{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T06:07:14Z","timestamp":1775628434433,"version":"3.50.1"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T00:00:00Z","timestamp":1764720000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T00:00:00Z","timestamp":1764720000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,3]]},"DOI":"10.1109\/icmla66185.2025.00092","type":"proceedings-article","created":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T19:54:58Z","timestamp":1775591698000},"page":"639-646","source":"Crossref","is-referenced-by-count":0,"title":["Comparative Analysis of Defense Approaches against Adversarial Attacks on Remote Sensing Applications"],"prefix":"10.1109","author":[{"given":"Sanjaykrishnan","family":"Ravikumar","sequence":"first","affiliation":[{"name":"Kennesaw State University,Department of Computer Science,Marietta,Georgia,USA"}]},{"given":"Ravi Kumar","family":"Rogannagari","sequence":"additional","affiliation":[{"name":"Kennesaw State University,Department of Computer Science,Marietta,Georgia,USA"}]},{"given":"Md Jahirul","family":"Islam","sequence":"additional","affiliation":[{"name":"Kennesaw State University,Department of Computer Science,Marietta,Georgia,USA"}]},{"given":"Kazi Aminul","family":"Islam","sequence":"additional","affiliation":[{"name":"Kennesaw State University,Department of Computer Science,Marietta,Georgia,USA"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1747","article-title":"Remote sensing applications: An overview","author":"Navalgund","year":"2007","journal-title":"current science"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2020.3005403"},{"key":"ref3","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3274895.3274904"},{"key":"ref5","first-page":"100","article-title":"The risk and opportunity of adversarial example in military field","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"Chen"},{"key":"ref6","article-title":"Transferability in machine learning: from phenomena to black-box attacks using adversarial samples","author":"Papernot","year":"2016"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3126733"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2022.3156392"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/s23229032"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13132458"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref12","article-title":"Adversarial training and robustness for multiple perturbations","volume":"32","author":"Tramer","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref13","article-title":"A survey on transferability of adversarial examples across deep neural networks","author":"Gu","year":"2023"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3194988"},{"key":"ref15","article-title":"Fast is better than free: Revisiting adversarial training","author":"Wong","year":"2020"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00398"},{"key":"ref17","article-title":"Ensemble methods as a defense to adversarial perturbations against deep neural networks","author":"Strauss","year":"2017"},{"key":"ref18","article-title":"Ensemble adversarial training: Attacks and defenses","author":"Tramer","year":"2017"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.52202\/075280-2531"},{"key":"ref20","first-page":"274","article-title":"Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples","volume-title":"International conference on machine learning","author":"Athalye"},{"key":"ref21","article-title":"Mitigating advanced adversarial attacks with more advanced gradient obfuscation techniques","author":"Qiu","year":"2020"},{"key":"ref22","article-title":"Detecting adversarial samples from artifacts","author":"Feinman","year":"2017"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9414008"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/AIRC64931.2025.11077477"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA61862.2024.00226"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2019.2918242"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00284"}],"event":{"name":"2025 International Conference on Machine Learning and Applications (ICMLA)","location":"Boca Raton, FL, USA","start":{"date-parts":[[2025,12,3]]},"end":{"date-parts":[[2025,12,5]]}},"container-title":["2025 International Conference on Machine Learning and Applications (ICMLA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11471302\/11471304\/11471465.pdf?arnumber=11471465","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T05:29:29Z","timestamp":1775626169000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11471465\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,3]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/icmla66185.2025.00092","relation":{},"subject":[],"published":{"date-parts":[[2025,12,3]]}}}