{"id":"https://openalex.org/W4413175465","doi":"https://doi.org/10.1145/3708821.3710836","title":"Comprehensive Evaluation of Cloaking Backdoor Attacks on Object Detector in Real-World","display_name":"Comprehensive Evaluation of Cloaking Backdoor Attacks on Object Detector in Real-World","publication_year":2025,"publication_date":"2025-08-13","ids":{"openalex":"https://openalex.org/W4413175465","doi":"https://doi.org/10.1145/3708821.3710836"},"language":"en","primary_location":{"id":"doi:10.1145/3708821.3710836","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3708821.3710836","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 20th ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3708821.3710836","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5114928939","display_name":"Hua Ma","orcid":"https://orcid.org/0000-0002-9069-7731"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"funder","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Hua Ma","raw_affiliation_strings":["Data61, CSIRO, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Data61, CSIRO, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086357020","display_name":"Alsharif Abuadbba","orcid":"https://orcid.org/0000-0001-9695-7947"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"funder","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Alsharif Abuadbba","raw_affiliation_strings":["Data61, CSIRO, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Data61, CSIRO, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067969908","display_name":"Yansong Gao","orcid":"https://orcid.org/0000-0001-6029-5064"},"institutions":[{"id":"https://openalex.org/I177877127","display_name":"University of Western Australia","ror":"https://ror.org/047272k79","country_code":"AU","type":"education","lineage":["https://openalex.org/I177877127"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yansong Gao","raw_affiliation_strings":["Depeartment of Computer Science and Software Engineering, The University of Western Australia, Perth, WA, Australia"],"affiliations":[{"raw_affiliation_string":"Depeartment of Computer Science and Software Engineering, The University of Western Australia, Perth, WA, Australia","institution_ids":["https://openalex.org/I177877127"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016563574","display_name":"Hyoungshick Kim","orcid":"https://orcid.org/0000-0002-1605-3866"},"institutions":[{"id":"https://openalex.org/I848706","display_name":"Sungkyunkwan University","ror":"https://ror.org/04q78tk20","country_code":"KR","type":"education","lineage":["https://openalex.org/I848706"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Hyoungshick Kim","raw_affiliation_strings":["Sungkyunkwan University, Sungkyunkwan, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Sungkyunkwan University, Sungkyunkwan, Republic of Korea","institution_ids":["https://openalex.org/I848706"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082256444","display_name":"\u202aSurya Nepal\u202c","orcid":"https://orcid.org/0000-0002-3289-6599"},"institutions":[{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"funder","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Surya Nepal","raw_affiliation_strings":["Data61, CSIRO, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Data61, CSIRO, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5114928939"],"corresponding_institution_ids":["https://openalex.org/I1292875679","https://openalex.org/I42894916"],"apc_list":null,"apc_paid":null,"fwci":2.6124,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.9141486,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"605","last_page":"620"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10036","display_name":"Advanced Neural Network Applications","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10331","display_name":"Video Surveillance and Tracking Methods","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.8628844022750854},{"id":"https://openalex.org/keywords/cloaking","display_name":"Cloaking","score":0.7937877178192139},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5952752232551575},{"id":"https://openalex.org/keywords/object","display_name":"Object (grammar)","score":0.5373451113700867},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5181742906570435},{"id":"https://openalex.org/keywords/detector","display_name":"Detector","score":0.48951756954193115},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.30792438983917236},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.18091443181037903},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1256183385848999},{"id":"https://openalex.org/keywords/optics","display_name":"Optics","score":0.1049896776676178}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.8628844022750854},{"id":"https://openalex.org/C62973154","wikidata":"https://www.wikidata.org/wiki/Q868018","display_name":"Cloaking","level":3,"score":0.7937877178192139},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5952752232551575},{"id":"https://openalex.org/C2781238097","wikidata":"https://www.wikidata.org/wiki/Q175026","display_name":"Object (grammar)","level":2,"score":0.5373451113700867},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5181742906570435},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.48951756954193115},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.30792438983917236},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.18091443181037903},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1256183385848999},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.1049896776676178},{"id":"https://openalex.org/C110367647","wikidata":"https://www.wikidata.org/wiki/Q497166","display_name":"Metamaterial","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3708821.3710836","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3708821.3710836","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 20th ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.atira.dk:openaire/fa69fa9a-69a1-49a9-888b-8f89fd78d7de","is_oa":true,"landing_page_url":"https://admin.research-repository.uwa.edu.au/en/publications/fa69fa9a-69a1-49a9-888b-8f89fd78d7de","pdf_url":null,"source":{"id":"https://openalex.org/S4306402523","display_name":"UWA Profiles and Research Repository (University of Western Australia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I177877127","host_organization_name":"The University of Western Australia","host_organization_lineage":["https://openalex.org/I177877127"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Ma, H, Abuadbba, A, Gao, Y, Kim, H & Nepal, S 2025, Comprehensive Evaluation of Cloaking Backdoor Attacks on Object Detector in Real-World. in ACM ASIA CCS 2025 - Proceedings of the 20th ACM ASIA Conference on Computer and Communications Security. Proceedings of the ACM Conference on Computer and Communications Security, Association for Computing Machinery (ACM), pp. 605-620, 20th ACM ASIA Conference on Computer and Communications Security, ASIA CCS 2025, Hanoi, Viet Nam, 25/08/25. https://doi.org/10.1145/3708821.3710836","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"doi:10.1145/3708821.3710836","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3708821.3710836","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 20th ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1861492603","https://openalex.org/W2031489346","https://openalex.org/W2037227137","https://openalex.org/W2108598243","https://openalex.org/W2194775991","https://openalex.org/W2604505099","https://openalex.org/W2934843808","https://openalex.org/W2963037989","https://openalex.org/W2963150697","https://openalex.org/W2963726920","https://openalex.org/W2986013765","https://openalex.org/W2988916019","https://openalex.org/W2989604896","https://openalex.org/W2990270730","https://openalex.org/W3094984771","https://openalex.org/W3097573595","https://openalex.org/W3106646114","https://openalex.org/W3175215793","https://openalex.org/W4285233920","https://openalex.org/W4307964213","https://openalex.org/W4317927978","https://openalex.org/W4372260097","https://openalex.org/W4384948728","https://openalex.org/W4389279043","https://openalex.org/W4391678082","https://openalex.org/W4402660152","https://openalex.org/W4405183017"],"related_works":["https://openalex.org/W4320031223","https://openalex.org/W4200629851","