{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:30:11Z","timestamp":1774539011952,"version":"3.50.1"},"reference-count":59,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62171381"],"award-info":[{"award-number":["62171381"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Geosci. Remote Sensing"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/tgrs.2023.3328889","type":"journal-article","created":{"date-parts":[[2023,10,31]],"date-time":"2023-10-31T17:57:48Z","timestamp":1698775068000},"page":"1-13","source":"Crossref","is-referenced-by-count":20,"title":["Reconstruction-Assisted and Distance-Optimized Adversarial Training: A Defense Framework for Remote Sensing Scene Classification"],"prefix":"10.1109","volume":"61","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-6640-316X","authenticated-orcid":false,"given":"Yuru","family":"Su","sequence":"first","affiliation":[{"name":"School of Electronics and Information, Northwestern Polytechnical University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1308-5149","authenticated-orcid":false,"given":"Ge","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Electronics and Information, Northwestern Polytechnical University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8018-596X","authenticated-orcid":false,"given":"Shaohui","family":"Mei","sequence":"additional","affiliation":[{"name":"School of Electronics and Information, Northwestern Polytechnical University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3899-0797","authenticated-orcid":false,"given":"Jiawei","family":"Lian","sequence":"additional","affiliation":[{"name":"School of Electronics and Information, Northwestern Polytechnical University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-5689-8271","authenticated-orcid":false,"given":"Ye","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Electronics and Information, Northwestern Polytechnical University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8617-149X","authenticated-orcid":false,"given":"Shuai","family":"Wan","sequence":"additional","affiliation":[{"name":"School of Electronics and Information, Northwestern Polytechnical University, Xi&#x2019;an, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2021.3063287"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2023.3234124"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2023.3260873"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2022.3231930"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.rse.2019.111322"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2018.2803784"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.rse.2022.112916"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2020.3005403"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-006-9794-4"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.isprsjprs.2014.10.002"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2013.2268736"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1869790.1869829"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2007.383266"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2022.3229729"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2019.2893115"},{"key":"ref16","article-title":"A comprehensive study on the robustness of image classification and object detection in remote sensing: Surveying and benchmarking","author":"Mei","year":"2023","journal-title":"arXiv:2306.12111"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2022.3166252"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2020.3015843"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2021.3049292"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/tnnls.2022.3171572"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2022.3146167"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2022.3159619"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/LGRS.2017.2681128"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/LGRS.2017.2657778"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.634"},{"key":"ref29","first-page":"6105","article-title":"EfficientNet: Rethinking model scaling for convolutional neural networks","volume-title":"Proc. 36th Int. Conf. Mach. Learn.","author":"Tan"},{"key":"ref30","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014","journal-title":"arXiv:1412.6572"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1201\/9781351251389-8"},{"key":"ref32","article-title":"Transferability in machine learning: From phenomena to black-box attacks using adversarial samples","author":"Papernot","year":"2016","journal-title":"arXiv:1605.07277"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2675998"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2022.3190934"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2020.2999962"},{"key":"ref36","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017","journal-title":"arXiv:1706.06083"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"ref38","article-title":"Defense-GAN: Protecting classifiers against adversarial attacks using generative models","author":"Samangouei","year":"2018","journal-title":"arXiv:1805.06605"},{"key":"ref39","first-page":"7472","article-title":"Theoretically principled trade-off between robustness and accuracy","volume-title":"Proc. 36th Int. Conf. Mach. Learn.","author":"Zhang"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/LGRS.2021.3096244"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2021.3081421"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2023.3289878"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01011"},{"key":"ref44","article-title":"Intriguing properties of neural networks","author":"Szegedy","year":"2013","journal-title":"arXiv:1312.6199"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298965"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053009"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2807385"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3208131"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1503.02531"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11504"},{"key":"ref52","article-title":"A study of the effect of JPG compression on adversarial images","author":"Karolina Dziugaite","year":"2016","journal-title":"arXiv:1608.00853"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.56"},{"key":"ref54","article-title":"Feature squeezing: Detecting adversarial examples in deep neural networks","author":"Xu","year":"2017","journal-title":"arXiv:1704.01155"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2017.2685945"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2022.3156392"},{"key":"ref58","article-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014","journal-title":"arXiv:1412.6980"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"}],"container-title":["IEEE Transactions on Geoscience and Remote Sensing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/36\/10006360\/10302664.pdf?arnumber=10302664","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,12]],"date-time":"2024-04-12T06:32:56Z","timestamp":1712903576000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10302664\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":59,"URL":"https:\/\/doi.org\/10.1109\/tgrs.2023.3328889","relation":{},"ISSN":["0196-2892","1558-0644"],"issn-type":[{"value":"0196-2892","type":"print"},{"value":"1558-0644","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}