{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T06:17:10Z","timestamp":1759990630317,"version":"3.41.0"},"reference-count":77,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62471014","62125102","U24B20177"],"award-info":[{"award-number":["62471014","62125102","U24B20177"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005089","name":"Beijing Natural Science Foundation","doi-asserted-by":"publisher","award":["JL23005"],"award-info":[{"award-number":["JL23005"]}],"id":[{"id":"10.13039\/501100005089","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/tifs.2025.3581771","type":"journal-article","created":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T17:27:06Z","timestamp":1750440426000},"page":"6308-6323","source":"Crossref","is-referenced-by-count":1,"title":["Physical Adversarial Camouflage Generation in Optical Remote Sensing Images"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-0321-4705","authenticated-orcid":false,"given":"Zhenbang","family":"Peng","sequence":"first","affiliation":[{"name":"Department of Aerospace Intelligent Science and Technology, School of Astronautics, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0031-8417","authenticated-orcid":false,"given":"Jianqi","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Aerospace Intelligent Science and Technology, School of Astronautics, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4772-3172","authenticated-orcid":false,"given":"Zhenwei","family":"Shi","sequence":"additional","affiliation":[{"name":"Department of Aerospace Intelligent Science and Technology, School of Astronautics, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1774-552X","authenticated-orcid":false,"given":"Zhengxia","family":"Zou","sequence":"additional","affiliation":[{"name":"Department of Aerospace Intelligent Science and Technology, School of Astronautics, Beihang University, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/tgrs.2023.3264839"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00721"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/adma.201301472"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1038\/ncomms7368"},{"issue":"4","key":"ref5","first-page":"81","article-title":"Development of a procedure for camouflage pattern design","volume":"18","author":"Fri\u0161kovec","year":"2010","journal-title":"Fibres Textiles Eastern Eur."},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1117\/12.327177"},{"volume-title":"Visual Perception: Physiology, Psychology, & Ecology","year":"2003","author":"Bruce","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/LGRS.2024.3404604"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/tgrs.2022.3218921"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/mgrs.2025.3560455"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00350"},{"key":"ref13","first-page":"1","article-title":"Explaining and harnessing adversarial examples","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Goodfellow"},{"key":"ref14","first-page":"1","article-title":"Intriguing properties of neural networks","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Szegedy"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.153"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.17"},{"key":"ref17","first-page":"3910","article-title":"Adversarial examples that fool both computer vision and time-limited humans","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"31","author":"Elsayed"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00191"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2807385"},{"key":"ref20","article-title":"Diffusion models for imperceptible and transferable adversarial attack","author":"Chen","year":"2023","journal-title":"arXiv:2305.08192"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/rs14215298"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/tgrs.2024.3426272"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978392"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3116438"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3198857"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3036801"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3352837"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.06083"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/543"},{"key":"ref30","first-page":"1","article-title":"Unrestricted adversarial examples via semantic manipulation","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Bhattad"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1561\/116.00000142"},{"key":"ref32","first-page":"29894","article-title":"Raising the cost of malicious AI-powered image editing","volume-title":"Proc. 40th Int. Conf. Mach. Learn.","author":"Salman"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00175"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01187"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00775"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011028"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00012"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3288426"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-26409-2_19"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00401"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00080"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58558-7_39"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01295"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2023.03.041"},{"key":"ref45","first-page":"1","article-title":"Camou: Learning a vehicle camouflage for physical adversarial attack on object detections in the wild","volume-title":"Proc. ICLR","author":"Zhang"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i2.20141"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00108"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2020.2999962"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2021.3110601"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2023.03.050"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/WACV51458.2022.00385"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/tgrs.2022.3225306"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/tgrs.2024.3386533"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.34133\/remotesensing.0219"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/tgrs.2024.3397678"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.2106.12423"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00453"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/WACV45572.2020.9093363"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00296"},{"volume-title":"YOLOv5 By Ultralytics","year":"2020","author":"Jocher","key":"ref60"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i4.16426"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00978"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/tgrs.2021.3062048"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00975"},{"key":"ref65","first-page":"18381","article-title":"Learning high-precision bounding box for rotated object detection via Kullback\u2013Leibler divergence","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Yang"},{"key":"ref66","first-page":"11830","article-title":"Rethinking rotated object detection with Gaussian Wasserstein distance loss","volume-title":"Proc. 38th Int. Conf. Mach. Learn. (ICML)","volume":"139","author":"Yang"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.2974745"},{"key":"ref68","first-page":"1","article-title":"The KFIoU loss for rotated object detection","volume-title":"Proc. 11th Int. Conf. Learn. Represent.","author":"Yang"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i1.19975"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"ref71","first-page":"469","article-title":"Learning texture manifolds with the periodic spatial GAN","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Bergmann"},{"key":"ref72","first-page":"12104","article-title":"Training generative adversarial networks with limited data","volume-title":"Proc. 34th Int. Conf. Neural Inf. Process. Syst.","author":"Karras"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00418"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1906.07155"},{"volume-title":"OpenMMLab Rotated Object Detection Toolbox and Benchmark","year":"2022","key":"ref75"},{"key":"ref76","first-page":"1","article-title":"GANs trained by a two time-scale update rule converge to a local Nash equilibrium","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Heusel"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.265"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10810755\/11045780.pdf?arnumber=11045780","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T06:02:49Z","timestamp":1751090569000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11045780\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":77,"URL":"https:\/\/doi.org\/10.1109\/tifs.2025.3581771","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2025]]}}}