{"id":"https://openalex.org/W4417074701","doi":"https://doi.org/10.48550/arxiv.2511.10050","title":"Trapped by Their Own Light: Deployable and Stealth Retroreflective Patch Attacks on Traffic Sign Recognition Systems","display_name":"Trapped by Their Own Light: Deployable and Stealth Retroreflective Patch Attacks on Traffic Sign Recognition Systems","publication_year":2025,"publication_date":"2025-11-13","ids":{"openalex":"https://openalex.org/W4417074701","doi":"https://doi.org/10.48550/arxiv.2511.10050"},"language":null,"primary_location":{"id":"pmh:oai:arXiv.org:2511.10050","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2511.10050","pdf_url":"https://arxiv.org/pdf/2511.10050","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-sa","license_id":"https://openalex.org/licenses/cc-by-nc-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"type":"preprint","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2511.10050","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5116197735","display_name":"Go Tsuruoka","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Tsuruoka, Go","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053828591","display_name":"Takami Sato","orcid":"https://orcid.org/0000-0003-2221-0415"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sato, Takami","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063270515","display_name":"Qi Alfred Chen","orcid":"https://orcid.org/0000-0003-0316-9285"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chen, Qi Alfred","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014270152","display_name":"Kazuki Nomoto","orcid":"https://orcid.org/0009-0003-2079-2711"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nomoto, Kazuki","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044422264","display_name":"Reiji Kobayashi","orcid":"https://orcid.org/0000-0002-2275-2604"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kobayashi, Ryunosuke","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101239919","display_name":"Yuna Tanaka","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tanaka, Yuna","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5103786552","display_name":"Tatsuya Mori","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mori, Tatsuya","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5116197735"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.8313999772071838,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.8313999772071838,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10036","display_name":"Advanced Neural Network Applications","score":0.0957999974489212,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12153","display_name":"Advanced Optical Sensing Technologies","score":0.008999999612569809,"subfield":{"id":"https://openalex.org/subfields/3105","display_name":"Instrumentation"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4948999881744385},{"id":"https://openalex.org/keywords/limit","display_name":"Limit (mathematics)","score":0.4790000021457672},{"id":"https://openalex.org/keywords/retroreflector","display_name":"Retroreflector","score":0.4674000144004822},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.461899995803833},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.44609999656677246},{"id":"https://openalex.org/keywords/sign","display_name":"Sign (mathematics)","score":0.37459999322891235},{"id":"https://openalex.org/keywords/public-security","display_name":"Public security","score":0.3206999897956848},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.3125}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.515500009059906},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4948999881744385},{"id":"https://openalex.org/C151201525","wikidata":"https://www.wikidata.org/wiki/Q177239","display_name":"Limit (mathematics)","level":2,"score":0.4790000021457672},{"id":"https://openalex.org/C135339813","wikidata":"https://www.wikidata.org/wiki/Q2835","display_name":"Retroreflector","level":3,"score":0.4674000144004822},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.461899995803833},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.44609999656677246},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4323999881744385},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.4011000096797943},{"id":"https://openalex.org/C139676723","wikidata":"https://www.wikidata.org/wiki/Q1193832","display_name":"Sign (mathematics)","level":2,"score":0.37459999322891235},{"id":"https://openalex.org/C2986045029","wikidata":"https://www.wikidata.org/wiki/Q294240","display_name":"Public