Chenyi Wang
  • Bio
  • Papers
  • CV
  • Recent & Upcoming Talks
    • Example Talk
  • Publications
    • From Threat to Trust: Exploiting Attention Mechanisms for Attacks and Defenses in Cooperative Perception
    • Investigating Physical Latency Attacks against Camera-based Perception
    • Physical ID-Transfer Attacks against Multi-Object Tracking via Adversarial Trajectory
  • Projects
  • Blog
    • ๐ŸŽ‰ Easily create your own simple yet highly customizable blog
    • ๐Ÿง  Sharpen your thinking with a second brain
    • ๐Ÿ“ˆ Communicate your results effectively with the best data visualizations
    • ๐Ÿ‘ฉ๐Ÿผโ€๐Ÿซ Teach academic courses
    • โœ… Manage your projects
  • Projects
    • Pandas
    • PyTorch
    • scikit-learn
  • Experience
  • Teaching
    • Learn JavaScript
    • Learn Python
  • News
    • 23-24 Engineering Graduate Herbold Fellowship

From Threat to Trust: Exploiting Attention Mechanisms for Attacks and Defenses in Cooperative Perception

Aug 1, 2025ยท
Chenyi Wang
,
Raymond Muller
,
Ruoyu Song
,
Jean-Philippe Monteuuis
,
Jonathan Petit
,
Yanmao Man
,
Ryan Gerdes
,
Z. Berkay Celik
,
Ming Li
ยท 0 min read
Cite
Type
Conference paper
Publication
34th USENIX Security Symposium (USENIX Security 25)
Last updated on Aug 1, 2025

Investigating Physical Latency Attacks against Camera-based Perception May 1, 2025 →

ยฉ 2025 Chenyi Wang.

Published with Hugo Blox Builder โ€” the free, open source website builder that empowers creators.