/W3211707810","https://openalex.org/W3211853936","https://openalex.org/W4200396694","https://openalex.org/W4205256241","https://openalex.org/W4210598169","https://openalex.org/W4255556797","https://openalex.org/W4321383446","https://openalex.org/W6735463952","https://openalex.org/W6741947397","https://openalex.org/W6746449270","https://openalex.org/W6794126733","https://openalex.org/W6800357305","https://openalex.org/W6891937993"],"related_works":["https://openalex.org/W57279572","https://openalex.org/W2012200063","https://openalex.org/W4320086059","https://openalex.org/W4210734798","https://openalex.org/W4319934144","https://openalex.org/W2405278583","https://openalex.org/W4312249400","https://openalex.org/W4389490576","https://openalex.org/W2985391290","https://openalex.org/W3093712048"],"abstract_inverted_index":{"Modern":[0],"autonomous":[1,27],"systems":[2],"rely":[3],"on":[4,34,159],"both":[5,138],"object":[6,9,23,39,44,51,66],"detection":[7,24],"and":[8,128,141],"tracking":[10,40,52],"in":[11,90,111,122,137],"their":[12],"visual":[13],"perception":[14],"pipelines.":[15],"Although":[16],"many":[17],"recent":[18],"works":[19],"have":[20],"attacked":[21],"the":[22,43,102,139,153],"component":[25],"of":[26,65,106,116,131,152],"vehicles,":[28],"these":[29],"attacks":[30,49],"do":[31,58],"not":[32,59],"work":[33,60],"full":[35],"pipelines":[36],"that":[37,85,93,145],"integrate":[38],"to":[41,113],"enhance":[42],"detector's":[45],"accuracy.":[46],"Meanwhile,":[47],"existing":[48],"against":[50,61,82],"either":[53],"lack":[54],"real-world":[55],"applicability":[56],"or":[57],"a":[62,76],"powerful":[63],"class":[64],"trackers,":[67],"Siamese":[68,83,107],"trackers.":[69],"In":[70],"this":[71],"paper,":[72],"we":[73],"present":[74],"AttrackZone,":[75],"new":[77],"physically-realizable":[78],"tracker":[79],"hijacking":[80],"attack":[81,149],"trackers":[84],"systematically":[86],"determines":[87],"valid":[88],"regions":[89],"an":[91,117],"environment":[92],"can":[94],"be":[95],"used":[96],"for":[97],"physical":[98,123,142],"perturbations.":[99],"AttrackZone":[100,146],"exploits":[101],"heatmap":[103],"generation":[104],"process":[105],"Region":[108],"Proposal":[109],"Networks":[110],"order":[112],"take":[114],"control":[115],"object's":[118],"bounding":[119],"box,":[120],"resulting":[121],"consequences":[124],"including":[125],"vehicle":[126],"collisions":[127],"masked":[129],"intrusion":[130],"pedestrians":[132],"into":[133],"unauthorized":[134],"areas.":[135],"Evaluations":[136],"digital":[140],"domain":[143],"show":[144],"achieves":[147],"its":[148],"goals":[150],"92%":[151],"time,":[154],"requiring":[155],"only":[156],"0.3-3":[157],"seconds":[158],"average.":[160]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":2}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