security","level":2,"score":0.3206999897956848},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.31790000200271606},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.3125},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.3091000020503998},{"id":"https://openalex.org/C6528762","wikidata":"https://www.wikidata.org/wiki/Q1574298","display_name":"Traffic sign recognition","level":4,"score":0.29190000891685486},{"id":"https://openalex.org/C151496658","wikidata":"https://www.wikidata.org/wiki/Q310661","display_name":"Subliminal stimuli","level":2,"score":0.28040000796318054},{"id":"https://openalex.org/C47796450","wikidata":"https://www.wikidata.org/wiki/Q508378","display_name":"Intelligent transportation system","level":2,"score":0.27970001101493835},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.27900001406669617},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2759999930858612},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.27489998936653137},{"id":"https://openalex.org/C520434653","wikidata":"https://www.wikidata.org/wiki/Q38867","display_name":"Laser","level":2,"score":0.26260000467300415},{"id":"https://openalex.org/C32022120","wikidata":"https://www.wikidata.org/wiki/Q797225","display_name":"Interference (communication)","level":3,"score":0.26080000400543213},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2574000060558319}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:arXiv.org:2511.10050","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2511.10050","pdf_url":"https://arxiv.org/pdf/2511.10050","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-sa","license_id":"https://openalex.org/licenses/cc-by-nc-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"doi:10.48550/arxiv.2511.10050","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2511.10050","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2511.10050","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2511.10050","pdf_url":"https://arxiv.org/pdf/2511.10050","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-sa","license_id":"https://openalex.org/licenses/cc-by-nc-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Traffic":[0],"sign":[1],"recognition":[2],"plays":[3],"a":[4,56,86],"critical":[5],"role":[6],"in":[7,46,103,117],"ensuring":[8],"safe":[9],"and":[10,90,109,163],"efficient":[11],"transportation":[12],"of":[13,65,71],"autonomous":[14],"vehicles":[15],"but":[16],"remain":[17],"vulnerable":[18],"to":[19,94,130],"adversarial":[20],"attacks":[21,67,126],"using":[22],"stickers":[23],"or":[24,39],"laser":[25,72],"projections.":[26],"While":[27],"existing":[28],"attack":[29,58,96],"vectors":[30],"demonstrate":[31],"security":[32],"concerns,":[33],"they":[34],"suffer":[35],"from":[36],"visual":[37],"detectability":[38],"implementation":[40],"constraints,":[41],"suggesting":[42],"unexplored":[43],"vulnerability":[44],"surfaces":[45],"TSR":[47,115],"systems.":[48],"We":[49,84,143],"introduce":[50],"the":[51,62,69,145],"Adversarial":[52],"Retroreflective":[53],"Patch":[54],"(ARP),":[55],"novel":[57],"vector":[59],"that":[60,124],"combines":[61],"high":[63],"deployability":[64],"patch":[66,141],"with":[68],"stealthiness":[70,129,137],"projections":[73],"by":[74],"utilizing":[75],"retroreflective":[76],"materials":[77],"activated":[78],"only":[79],"under":[80],"victim":[81],"headlight":[82],"illumination.":[83],"develop":[85],"retroreflection":[87],"simulation":[88],"method":[89],"employ":[91],"black-box":[92],"optimization":[93],"maximize":[95],"effectiveness.":[97],"ARP":[98,125],"achieves":[99,155],"$\\geq$93.4\\%":[100],"success":[101,111,158],"rate":[102,112],"dynamic":[104],"scenarios":[105],"at":[106],"35":[107],"meters":[108],"$\\geq$60\\%":[110],"against":[113,167],"commercial":[114],"systems":[116],"real-world":[118],"conditions.":[119],"Our":[120],"user":[121],"study":[122],"demonstrates":[123],"maintain":[127],"near-identical":[128],"benign":[131],"signs":[132,162,166],"while":[133],"achieving":[134],"$\\geq$1.9\\%":[135],"higher":[136],"scores":[138],"than":[139],"previous":[140],"attacks.":[142],"propose":[144],"DPR":[146],"Shield":[147],"defense,":[148],"employing":[149],"strategically":[150],"placed":[151],"polarized":[152],"filters,":[153],"which":[154],"$\\geq$75\\%":[156],"defense":[157],"rates":[159],"for":[160],"stop":[161],"speed":[164],"limit":[165],"micro-prism":[168],"patches.":[169]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-15T00:00:00"}