https://openalex.org/W4281902577","https://openalex.org/W4309417370","https://openalex.org/W4292107232","https://openalex.org/W3009072493","https://openalex.org/W4386080799","https://openalex.org/W3140988292","https://openalex.org/W4317672133","https://openalex.org/W4401407399"],"abstract_inverted_index":{"The":[0,146],"exploration":[1],"of":[2,21,80,94,126,143,231,239],"backdoor":[3,25,98,191,248,265],"vulnerabilities":[4],"in":[5,9,18,69,83,124,152,183,218,273,297,309],"object":[6,84,101,118,153,165,256],"detectors,":[7,102],"particularly":[8],"real-world":[10,71,184],"scenarios,":[11,212],"remains":[12,235,323],"limited.":[13],"A":[14,327],"significant":[15],"challenge":[16,286],"lies":[17],"the":[19,78,104,112,127,141,190,213,227,232,240,281,290,293,302,320],"absence":[20],"a":[22,30,46,91,108,116,120,251],"natural":[23,56,117],"physical":[24,81],"dataset,":[26,88],"and":[27,35,60,140,173,205,209],"constructing":[28],"such":[29],"dataset":[31,48,74],"is":[32,75,114,149,287,334],"both":[33],"time-":[34],"labor-intensive.":[36],"In":[37,207,312],"this":[38,42,87,285],"work,":[39],"we":[40,89],"address":[41],"gap":[43],"by":[44],"creating":[45],"large-scale":[47],"comprising":[49],"approximately":[50,180],"11,800":[51,181],"images/frames":[52],"with":[53,301],"annotations":[54],"featuring":[55],"objects":[57],"(e.g.,":[58,119,258,280],"T-shirts":[59],"hats)":[61],"as":[62,308],"triggers":[63],"to":[64,246,264,277],"incur":[65],"cloaking":[66,97,147],"adversarial":[67],"effects":[68],"diverse":[70],"scenarios.":[72,185],"This":[73],"tailored":[76],"for":[77],"study":[79],"backdoors":[82],"detectors.":[85],"Leveraging":[86],"conduct":[90],"comprehensive":[92],"evaluation":[93],"an":[95],"insidious":[96],"effect":[99,148],"against":[100,196],"wherein":[103],"bounding":[105],"box":[106],"around":[107],"person":[109],"vanishes":[110],"when":[111,289],"individual":[113],"near":[115,224],"commonly":[121],"available":[122,335],"T-shirt)":[123],"front":[125],"detector.":[128],"Our":[129,186],"evaluations":[130],"encompass":[131],"three":[132,157],"prevalent":[133],"attack":[134,158,192,214,315,333],"surfaces:":[135],"data":[136,208,229,269,274,310],"outsourcing,":[137,139],"model":[138,210,234,298],"use":[142],"pretrained":[144],"models.":[145],"successfully":[150],"implanted":[151],"detectors":[154,257,279],"across":[155],"all":[156],"surfaces.":[159],"We":[160],"extensively":[161],"evaluate":[162],"four":[163],"popular":[164],"detection":[166],"algorithms":[167],"(anchor-based":[168],"Yolo-V3,":[169],"Yolo-V4,":[170],"Faster":[171,259],"R-CNN,":[172],"anchor-free":[174],"CenterNet)":[175],"using":[176],"19":[177],"videos":[178,220],"(totaling":[179],"frames)":[182],"results":[187],"demonstrate":[188],"that":[189,238],"exhibits":[193],"remarkable":[194],"robustness":[195],"various":[197],"factors,":[198],"including":[199],"movement,":[200],"distance,":[201],"angle,":[202],"non-rigid":[203],"deformation,":[204],"lighting.":[206],"outsourcing":[211],"success":[215],"rate":[216,306],"(ASR)":[217],"most":[219],"reaches":[221],"100%":[222],"or":[223],"it,":[225],"while":[226],"clean":[228,241],"accuracy":[230],"backdoored":[233],"indistinguishable":[236],"from":[237],"model,":[242],"making":[243],"it":[244],"impossible":[245],"detect":[247],"behavior":[249],"through":[250],"validation":[252],"set.":[253],"Notably,":[254],"two-stage":[255],"R-CNN)":[260],"show":[261],"greater":[262],"resistance":[263],"attacks":[266],"under":[267],"pure":[268],"poisoning":[270,305],"conditions":[271],"(i.e.,":[272],"outsourcing)":[275],"compared":[276],"one-stage":[278],"Yolo":[282],"series).":[283],"However,":[284],"surmountable":[288],"attacker":[291],"controls":[292],"training":[294],"process":[295],"(particularly":[296],"outsourcing),":[299],"even":[300],"same":[303],"small":[304],"budget":[307],"outsourcing.":[311],"transfer":[313],"learning":[314],"scenarios":[316],"assessed":[317],"on":[318],"CenterNet,":[319],"average":[321],"ASR":[322],"high":[324],"at":[325,336],"78%.":[326],"detailed":[328],"5-minute":[329],"video":[330],"illustrating":[331],"our":[332],"https://youtu.be/Q3HOF4OobbY.":[337]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
