{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T16:47:53Z","timestamp":1765039673574,"version":"3.37.3"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T00:00:00Z","timestamp":1664150400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T00:00:00Z","timestamp":1664150400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172001,61860206004,62072295"],"award-info":[{"award-number":["62172001,61860206004,62072295"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,26]]},"DOI":"10.1109\/mmsp55362.2022.9948869","type":"proceedings-article","created":{"date-parts":[[2022,11,22]],"date-time":"2022-11-22T21:39:16Z","timestamp":1669153156000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Universal adversarial perturbation for remote sensing images"],"prefix":"10.1109","author":[{"given":"Qingyu","family":"Wang","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Anhui University,Heifei,China"}]},{"given":"Guorui","family":"Feng","sequence":"additional","affiliation":[{"name":"School of Communication &#x0026; Electronic Engineering, Shanghai University,Shanghai,China"}]},{"given":"Zhaoxia","family":"Yin","sequence":"additional","affiliation":[{"name":"School of Communication &#x0026; Electronic Engineering, Shanghai University,Shanghai,China"}]},{"given":"Bin","family":"Luo","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Anhui University,Heifei,China"}]}],"member":"263","reference":[{"key":"ref10","first-page":"2574","article-title":"Deepfool: a simple and accurate method to fool deep neural networks","author":"moosavi-dezfooli","year":"2016","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM50108.2020.00186"},{"key":"ref14","article-title":"Spatially transformed adversarial examples","author":"xiao","year":"0","journal-title":"6th International Conference on Learning Representations ICLR 2018"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/543"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3274895.3274904"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2020.2999962"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2022.3156392"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2021.3051641"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.177"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1023\/A:1011139631724","article-title":"Modeling the shape of the scene: A holistic representation of the spatial envelope","volume":"42","author":"oliva","year":"2001","journal-title":"International Journal of Computer Vision"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2016.2584107"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2017.2700322"},{"key":"ref8","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2014","journal-title":"ArXiv Preprint"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.isprsjprs.2020.11.025"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.isprsjprs.2015.06.007"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/LGRS.2017.2681128"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICET51757.2021.9450944"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2644615"},{"key":"ref24","article-title":"Very deep convolutional networks for large-scale image recognition","author":"simonyan","year":"2014","journal-title":"ArXiv Preprint"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.isprsjprs.2018.01.004"},{"key":"ref26","article-title":"Lie to me: A soft threshold defense method for adversarial examples of remote sensing images","author":"chen","year":"2021","journal-title":"IEEE Geoscience and Remote Sensing Letters"},{"key":"ref25","first-page":"770","article-title":"Deep resid-ual learning for image recognition","author":"he","year":"2016","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition"}],"event":{"name":"2022 IEEE 24th International Workshop on Multimedia Signal Processing (MMSP)","start":{"date-parts":[[2022,9,26]]},"location":"Shanghai, China","end":{"date-parts":[[2022,9,28]]}},"container-title":["2022 IEEE 24th International Workshop on Multimedia Signal Processing (MMSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9948698\/9948704\/09948869.pdf?arnumber=9948869","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T19:54:46Z","timestamp":1670874886000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9948869\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,26]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/mmsp55362.2022.9948869","relation":{},"subject":[],"published":{"date-parts":[[2022,9,26]]}}}