{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T12:04:30Z","timestamp":1754481870054,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,26]],"date-time":"2021-11-26T00:00:00Z","timestamp":1637884800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,26]]},"DOI":"10.1145\/3503047.3503136","type":"proceedings-article","created":{"date-parts":[[2022,1,19]],"date-time":"2022-01-19T23:32:51Z","timestamp":1642635171000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["SAR-GPA: SAR Generation Perturbation Algorithm"],"prefix":"10.1145","author":[{"given":"Zhe","family":"Liu","sequence":"first","affiliation":[{"name":"Nanjing University of Aeronautics and Astronautics, China"}]},{"given":"Weijie","family":"Xia","sequence":"additional","affiliation":[{"name":"Nanjing University of Aeronautics and Astronautics, China"}]},{"given":"Yongzhen","family":"Lei","sequence":"additional","affiliation":[{"name":"Nanjing University of Aeronautics and Astronautics, China"}]}],"member":"320","published-online":{"date-parts":[[2022,1,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-rsn:20060078"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1049\/ip-map:19960115"},{"key":"e_1_3_2_1_3_1","unstructured":"S.\u00a0W. Chen D.\u00a0H. Dai Y.\u00a0Z. Li and X.\u00a0S. Wang. 2009. The Theory of 2-D Cosinusoidal Phase-Modulated Repeater Scatter-Wave Jamming to SAR. Acta Electronica Sinica(2009).  S.\u00a0W. Chen D.\u00a0H. Dai Y.\u00a0Z. Li and X.\u00a0S. Wang. 2009. The Theory of 2-D Cosinusoidal Phase-Modulated Repeater Scatter-Wave Jamming to SAR. Acta Electronica Sinica(2009)."},{"key":"e_1_3_2_1_4_1","volume-title":"Explaining and Harnessing Adversarial Examples. Computer Science","author":"Goodfellow J.","year":"2014","unstructured":"Ian\u00a0 J. Goodfellow , Jonathon Shlens , and Christian Szegedy . 2014. Explaining and Harnessing Adversarial Examples. Computer Science ( 2014 ). Ian\u00a0J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and Harnessing Adversarial Examples. Computer Science (2014)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"K. He X. Zhang S. Ren and J. Sun. 2016. Deep Residual Learning for Image Recognition. IEEE (2016).  K. He X. Zhang S. Ren and J. Sun. 2016. Deep Residual Learning for Image Recognition. IEEE (2016).","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_6_1","volume-title":"Proc Spie","author":"Keydel R.","year":"1996","unstructured":"E.\u00a0 R. Keydel , S.\u00a0 W. Lee , and J.\u00a0 T. Moore . 1996 . MSTAR extended operating conditions: a tutorial . Proc Spie (1996). E.\u00a0R. Keydel, S.\u00a0W. Lee, and J.\u00a0T. Moore. 1996. MSTAR extended operating conditions: a tutorial. Proc Spie (1996)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Alexey Kurakin Ian\u00a0J. Goodfellow and Samy Bengio. 2018. Adversarial Examples in the Physical World.  Alexey Kurakin Ian\u00a0J. Goodfellow and Samy Bengio. 2018. Adversarial Examples in the Physical World.","DOI":"10.1201\/9781351251389-8"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Y. Lecun Y. Bengio and G. Hinton. 2015. Deep learning. Nature 521 7553 (2015) 436.  Y. Lecun Y. Bengio and G. Hinton. 2015. Deep learning. Nature 521 7553 (2015) 436.","DOI":"10.1038\/nature14539"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2020.2980301"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2007.900228"},{"key":"e_1_3_2_1_12_1","volume-title":"Universal Adversarial Perturbations. In 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 86\u201394","author":"Moosavi-Dezfooli S.","year":"2017","unstructured":"S. Moosavi-Dezfooli , A. Fawzi , O. Fawzi , and P. Frossard . 2017 . Universal Adversarial Perturbations. In 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 86\u201394 . https:\/\/doi.org\/10.1109\/CVPR. 2017 .17 10.1109\/CVPR.2017.17 S. Moosavi-Dezfooli, A. Fawzi, O. Fawzi, and P. Frossard. 2017. Universal Adversarial Perturbations. In 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 86\u201394. https:\/\/doi.org\/10.1109\/CVPR.2017.17"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Seyed\u00a0Mohsen Moosavi-Dezfooli Alhussein Fawzi and Pascal Frossard. 2016. DeepFool: a simple and accurate method to fool deep neural networks. (2016).  Seyed\u00a0Mohsen Moosavi-Dezfooli Alhussein Fawzi and Pascal Frossard. 2016. DeepFool: a simple and accurate method to fool deep neural networks. (2016).","DOI":"10.1109\/CVPR.2016.282"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MAP.2019.2943302"},{"key":"e_1_3_2_1_15_1","unstructured":"K. Simonyan and A. Zisserman. 2014. Very Deep Convolutional Networks for Large-Scale Image Recognition. Computer Science (2014).  K. Simonyan and A. Zisserman. 2014. Very Deep Convolutional Networks for Large-Scale Image Recognition. Computer Science (2014)."},{"key":"e_1_3_2_1_16_1","volume-title":"Intriguing properties of neural networks. Computer Science","author":"Szegedy Christian","year":"2013","unstructured":"Christian Szegedy , Wojciech Zaremba , Ilya Sutskever , Joan Bruna , Dumitru Erhan , Ian Goodfellow , and Rob Fergus . 2013. Intriguing properties of neural networks. Computer Science ( 2013 ). Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2013. Intriguing properties of neural networks. Computer Science (2013)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/LMWC.2003.820639"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2859247"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/LAWP.2018.2823079"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2018.2886013"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.03.003"},{"key":"e_1_3_2_1_22_1","volume-title":"Doppler Modulation Jamming in Azimuth to SAR. Modern Radar","author":"Xiao-Fang U.","year":"2010","unstructured":"W.\u00a0 U. Xiao-Fang , D.\u00a0 H. Dai , X.\u00a0 S. Wang , and L.\u00a0 U. Huan-Zhang . 2010. Doppler Modulation Jamming in Azimuth to SAR. Modern Radar ( 2010 ). W.\u00a0U. Xiao-Fang, D.\u00a0H. Dai, X.\u00a0S. Wang, and L.\u00a0U. Huan-Zhang. 2010. Doppler Modulation Jamming in Azimuth to SAR. Modern Radar (2010)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2015.2453396"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/LAWP.2016.2521778"}],"event":{"name":"AISS 2021: 2021 3rd International Conference on Advanced Information Science and System","acronym":"AISS 2021","location":"Sanya China"},"container-title":["Proceedings of the 3rd International Conference on Advanced Information Science and System"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503047.3503136","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3503047.3503136","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:39Z","timestamp":1750188639000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503047.3503136"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,26]]},"references-count":24,"alternative-id":["10.1145\/3503047.3503136","10.1145\/3503047"],"URL":"https:\/\/doi.org\/10.1145\/3503047.3503136","relation":{},"subject":[],"published":{"date-parts":[[2021,11,26]]},"assertion":[{"value":"2022-01-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}