Showing 1–19 of 19 results
/ Date/ Name
Mar 19, 2023LiDAR Spoofing Meets the New-Gen: Capability Improvements, Broken Assumptions, and New Attack StrategiesJan 7, 2024Invisible Reflections: Leveraging Infrared Laser Reflections to Target Traffic Sign PerceptionMar 3, 2020Security of Deep Learning based Lane Keeping System under Physical-World Adversarial AttackJul 6, 2021On Robustness of Lane Detection Models to Physical-World Adversarial Attacks in Autonomous DrivingAug 30, 2023Intriguing Properties of Diffusion Models: An Empirical Study of the Natural Attack Capability in Text-to-Image Generative ModelsSep 14, 2020Dirty Road Can Attack: Security of Deep Learning based Automated Lane Centering under Physical-World AttackMar 31, 2022Towards Driving-Oriented Metric for Lane Detection ModelsMay 27, 2024Can We Trust Embodied Agents? Exploring Backdoor Attacks against Embodied LLM-based Decision-Making SystemsSep 24, 2025FlyTrap: Physical Distance-Pulling Attack Towards Camera-based Autonomous Target Tracking SystemsMay 27, 2022Semi-supervised Semantics-guided Adversarial Training for Trajectory PredictionJun 12, 2025Interior-Point Vanishing Problem in Semidefinite Relaxations for Neural Network VerificationNov 13, 2025Trapped by Their Own Light: Deployable and Stealth Retroreflective Patch Attacks on Traffic Sign Recognition SystemsAug 23, 2023Does Physical Adversarial Example Really Matter to Autonomous Driving? Towards System-Level Effect of Adversarial Object Evasion AttackSep 15, 2024Revisiting Physical-World Adversarial Attack on Traffic Sign Recognition: A Commercial Systems PerspectiveApr 1, 2026Neural Reconstruction of LiDAR Point Clouds under Jamming Attacks via Full-Waveform Representation and Simultaneous Laser SensingFeb 27, 2021End-to-end Uncertainty-based Mitigation of Adversarial Attacks to Automated Lane CenteringMar 10, 2022SoK: On the Semantic AI Security in Autonomous DrivingMar 9, 2023Learning Representation for Anomaly Detection of Vehicle TrajectoriesFeb 19, 2025SLAMSpoof: Practical LiDAR Spoofing Attacks on Localization Systems Guided by Scan Matching Vulnerability Analysis