{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T18:35:19Z","timestamp":1773772519134,"version":"3.50.1"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62201600"],"award-info":[{"award-number":["62201600"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62201604"],"award-info":[{"award-number":["62201604"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1811462"],"award-info":[{"award-number":["U1811462"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National University of Defense Technology (NUDT) Innovation Science Foundation","doi-asserted-by":"publisher","award":["23-ZZCXKXKY-07"],"award-info":[{"award-number":["23-ZZCXKXKY-07"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NUDT Research Project","award":["ZK22-56"],"award-info":[{"award-number":["ZK22-56"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Geosci. Remote Sensing"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tgrs.2024.3397354","type":"journal-article","created":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T17:30:16Z","timestamp":1715016616000},"page":"1-13","source":"Crossref","is-referenced-by-count":14,"title":["DeMPAA: Deployable Multi-Mini-Patch Adversarial Attack for Remote Sensing Image Classification"],"prefix":"10.1109","volume":"62","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2986-4665","authenticated-orcid":false,"given":"Jun-Jie","family":"Huang","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, National University of Defense Technology, Changsha, China"}]},{"given":"Ziyue","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, National University of Defense Technology, Changsha, China"}]},{"given":"Tianrui","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, National University of Defense Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5697-4168","authenticated-orcid":false,"given":"Wenhan","family":"Luo","sequence":"additional","affiliation":[{"name":"Division of Emerging Interdisciplinary Areas (EMIA), The Hong Kong University of Science and Technology, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-8387-5687","authenticated-orcid":false,"given":"Zihan","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, National University of Defense Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2906-3238","authenticated-orcid":false,"given":"Wentao","family":"Zhao","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, National University of Defense Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3094-7735","authenticated-orcid":false,"given":"Meng","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Information Engineering, Hefei University of Technology, Hefei, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2018.2846178"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.isprsjprs.2020.11.025"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2021.3049292"},{"key":"ref4","article-title":"Explaining and harnessing adversarial examples","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Goodfellow"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i1.25115"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2022.3156392"},{"key":"ref8","first-page":"1","article-title":"Adversarial patch","volume-title":"Proc. NIPS","author":"Brown"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2020.2999962"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2021.3051641"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00930"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00482"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i6.20595"},{"key":"ref14","first-page":"12868","article-title":"Sparse and imperceptible adversarial attack via a homotopy algorithm","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Zhu"},{"key":"ref15","first-page":"14963","article-title":"Transferable sparse adversarial attack","volume-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit.","author":"He"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00790"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3176760"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3231886"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00175"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01498"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01295"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR48806.2021.9412236"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00775"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/rs14215298"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2022.3225306"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.06083"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01488"},{"key":"ref29","first-page":"1","article-title":"Patch-fool: Are vision transformers always robust against adversarial perturbations?","volume-title":"Proc. ICLR","author":"Fu"},{"key":"ref30","first-page":"1","article-title":"Generative dynamic patch attack","volume-title":"Proc. Brit. Mach. Vis. Conf. (BMVC)","author":"Li"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2021.3110601"},{"key":"ref32","first-page":"214","article-title":"Wasserstein generative adversarial networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Arjovsky"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1909.11065"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3390\/rs10060964"},{"issue":"7","key":"ref35","first-page":"38","article-title":"Distilling the knowledge in a neural network","volume":"14","author":"Hinton","year":"2015","journal-title":"Comput. Sci."},{"key":"ref36","first-page":"6115","article-title":"On success and simplicity: A second look at transferable targeted attacks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"34","author":"Zhao"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/0167-2789(92)90242-F"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00112"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2017.2685945"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2675998"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00068"},{"key":"ref44","article-title":"Adam: A method for stochastic optimization","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Kingma"},{"key":"ref45","doi-asserted-by":"crossref","DOI":"10.1007\/978-981-97-2303-4_25","article-title":"Multi-patch adversarial attack for remote sensing image classification","volume-title":"Proc. 7th APWeb-WAIM Int. Joint Conf. Web Big Data","author":"Wang"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"}],"container-title":["IEEE Transactions on Geoscience and Remote Sensing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/36\/10354519\/10521508.pdf?arnumber=10521508","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,18]],"date-time":"2024-11-18T03:37:59Z","timestamp":1731901079000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10521508\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/tgrs.2024.3397354","relation":{},"ISSN":["0196-2892","1558-0644"],"issn-type":[{"value":"0196-2892","type":"print"},{"value":"1558-0644","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}