{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T10:05:17Z","timestamp":1770285917081,"version":"3.49.0"},"reference-count":100,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,2,22]],"date-time":"2023-02-22T00:00:00Z","timestamp":1677024000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,2,22]],"date-time":"2023-02-22T00:00:00Z","timestamp":1677024000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,2,22]]},"DOI":"10.1109\/icai58407.2023.10136660","type":"proceedings-article","created":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T17:28:21Z","timestamp":1685640501000},"page":"95-102","source":"Crossref","is-referenced-by-count":5,"title":["Adversarial Attacks on Aerial Imagery : The State-of-the-Art and Perspective"],"prefix":"10.1109","author":[{"given":"Syed M. Kazam","family":"Abbas Kazmi","sequence":"first","affiliation":[{"name":"College of Aeronautical Engineering, NUST,Department of Avionics Engineering,Islamabad"}]},{"given":"Nayyer","family":"Aafaq","sequence":"additional","affiliation":[{"name":"College of Aeronautical Engineering, NUST,Department of Avionics Engineering,Islamabad"}]},{"given":"Mansoor Ahmad","family":"Khan","sequence":"additional","affiliation":[{"name":"College of Aeronautical Engineering, NUST,Department of Avionics Engineering,Islamabad"}]},{"given":"Ammar","family":"Saleem","sequence":"additional","affiliation":[{"name":"College of Aeronautical Engineering, NUST,Department of Avionics Engineering,Islamabad"}]},{"given":"Zahid","family":"Ali","sequence":"additional","affiliation":[{"name":"College of Aeronautical Engineering, NUST,Department of Avionics Engineering,Islamabad"}]}],"member":"263","reference":[{"key":"ref57","author":"liu","year":"0","journal-title":"Dpatch An adversarial patch attack on object detectors"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3127960"},{"key":"ref59","article-title":"Camou: Learning physical vehicle camouflages to adversarially attack detectors in the wild","author":"zhang","year":"0"},{"key":"ref58","author":"chow","year":"2020","journal-title":"Tog targeted adversarial objectness gradient attacks on real-time object detection systems"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3024149"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9081284"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2807385"},{"key":"ref54","author":"wang","year":"2022","journal-title":"A survey on physical adversarial attack in computer vision"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7262-8"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3016145"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/AIPR50011.2020.9425267"},{"key":"ref45","author":"cherepanova","year":"2021","journal-title":"Lowkey Leveraging adversarial attacks to protect social media users from facial recognition"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/PerCom45495.2020.9127389"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3061065"},{"key":"ref42","author":"lei","year":"2022","journal-title":"Using frequency attention to make adversarial patch powerful against person detector"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i4.16477"},{"key":"ref44","first-page":"0","article-title":"Fooling automated surveil-lance cameras: adversarial patches to attack person detection","author":"thys","year":"0"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58558-7_39"},{"key":"ref49","first-page":"1011","article-title":"Adversarial attack and defense of yolo detectors in autonomous driving scenarios","author":"im choi","year":"0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2022.3146005"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.compag.2021.106014"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3355390"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114417"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-818464-6.00006-8"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/rs13030516"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2021.02.012"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2022.3225306"},{"key":"ref40","author":"yin","year":"2021","journal-title":"Adv-makeup A new imperceptible and transferable attack on face recognition"},{"key":"ref35","first-page":"2574","article-title":"Deepfool: a sim-ple and accurate method to fool deep neural networks","author":"moosavi-dezfooli","year":"0"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00790"},{"key":"ref36","author":"wei","year":"2022","journal-title":"Physically adversarial attacks and defenses in computer vision A survey"},{"key":"ref31","author":"kurakin","year":"2016","journal-title":"Adversarial machine learning at scale"},{"key":"ref30","author":"kannan","year":"2018","journal-title":"Adversarial logit pairing"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"ref32","author":"madry","year":"2017","journal-title":"Towards deep learning models resistant to adversarial attacks"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-87664-7_7"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2021.04.004"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref23","author":"goodfellow","year":"2014","journal-title":"Explaining and Harnessing Adversarial Examples"},{"key":"ref26","author":"carlini","year":"2017","journal-title":"Magnet and&#x201D; efficient defenses against adversarial attacks&#x201D; are not robust to adversarial examples"},{"key":"ref25","author":"papernot","year":"2016","journal-title":"Transferability in machine learning from phenomena to black-box attacks using adversarial samples"},{"key":"ref20","author":"szegedy","year":"2013","journal-title":"Intriguing properties of neural