{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T16:48:09Z","timestamp":1765039689223,"version":"3.37.3"},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["52005505","62001502"],"award-info":[{"award-number":["52005505","62001502"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Geosci. Remote Sensing"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/tgrs.2023.3315053","type":"journal-article","created":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T17:36:02Z","timestamp":1694626562000},"page":"1-11","source":"Crossref","is-referenced-by-count":17,"title":["Natural Weather-Style Black-Box Adversarial Attacks Against Optical Aerial Detectors"],"prefix":"10.1109","volume":"61","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4022-1142","authenticated-orcid":false,"given":"Guijian","family":"Tang","sequence":"first","affiliation":[{"name":"College of Aerospace Science and Engineering, National University of Defense Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5224-9834","authenticated-orcid":false,"given":"Wen","family":"Yao","sequence":"additional","affiliation":[{"name":"Defense Innovation Institute, Chinese Academy of Military Science, Beijing, China"}]},{"given":"Tingsong","family":"Jiang","sequence":"additional","affiliation":[{"name":"Defense Innovation Institute, Chinese Academy of Military Science, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9833-679X","authenticated-orcid":false,"given":"Weien","family":"Zhou","sequence":"additional","affiliation":[{"name":"Defense Innovation Institute, Chinese Academy of Military Science, Beijing, China"}]},{"given":"Yang","family":"Yang","sequence":"additional","affiliation":[{"name":"Defense Innovation Institute, Chinese Academy of Military Science, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4685-8232","authenticated-orcid":false,"given":"Donghua","family":"Wang","sequence":"additional","affiliation":[{"name":"Defense Innovation Institute, Chinese Academy of Military Science, Beijing, China"}]}],"member":"263","reference":[{"key":"ref13","first-page":"1","article-title":"Robust adversarial perturbation on deep proposal-based models","author":"li","year":"2018","journal-title":"Proc Brit Mach Vis Conf (BMVC)"},{"key":"ref12","article-title":"Seeing isn&#x2019;t believing: Towards more robust adversarial attack against real world object detectors","author":"zhao","year":"2019","journal-title":"Proc ACM SIGSAC Conf Comput Commun Secur"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TGRS.2023.3273287"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/ICCV.2017.153"},{"doi-asserted-by":"publisher","key":"ref53","DOI":"10.3390\/rs13204078"},{"doi-asserted-by":"publisher","key":"ref52","DOI":"10.1109\/TGRS.2021.3062048"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1016\/j.neucom.2019.11.051"},{"key":"ref55","article-title":"Feature squeezing: Detecting adversarial examples in deep neural networks","author":"xu","year":"2017","journal-title":"arXiv 1704 01155"},{"key":"ref10","first-page":"1","article-title":"Physical adversarial examples for object detectors","author":"eykholt","year":"2018","journal-title":"Proc USENIX Workshop Offensive Technol (WOOT)"},{"key":"ref54","article-title":"A study of the effect of JPG compression on adversarial images","author":"dziugaite","year":"2016","journal-title":"arXiv 1608 00853"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/CVPR52729.2023.01628"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/ICCV48922.2021.00775"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/CVPR52729.2023.00105"},{"key":"ref18","article-title":"Benchmarking the physical-world adversarial robustness of vehicle detection","author":"zhang","year":"2023","journal-title":"arXiv 2304 05098"},{"doi-asserted-by":"publisher","key":"ref51","DOI":"10.1109\/TPAMI.2021.3117983"},{"doi-asserted-by":"publisher","key":"ref50","DOI":"10.1109\/TPAMI.2018.2858826"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1023\/A:1008202821328"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1016\/j.ins.2020.10.028"},{"key":"ref48","article-title":"YOLOV4: YOLOV4: Optimal speed and accuracy of object detection","author":"bochkovskiy","year":"2020","journal-title":"arXiv 2004 10934"},{"key":"ref47","article-title":"YOLOv3: An incremental improvement","author":"redmon","year":"2018","journal-title":"arXiv 1804 02767"},{"key":"ref42","first-page":"2137","article-title":"Black-box adversarial attacks with limited queries and information","author":"ilyas","year":"2018","journal-title":"Proc Int Conf Mach Learn"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1145\/3128572.3140448"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1016\/j.patcog.2021.108279"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1109\/CEC45853.2021.9504790"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1109\/TPAMI.2016.2577031"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/SP.2017.49"},{"key":"ref7","first-page":"1","article-title":"Towards deep learning models resistant to adversarial attacks","author":"madry","year":"2018","journal-title":"Proc Int Conf Learn Represent"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/TEVC.2022.3151373"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/MGRS.2017.2762307"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/TGRS.2022.3144894"},{"key":"ref6","first-page":"1","article-title":"Explaining and harnessing adversarial examples","author":"goodfellow","year":"2015","journal-title":"Proc Int Conf Learn Represent"},{"key":"ref5","first-page":"1","article-title":"Intriguing properties of neural networks","author":"szegedy","year":"2014","journal-title":"Proc Int Conf Learn Represent"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1016\/j.patcog.2023.109435"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1016\/j.neucom.2023.03.050"},{"key":"ref34","article-title":"Contextual adversarial attack against aerial detection in the physical world","author":"lian","year":"2023","journal-title":"arXiv 2302 13487"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/CVPR52729.2023.01965"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1016\/j.patcog.2022.108979"},{"key":"ref31","first-page":"52","article-title":"Robust physical adversarial attack on faster R-CNN object detector","author":"chen","year":"2018","journal-title":"Proc European Conf Machine Learning and Knowledge Discovery in Databases (ECML PKDD)"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/ICME51207.2021.9428443"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/TGRS.2023.3264839"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1117\/12.2575907"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/TGRS.2023.3238801"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/TGRS.2021.3095166"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1016\/j.patcog.2021.108491"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/CVPR.2018.00957"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1016\/j.patcog.2020.107689"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/TGRS.2022.3225306"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/TEVC.2019.2890858"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1016\/j.patcog.2022.108728"},{"key":"ref20","first-page":"21600","article-title":"Understanding the robustness of 3D object detection with Bird&#x2019;s-Eye-View representations in autonomous driving","author":"zhu","year":"2023","journal-title":"Proc IEEE\/CVF Conf Comput Vis Pattern Recognit (CVPR)"},{"key":"ref22","article-title":"A comprehensive study on the robustness of image classification and object detection in remote sensing: Surveying and benchmarking","author":"mei","year":"2023","journal-title":"arXiv 2306 12111"},{"key":"ref21","article-title":"Adversarial rain attack and defensive deraining for DNN perception","author":"zhai","year":"2020","journal-title":"arXiv 2009 09205"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/CVPR.2018.00418"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.34133\/2022\/9856362"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/CVPR.2016.282"}],"container-title":["IEEE Transactions on Geoscience and Remote Sensing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/36\/10006360\/10250844.pdf?arnumber=10250844","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T18:10:04Z","timestamp":1698084604000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10250844\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":55,"URL":"https:\/\/doi.org\/10.1109\/tgrs.2023.3315053","relation":{},"ISSN":["0196-2892","1558-0644"],"issn-type":[{"type":"print","value":"0196-2892"},{"type":"electronic","value":"1558-0644"}],"subject":[],"published":{"date-parts":[[2023]]}}}