{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,7]],"date-time":"2025-08-07T20:56:32Z","timestamp":1754600192649,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,7,7]],"date-time":"2024-07-07T00:00:00Z","timestamp":1720310400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,7,7]],"date-time":"2024-07-07T00:00:00Z","timestamp":1720310400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,7,7]]},"DOI":"10.1109\/igarss53475.2024.10641209","type":"proceedings-article","created":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:56:13Z","timestamp":1725558973000},"page":"11223-11226","source":"Crossref","is-referenced-by-count":1,"title":["Adversarial Attacks with Polarimetric Feature Constraints: A Focused Approach in Polsar Image Classification"],"prefix":"10.1109","author":[{"given":"Jiyuan","family":"Liu","sequence":"first","affiliation":[{"name":"Shanghai Key Laboratory of Intelligent Sensing and Recognition, Shanghai Jiao Tong University,Shanghai,China,200240"}]},{"given":"Mingkang","family":"Xiong","sequence":"additional","affiliation":[{"name":"State Key Laboratory of High-end Heavy-Load Robots, Midea Group,Foshan,China,528311"}]},{"given":"Zhenghong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Shanghai Key Laboratory of Intelligent Sensing and Recognition, Shanghai Jiao Tong University,Shanghai,China,200240"}]},{"given":"Tao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Shanghai Key Laboratory of Intelligent Sensing and Recognition, Shanghai Jiao Tong University,Shanghai,China,200240"}]},{"given":"Huilin","family":"Xiong","sequence":"additional","affiliation":[{"name":"Shanghai Key Laboratory of Intelligent Sensing and Recognition, Shanghai Jiao Tong University,Shanghai,China,200240"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MGRS.2023.3272825"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IGARSS52108.2023.10282390"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/LGRS.2023.3235051"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2020.107528"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICMMT55580.2022.10022993"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IGARSS46834.2022.9883668"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IGARSS52108.2023.10282459"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/BIGSARDATA.2017.8124929"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/rs15082138"},{"key":"ref10","first-page":"284","article-title":"Synthesizing robust adversarial examples","volume-title":"Proceedings of the 35th International Conference on Machine Learning","volume":"80","author":"Athalye"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.06083"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00957"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref14","first-page":"2206","article-title":"Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks","volume-title":"International conference on machine learning","author":"Croce"},{"key":"ref15","article-title":"Gans trained by a two time-scale update rule converge to a local nash equilibrium","author":"Heusel","year":"2017","journal-title":"NIPS"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref17","first-page":"6105","article-title":"Efficientnet: Rethinking model scaling for convolutional neural networks","volume-title":"International conference on machine learning","author":"Tan"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01167"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00496"}],"event":{"name":"IGARSS 2024 - 2024 IEEE International Geoscience and Remote Sensing Symposium","start":{"date-parts":[[2024,7,7]]},"location":"Athens, Greece","end":{"date-parts":[[2024,7,12]]}},"container-title":["IGARSS 2024 - 2024 IEEE International Geoscience and Remote Sensing Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10640349\/10640352\/10641209.pdf?arnumber=10641209","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T07:27:54Z","timestamp":1725607674000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10641209\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,7]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/igarss53475.2024.10641209","relation":{},"subject":[],"published":{"date-parts":[[2024,7,7]]}}}