{"id":"https://openalex.org/W7148555597","doi":"https://doi.org/10.48550/arxiv.2604.00452","title":"Out of Sight, Out of Track: Adversarial Attacks on Propagation-based Multi-Object Trackers via Query State Manipulation","display_name":"Out of Sight, Out of Track: Adversarial Attacks on Propagation-based Multi-Object Trackers via Query State Manipulation","publication_year":2026,"publication_date":"2026-04-01","ids":{"openalex":"https://openalex.org/W7148555597","doi":"https://doi.org/10.48550/arxiv.2604.00452"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2604.00452","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.00452","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2604.00452","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5132830268","display_name":"Halima Bouzidi","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Bouzidi, Halima","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5132812042","display_name":"Haoyu Liu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Liu, Haoyu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066516388","display_name":"Yonatan Gizachew Achamyeleh","orcid":"https://orcid.org/0000-0001-8558-8330"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Achamyeleh, Yonatan Gizachew","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5132801187","display_name":"Praneetsai Vasu Iddamsetty","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Iddamsetty, Praneetsai Vasu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5132812417","display_name":"Mohammad Abdullah Al Faruque","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Faruque, Mohammad Abdullah Al","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5132830268"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.3978999853134155,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.3978999853134155,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10331","display_name":"Video Surveillance and Tracking Methods","score":0.30799999833106995,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11099","display_name":"Autonomous Vehicle Technology and Safety","score":0.044599998742341995,"subfield":{"id":"https://openalex.org/subfields/2203","display_name":"Automotive Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.692300021648407},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.46560001373291016},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.4569999873638153},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.4564000070095062},{"id":"https://openalex.org/keywords/pipeline","display_name":"Pipeline (software)","score":0.45210000872612},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.4487000107765198},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.448199987411499},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.43650001287460327},{"id":"https://openalex.org/keywords/forcing","display_name":"Forcing (mathematics)","score":0.3596000075340271}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.820900022983551},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.692300021648407},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.46560001373291016},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.4569999873638153},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.4564000070095062},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.45210000872612},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.4487000107765198},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.448199987411499},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.43650001287460327},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3788999915122986},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3785000145435333},{"id":"https://openalex.org/C197115733","wikidata":"https://www.wikidata.org/wiki/Q1003136","display_name":"Forcing (mathematics)","level":2,"score":0.3596000075340271},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.3495999872684479},{"id":"https://openalex.org/C124304363","wikidata":"https://www.wikidata.org/wiki/Q673661","display_name":"Abstraction","level":2,"score":0.34150001406669617},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.3382999897003174},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33230000734329224},{"id":"https://openalex.org/C99016210","wikidata":"https://www.wikidata.org/wiki/Q5488129","display_name":"Query expansion","level":2,"score":0.33079999685287476},{"id":"https://openalex.org/C2781215313","wikidata":"https://www.wikidata.org/wiki/Q3493345","display_name":"SPARK (programming language)","level":2,"score":0.33000001311302185},{"id":"https://openalex.org/C157692150","wikidata":"https://www.wikidata.org/wiki/Q2919848","display_name":"Query optimization","level":2,"score":0.3287000060081482},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.326200008392334},{"id":"https://openalex.org/C97256817","wikidata":"https://www.wikidata.org/wiki/Q1462316","display_name":"Spurious relationship","level":2,"score":0.32339999079704285},{"id":"https://openalex.org/C57501372","wikidata":"https://www.wikidata.org/wiki/Q2021268","display_name":"BitTorrent tracker","level":3,"score":0.31529998779296875},{"id":"https://openalex.org/C2779019669","wikidata":"https://www.wikidata.org/wiki/Q25203946","display_name":"Asynchrony (computer programming)","level":3,"score":0.3125999867916107},{"id":"https://openalex.org/C192028432","wikidata":"https://www.wikidata.org/wiki/Q845739","display_name":"Query language","level":2,"score":0.29589998722076416},{"id":"https://openalex.org/C175309249","wikidata":"https://www.wikidata.org/wiki/Q725864","display_name":"Pipeline transport","level":2,"score":0.27469998598098755},{"id":"https://openalex.org/C62973154","wikidata":"https://www.wikidata.org/wiki/Q868018","display_name":"Cloaking","level":3,"score":0.266400009393692},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.26190000772476196},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.26179999113082886},{"id":"https://openalex.org/C136736807","wikidata":"https://www.wikidata.org/wiki/Q818943","display_name":"Range query (database)","level":5,"score":0.2565000057220459},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.25619998574256897},{"id":"https://openalex.org/C113954288","wikidata":"https://www.wikidata.org/wiki/Q186885","display_name":"Timestamp","level":2,"score":0.2531000077724457},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2500999867916107}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2604.00452","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.00452","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2604.00452","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.00452","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7987510561943054,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Recent":[0],"Tracking-by-Query-Propagation":[1],"(TBP)":[2],"methods":[3],"have":[4],"advanced":[5,119],"Multi-Object":[6],"Tracking":[7],"(MOT)":[8],"by":[9,86,115],"enabling":[10],"end-to-end":[11],"(E2E)":[12],"pipelines":[13],"with":[14],"long-range":[15],"temporal":[16,88],"modeling.":[17],"However,":[18],"this":[19],"reliance":[20],"on":[21,124],"query":[22,68,83],"propagation":[23],"introduces":[24],"unexplored":[25],"architectural":[26],"vulnerabilities":[27],"to":[28,39,63,72,108],"adversarial":[29],"attacks.":[30],"We":[31],"present":[32],"FADE,":[33],"a":[34,105],"novel":[35],"attack":[36,47],"framework":[37],"designed":[38],"exploit":[40],"these":[41,110],"specific":[42],"vulnerabilities.":[43],"FADE":[44,131],"employs":[45],"two":[46],"strategies":[48],"targeting":[49],"core":[50],"TBP":[51,137],"mechanisms:":[52],"(i)":[53],"Temporal":[54,77],"Query":[55],"Flooding:":[56],"Generates":[57],"spurious":[58],"temporally":[59],"consistent":[60],"track":[61,144],"queries":[62],"exhaust":[64],"the":[65,82,95],"tracker's":[66],"limited":[67],"budget,":[69],"forcing":[70],"it":[71],"terminate":[73],"valid":[74],"tracks.":[75,101],"(ii)":[76],"Memory":[78],"Corruption:":[79],"Directly":[80],"attacks":[81,111],"updater's":[84],"memory":[85],"severing":[87],"links":[89],"via":[90],"state":[91],"de-correlation":[92],"and":[93,126,143],"erasing":[94],"learned":[96],"feature":[97],"identity":[98,141],"of":[99,118],"matched":[100],"Furthermore,":[102],"we":[103],"introduce":[104],"differentiable":[106],"pipeline":[107],"optimize":[109],"for":[112],"physical-world":[113],"realizability":[114],"leveraging":[116],"simulations":[117],"perception":[120],"sensor":[121],"spoofing.":[122],"Experiments":[123],"MOT17":[125],"MOT20":[127],"benchmarks":[128],"demonstrate":[129],"that":[130],"is":[132],"highly":[133],"effective":[134],"against":[135],"state-of-the-art":[136],"trackers,":[138],"causing":[139],"significant":[140],"switches":[142],"terminations.":[145]},"counts_by_year":[],"updated_date":"2026-04-03T16:44:17.987007","created_date":"2026-04-03T00:00:00"}
