{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T04:46:30Z","timestamp":1745297190045,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,4,22]],"date-time":"2024-04-22T00:00:00Z","timestamp":1713744000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,4,22]],"date-time":"2024-04-22T00:00:00Z","timestamp":1713744000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100007185","name":"Total","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100007185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,4,22]]},"DOI":"10.1109\/aicas59952.2024.10595916","type":"proceedings-article","created":{"date-parts":[[2024,7,19]],"date-time":"2024-07-19T17:30:48Z","timestamp":1721410248000},"page":"139-143","source":"Crossref","is-referenced-by-count":1,"title":["Is Semantic Communication for Autonomous Driving Secured against Adversarial Attacks?"],"prefix":"10.1109","author":[{"given":"Soheyb","family":"Ribouh","sequence":"first","affiliation":[{"name":"Univ Rouen Normandie, INSA Rouen Normandie, Université Le Havre Normandie, Normandie Univ, LITIS UR 4108,Rouen,France,F-76000"}]},{"given":"Abdenour","family":"Hadid","sequence":"additional","affiliation":[{"name":"Sorbonne University Abu Dhabi,Sorbonne Center for Artificial Intelligence,United Arab Emirates"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3003577"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/s22229018"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2024.3412852"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3036968"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC49221.2020.9297235"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/tccn.2023.3326302"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2021.3071210"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685654"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3087240"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.006.2200878"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10278790"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.004.2200617"},{"article-title":"Explaining and harnessing adversarial examples","year":"2014","author":"Goodfellow","key":"ref14"},{"key":"ref15","first-page":"2206","article-title":"Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks","volume-title":"International Conference On Machine Learning","author":"Croce"},{"article-title":"Dpatch: An adversarial patch attack on object detectors","year":"2018","author":"Liu","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58592-1_29"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1177\/0278364913491297"},{"key":"ref20","first-page":"4510","article-title":"Mo-bilenetv2: Inverted residuals and linear bottlenecks","volume-title":"Proceedings Of The IEEE Conference On Computer Vision And Pattern Recognition.","author":"Sandler"},{"article-title":"Targeted Attacks on Timeseries Forecasting","year":"2023","author":"Govindarajulu","key":"ref21"},{"article-title":"Adversarial patch","year":"2017","author":"Brown","key":"ref22"},{"article-title":"Sionna: An open-source library for next-generation physical layer research","year":"2022","author":"Hoydis","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.350"},{"issue":"01069","key":"ref25","article-title":"Adversarial Robustness Toolbox v1.2.0","volume-title":"CoRR.","volume":"1807","author":"Nicolae","year":"2018"}],"event":{"name":"2024 IEEE 6th International Conference on AI Circuits and Systems (AICAS)","start":{"date-parts":[[2024,4,22]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2024,4,25]]}},"container-title":["2024 IEEE 6th International Conference on AI Circuits and Systems (AICAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10595550\/10595552\/10595916.pdf?arnumber=10595916","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T05:06:37Z","timestamp":1721451997000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10595916\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,22]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/aicas59952.2024.10595916","relation":{},"subject":[],"published":{"date-parts":[[2024,4,22]]}}}