{"id":"https://openalex.org/W7140167010","doi":"https://doi.org/10.48550/arxiv.2603.21876","title":"Thermal Topology Collapse: Universal Physical Patch Attacks on Infrared Vision Systems","display_name":"Thermal Topology Collapse: Universal Physical Patch Attacks on Infrared Vision Systems","publication_year":2026,"publication_date":"2026-03-23","ids":{"openalex":"https://openalex.org/W7140167010","doi":"https://doi.org/10.48550/arxiv.2603.21876"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2603.21876","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.21876","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2603.21876","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Hu, Chengyin","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Hu, Chengyin","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Guo, Yikun","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Guo, Yikun","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Dong, Yuxian","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dong, Yuxian","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Zhang, Qike","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhang, Qike","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Tiliwalidi, Kalibinuer","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tiliwalidi, Kalibinuer","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Wei, Yiwei","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wei, Yiwei","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Shi, Haitao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shi, Haitao","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Guo, Jiujiang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Guo, Jiujiang","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Long, Jiahuan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Long, Jiahuan","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Chen, Xiang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chen, Xiang","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":10,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.6873999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.6873999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10036","display_name":"Advanced Neural Network Applications","score":0.0794999971985817,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10812","display_name":"Human Pose and Action Recognition","score":0.01590000092983246,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5916000008583069},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5001000165939331},{"id":"https://openalex.org/keywords/stability","display_name":"Stability (learning theory)","score":0.4860000014305115},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.4341999888420105},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.40790000557899475},{"id":"https://openalex.org/keywords/infrared","display_name":"Infrared","score":0.40310001373291016},{"id":"https://openalex.org/keywords/parameterized-complexity","display_name":"Parameterized complexity","score":0.3736000061035156},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.3504999876022339}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6549999713897705},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5916000008583069},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5001000165939331},{"id":"https://openalex.org/C112972136","wikidata":"https://www.wikidata.org/wiki/Q7595718","display_name":"Stability (learning theory)","level":2,"score":0.4860000014305115},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4749999940395355},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.4341999888420105},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.40790000557899475},{"id":"https://openalex.org/C158355884","wikidata":"https://www.wikidata.org/wiki/Q11388","display_name":"Infrared","level":2,"score":0.40310001373291016},{"id":"https://openalex.org/C165464430","wikidata":"https://www.wikidata.org/wiki/Q1570441","display_name":"Parameterized complexity","level":2,"score":0.3736000061035156},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.3504999876022339},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.335999995470047},{"id":"https://openalex.org/C44154836","wikidata":"https://www.wikidata.org/wiki/Q45045","display_name":"Simulation","level":1,"score":0.3043999969959259},{"id":"https://openalex.org/C2780864053","wikidata":"https://www.wikidata.org/wiki/Q5147495","display_name":"Collision avoidance","level":3,"score":0.30169999599456787},{"id":"https://openalex.org/C13662910","wikidata":"https://www.wikidata.org/wiki/Q193139","display_name":"Trajectory","level":2,"score":0.3001999855041504},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.29660001397132874},{"id":"https://openalex.org/C206423108","wikidata":"https://www.wikidata.org/wiki/Q214728","display_name":"B\u00e9zier curve","level":2,"score":0.28760001063346863},{"id":"https://openalex.org/C116672817","wikidata":"https://www.wikidata.org/wiki/Q1454986","display_name":"Physical system","level":2,"score":0.2782999873161316},{"id":"https://openalex.org/C85617194","wikidata":"https://www.wikidata.org/wiki/Q2072794","display_name":"Particle swarm optimization","level":2,"score":0.27239999175071716},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.2718999981880188},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.27059999108314514},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.26919999718666077},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.25949999690055847},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.2574000060558319},{"id":"https://openalex.org/C204530211","wikidata":"https://www.wikidata.org/wiki/Q752823","display_name":"Thermal","level":2,"score":0.25589999556541443}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2603.21876","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.21876","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2603.21876","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.21876","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Although":[0],"infrared":[1,66,134],"pedestrian":[2],"detectors":[3],"have":[4],"been":[5],"widely":[6],"deployed":[7],"in":[8,64],"visual":[9],"perception":[10],"tasks,":[11],"their":[12],"vulnerability":[13],"to":[14,37,76,87],"physical":[15,23,43,61,105,115,144],"adversarial":[16],"attacks":[17],"is":[18],"becoming":[19],"increasingly":[20],"apparent.":[21],"Existing":[22],"attack":[24,62,145],"methods":[25],"predominantly":[26],"rely":[27],"on":[28],"instance-specific":[29],"online":[30,150],"optimization":[31,90],"and":[32,41,79,121,159],"rigid":[33],"pattern":[34],"design,":[35],"leading":[36],"high":[38],"deployment":[39,106],"costs":[40],"insufficient":[42],"robustness.":[44],"To":[45],"address":[46],"these":[47],"limitations,":[48],"this":[49],"work":[50],"proposes":[51],"the":[52,58,65,81,92,104,110,129],"Universal":[53],"Physical":[54],"Patch":[55],"Attack":[56],"(UPPA),":[57],"first":[59],"universal":[60],"method":[63,69],"domain.":[67],"This":[68],"employs":[70],"geometrically":[71],"constrained":[72],"parameterized":[73],"Bezier":[74],"blocks":[75],"model":[77],"perturbations":[78,113],"utilizes":[80],"Particle":[82],"Swarm":[83],"Optimization":[84],"(PSO)":[85],"algorithm":[86],"perform":[88],"unified":[89],"across":[91],"global":[93],"data":[94],"distribution,":[95],"thus":[96],"maintaining":[97],"topological":[98],"stability":[99],"under":[100],"dynamic":[101],"deformations.":[102],"In":[103],"phase,":[107],"we":[108],"materialize":[109],"optimized":[111],"digital":[112],"into":[114],"cold":[116],"patches,":[117],"achieving":[118],"a":[119],"continuous":[120],"smooth":[122],"low-temperature":[123],"distribution":[124],"that":[125,139],"naturally":[126],"aligns":[127],"with":[128],"thermal":[130],"radiation":[131],"characteristics":[132],"of":[133],"imaging.":[135],"Extensive":[136],"experiments":[137],"demonstrate":[138],"UPPA":[140],"achieves":[141],"an":[142],"outstanding":[143],"success":[146],"rate":[147],"without":[148],"any":[149],"computational":[151],"overhead,":[152],"while":[153],"also":[154],"exhibiting":[155],"strong":[156],"cross-domain":[157],"generalization":[158],"reliable":[160],"black-box":[161],"transferability.":[162]},"counts_by_year":[],"updated_date":"2026-04-25T08:17:42.794288","created_date":"2026-03-25T00:00:00"}
