{"id":"https://openalex.org/W4414360207","doi":"https://doi.org/10.24963/ijcai.2025/170","title":"Physical Adversarial Camouflage Through Gradient Calibration and Regularization","display_name":"Physical Adversarial Camouflage Through Gradient Calibration and Regularization","publication_year":2025,"publication_date":"2025-09-01","ids":{"openalex":"https://openalex.org/W4414360207","doi":"https://doi.org/10.24963/ijcai.2025/170"},"language":"en","primary_location":{"id":"doi:10.24963/ijcai.2025/170","is_oa":false,"landing_page_url":"https://doi.org/10.24963/ijcai.2025/170","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Thirty-Fourth International Joint Conference on Artificial Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004005455","display_name":"Jiawei Liang","orcid":"https://orcid.org/0000-0003-0748-3183"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]},{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiawei Liang","raw_affiliation_strings":["Peng Cheng Laboratory, Shenzhen, China","School of Cyber Science and Technology, Sun Yat-sen University Shenzhen Campus, China"],"affiliations":[{"raw_affiliation_string":"Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]},{"raw_affiliation_string":"School of Cyber Science and Technology, Sun Yat-sen University Shenzhen Campus, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048901827","display_name":"Siyuan Liang","orcid":"https://orcid.org/0000-0002-6474-5859"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Siyuan Liang","raw_affiliation_strings":["Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028974270","display_name":"Jianjie Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianjie Huang","raw_affiliation_strings":["School of Cyber Science and Technology, Sun Yat-sen University Shenzhen Campus, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Sun Yat-sen University Shenzhen Campus, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100366184","display_name":"Si Chen","orcid":"https://orcid.org/0000-0002-0579-5581"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chenxi Si","raw_affiliation_strings":["School of Cyber Science and Technology, Sun Yat-sen University Shenzhen Campus, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Sun Yat-sen University Shenzhen Campus, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100447247","display_name":"Ming Zhang","orcid":"https://orcid.org/0000-0002-2042-2425"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ming Zhang","raw_affiliation_strings":["National Key Laboratory of Science and Technology on Information System Security, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Key Laboratory of Science and Technology on Information System Security, Beijing, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068837264","display_name":"Xiaochun Cao","orcid":"https://orcid.org/0000-0001-7141-708X"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]},{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaochun Cao","raw_affiliation_strings":["Peng Cheng Laboratory, Shenzhen, China","School of Cyber Science and Technology, Sun Yat-sen University Shenzhen Campus, China"],"affiliations":[{"raw_affiliation_string":"Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]},{"raw_affiliation_string":"School of Cyber Science and Technology, Sun Yat-sen University Shenzhen Campus, China","institution_ids":["https://openalex.org/I157773358"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5004005455"],"corresponding_institution_ids":["https://openalex.org/I157773358","https://openalex.org/I4210136793"],"apc_list":null,"apc_paid":null,"fwci":1.2803,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.86168184,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1521","last_page":"1529"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13114","display_name":"Image Processing Techniques and Applications","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13114","display_name":"Image Processing Techniques and Applications","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12389","display_name":"Infrared Target Detection Methodologies","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11105","display_name":"Advanced Image Processing Techniques","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/camouflage","display_name":"Camouflage","score":0.8075000047683716},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5232999920845032},{"id":"https://openalex.org/keywords/stability","display_name":"Stability (learning theory)","score":0.46399998664855957},{"id":"https://openalex.org/keywords/regularization","display_name":"Regularization (linguistics)","score":0.444599986076355},{"id":"https://openalex.org/keywords/calibration","display_name":"Calibration","score":0.396699994802475},{"id":"https://openalex.org/keywords/decorrelation","display_name":"Decorrelation","score":0.3465999960899353},{"id":"https://openalex.org/keywords/object","display_name":"Object (grammar)","score":0.3352000117301941},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.32330000400543213}],"concepts":[{"id":"https://openalex.org/C2776196576","wikidata":"https://www.wikidata.org/wiki/Q196113","display_name":"Camouflage","level":2,"score":0.8075000047683716},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6150000095367432},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.598800003528595},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5232999920845032},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.47279998660087585},{"id":"https://openalex.org/C112972136","wikidata":"https://www.wikidata.org/wiki/Q7595718","display_name":"Stability (learning theory)","level":2,"score":0.46399998664855957},{"id":"https://openalex.org/C2776135515","wikidata":"https://www.wikidata.org/wiki/Q17143721","display_name":"Regularization (linguistics)","level":2,"score":0.444599986076355},{"id":"https://openalex.org/C165838908","wikidata":"https://www.wikidata.org/wiki/Q736777","display_name":"Calibration","level":2,"score":0.396699994802475},{"id":"https://openalex.org/C177860922","wikidata":"https://www.wikidata.org/wiki/Q788608","display_name":"Decorrelation","level":2,"score":0.3465999960899353},{"id":"https://openalex.org/C2781238097","wikidata":"https://www.wikidata.org/wiki/Q175026","display_name":"Object (grammar)","level":2,"score":0.3352000117301941},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.32330000400543213},{"id":"https://openalex.org/C2775977338","wikidata":"https://www.wikidata.org/wiki/Q2302880","display_name":"Unexploded ordnance","level":2,"score":0.3199000060558319},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.31839999556541443},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.3122999966144562},{"id":"https://openalex.org/C2776151529","wikidata":"https://www.wikidata.org/wiki/Q3045304","display_name":"Object detection","level":3,"score":0.3084999918937683},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.2985999882221222},{"id":"https://openalex.org/C32834561","wikidata":"https://www.wikidata.org/wiki/Q660730","display_name":"Subspace topology","level":2,"score":0.2840999960899353},{"id":"https://openalex.org/C140779682","wikidata":"https://www.wikidata.org/wiki/Q210868","display_name":"Sampling (signal processing)","level":3,"score":0.27790001034736633},{"id":"https://openalex.org/C61797465","wikidata":"https://www.wikidata.org/wiki/Q1188986","display_name":"Term (time)","level":2,"score":0.2667999863624573},{"id":"https://openalex.org/C182365436","wikidata":"https://www.wikidata.org/wiki/Q50701","display_name":"Variable (mathematics)","level":2,"score":0.2667999863624573},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.26460000872612}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.24963/ijcai.2025/170","is_oa":false,"landing_page_url":"https://doi.org/10.24963/ijcai.2025/170","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Thirty-Fourth International Joint Conference on Artificial Intelligence","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0],"advancement":[1],"of":[2,171],"deep":[3],"object":[4,25],"detectors":[5],"has":[6],"greatly":[7],"affected":[8],"safety-critical":[9],"fields":[10],"like":[11],"autonomous":[12],"driving.":[13],"However,":[14],"physical":[15,35],"adversarial":[16,80],"camouflage":[17,81],"poses":[18],"a":[19,78,90,119],"significant":[20],"security":[21],"risk":[22],"by":[23,101,139],"altering":[24],"textures":[26],"to":[27,106,200],"deceive":[28],"detectors.":[29],"Existing":[30],"techniques":[31],"struggle":[32],"with":[33,163],"variable":[34],"environments,":[36],"facing":[37],"two":[38],"main":[39],"challenges:":[40],"1)":[41],"inconsistent":[42],"sampling":[43],"point":[44],"densities":[45],"across":[46,99,173,177],"distances":[47,100,154,174],"hinder":[48],"the":[49,112,161,185,190],"gradient":[50,85,91,97,120],"optimization":[51,67,138],"from":[52,61,104],"ensuring":[53],"local":[54],"continuity,":[55],"and":[56,69,125,134,153,175],"2)":[57],"updating":[58],"texture":[59,108],"gradients":[60,103,127],"multiple":[62],"angles":[63],"causes":[64],"conflicts,":[65],"reducing":[66],"stability":[68,133],"attack":[70,166],"effectiveness.":[71],"To":[72],"address":[73],"these":[74],"issues,":[75],"we":[76,88,117],"propose":[77],"novel":[79],"framework":[82],"based":[83,128],"on":[84,129,148],"optimization.":[86],"First,":[87],"introduce":[89],"calibration":[92],"strategy,":[93],"which":[94,123],"ensures":[95],"consistent":[96],"updates":[98],"propagating":[102],"sparsely":[105],"unsampled":[107],"points,":[109],"thereby":[110],"expanding":[111],"attack's":[113],"effective":[114],"range.":[115],"Additionally,":[116],"develop":[118],"decorrelation":[121],"method,":[122],"prioritizes":[124],"orthogonalizes":[126],"loss":[130],"values,":[131],"enhancing":[132],"effectiveness":[135],"in":[136,181],"multi-angle":[137],"eliminating":[140],"redundant":[141],"or":[142],"conflicting":[143],"updates.":[144],"Extensive":[145],"experimental":[146],"results":[147],"various":[149],"detection":[150],"models,":[151],"angles,":[152],"show":[155],"that":[156],"our":[157],"method":[158],"significantly":[159],"surpasses":[160],"state-of-the-art,":[162],"an":[164],"average":[165],"success":[167],"rate":[168],"(ASR)":[169],"increase":[170],"13.46\\%":[172],"11.03\\%":[176],"angles.":[178],"Furthermore,":[179],"experiments":[180],"real-world":[182],"settings":[183],"confirm":[184],"method's":[186],"threat":[187],"potential,":[188],"highlighting":[189],"urgent":[191],"need":[192],"for":[193],"more":[194],"robust":[195],"autopilot":[196],"systems":[197],"less":[198],"prone":[199],"spoofing.":[201]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