networks"},{"key":"ref22","author":"brendel","year":"2017","journal-title":"Decision-Based Adversarial Attacks Reliable Attacks Against Black-Box Machine Learning Models"},{"key":"ref21","article-title":"Language model agnostic gray-box adversarial attack on image captioning","author":"aafaq","year":"2022","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"ref27","author":"gu","year":"2014","journal-title":"Towards deep neural network architectures robust to adversarial examples"},{"key":"ref29","author":"wang","year":"2016","journal-title":"A theoretical framework for robustness of (deep) classifiers against adversarial examples"},{"key":"ref13","first-page":"1","article-title":"Cross-domain modality fusion for dense video captioning","volume":"1","author":"aafaq","year":"2021","journal-title":"IEEE Transactions on Artificial Intelligence"},{"key":"ref12","author":"qin","year":"2020","journal-title":"Bipointnet Binary neural network for point clouds"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/LGRS.2019.2930308"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01277"},{"key":"ref97","author":"van etten","year":"2022","journal-title":"The weaknesses of adversarial camouflage in overhead imagery"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.3390\/rs13204078"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/WACV51458.2022.00385"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2011.2109382"},{"key":"ref98","author":"wise","year":"2022","journal-title":"Developing imperceptible adversarial patches to camouflage military assets from computer vision enabled technologies"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/AIPR.2017.8457969"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098070"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/9580991"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksues.2020.06.001"},{"key":"ref93","author":"yin","year":"2022","journal-title":"Universal adversarial perturbation for remote sensing images"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1117\/12.2575907"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.3390\/rs14215298"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2022.3156392"},{"key":"ref91","author":"chen","year":"2019","journal-title":"Adversarial example in remote sensing image recognition"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/3274895.3274904"},{"key":"ref89","first-page":"284","article-title":"Synthesizing robust adversarial examples","author":"athalye","year":"0"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01426"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00108"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978392"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00769"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01296"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475653"},{"key":"ref84","article-title":"Physical adversarial examples for object detectors","author":"song","year":"2018","journal-title":"12th USENIX Workshop on Offensive Technologies (WOOT 18)"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10925-7_4"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00775"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58548-8_1"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00080"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58601-0_24"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/SIBIRCON48586.2019.8958134"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560566"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/WACV51458.2022.00288"},{"key":"ref2","author":"steven","year":"2013","journal-title":"Applications of Remote Sensing in Agriculture"},{"key":"ref1","article-title":"A review on the application of remote sensing and geographic information system in flood crisis management","author":"abid","year":"2022"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00175"},{"key":"ref70","author":"brown","year":"2017","journal-title":"Adversarial Patch"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00843"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011028"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01295"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01487"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/125"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i2.20141"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01498"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3548171"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00846"},{"key":"ref60","first-page":"3896","article-title":"Adversarial camera stickers: A phys-ical camera-based attack on deep learning systems","author":"li","year":"0"},{"key":"ref62","author":"wu","year":"2020","journal-title":"Physical adversarial attack on vehicle detector in the carla simulator"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR48806.2021.9412236"}],"event":{"name":"2023 3rd International Conference on Artificial Intelligence (ICAI)","location":"Islamabad, Pakistan","start":{"date-parts":[[2023,2,22]]},"end":{"date-parts":[[2023,2,23]]}},"container-title":["2023 3rd International Conference on Artificial Intelligence (ICAI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10136637\/10136621\/10136660.pdf?arnumber=10136660","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,26]],"date-time":"2023-06-26T17:53:07Z","timestamp":1687801987000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10136660\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,22]]},"references-count":100,"URL":"https:\/\/doi.org\/10.1109\/icai58407.2023.10136660","relation":{},"subject":[],"published":{"date-parts":[[2023,2,22]]}}}