{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,9]],"date-time":"2025-07-09T22:48:34Z","timestamp":1752101314909,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,21]],"date-time":"2022-10-21T00:00:00Z","timestamp":1666310400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,21]]},"DOI":"10.1145\/3573428.3573620","type":"proceedings-article","created":{"date-parts":[[2023,3,15]],"date-time":"2023-03-15T10:43:09Z","timestamp":1678876989000},"page":"1069-1074","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A generation method of dual adversarial camouflage"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9290-7886","authenticated-orcid":false,"given":"Yekui","family":"Wang","sequence":"first","affiliation":[{"name":"Army Engineering University of PLA, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1286-3693","authenticated-orcid":false,"given":"Tieyong","family":"Cao","sequence":"additional","affiliation":[{"name":"Army Engineering University of PLA, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5075-9176","authenticated-orcid":false,"given":"Yunfei","family":"Zheng","sequence":"additional","affiliation":[{"name":"Army Engineering University of PLA, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4514-2534","authenticated-orcid":false,"given":"Yang","family":"Wang","sequence":"additional","affiliation":[{"name":"Army Engineering University of PLA, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7843-8737","authenticated-orcid":false,"given":"Lei","family":"Chen","sequence":"additional","affiliation":[{"name":"Army Engineering University of PLA, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0508-1597","authenticated-orcid":false,"given":"Bingyang","family":"Fu","sequence":"additional","affiliation":[{"name":"Army Engineering University of PLA, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7303-4242","authenticated-orcid":false,"given":"Tong","family":"Han","sequence":"additional","affiliation":[{"name":"Army Engineering University of PLA, China"}]}],"member":"320","published-online":{"date-parts":[[2023,3,15]]},"reference":[{"volume-title":"2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Huang L","key":"e_1_3_2_1_1_1","unstructured":"Huang L, Gao C, Zhou Y, Universarial Physcal Camouflage Attacks on Object Detectors[C]\/\/ 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2020: 717-726."},{"key":"e_1_3_2_1_2_1","volume-title":"Zhou Xingyu","author":"Duan Yexin","year":"2021","unstructured":"Duan Yexin, Chen Jialin, Zhou Xingyu, DPA: Learning Robust Physical Adversarial Camouflages for Object Detectors [EB\/OL]. 2021. https:\/\/arxiv.org\/pdf\/2109.00124v1.pdf."},{"key":"e_1_3_2_1_3_1","volume-title":"Sun Jialiang","author":"Wang Donghua","year":"2022","unstructured":"Wang Donghua, Jiang Tingsong, Sun Jialiang, FCA: Learning a 3D Full-coverage Vehicle Camouflage for Multi-view Physical Adversarial Attack [C] \/\/ AAAI Conference on Artificial Intelligence, 2022: 2414-2422."},{"key":"e_1_3_2_1_4_1","volume-title":"Dual Attention Suppression Attack: Generate Adversarial Camouflage in Physical World[C] \/\/ 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","author":"Wang Jiakai","year":"2021","unstructured":"Wang Jiakai, Liu Aishan, Yin Zixin, Dual Attention Suppression Attack: Generate Adversarial Camouflage in Physical World[C] \/\/ 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2021: 8561 - 8570."},{"issue":"18","key":"e_1_3_2_1_5_1","first-page":"68","article-title":"Development of a Procedure for Camouflage Pattern Design[J]","volume":"4","author":"Mojca F","year":"2010","unstructured":"Mojca F, Helena G. Development of a Procedure for Camouflage Pattern Design[J]. Fibres & Textiles in Eastern Europe, 2010, 4(18):68-76.","journal-title":"Fibres & Textiles in Eastern Europe"},{"issue":"1","key":"e_1_3_2_1_6_1","first-page":"186","volume":"37","author":"Cai Yunxiang","year":"2016","unstructured":"Cai Yunxiang, Xue Shiqiang, Zhou Zhiyong, Study of Digital Pattern Generation Method Based on Fractal Brown Model [J]. Acta Armamentarii, 2016, 37(1): 186-192.","journal-title":"Acta Armamentarii"},{"issue":"4","key":"e_1_3_2_1_7_1","first-page":"85","volume":"40","author":"Li Yuanyuan","year":"2021","unstructured":"Li Yuanyuan, Zhang Yanbo, Xing Ruonan, Application of Fusion Technology in Camouflage Texture Generation[J]. Ordance Industry Automation, 2021, 40(4): 85-88.","journal-title":"Ordance Industry Automation"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.12.108"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dt.2021.12.003"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dt.2019.06.021"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001420500172"},{"volume-title":"27th International Joint Conference on Artificial Intelligence","author":"Xiao C","key":"e_1_3_2_1_12_1","unstructured":"Xiao C, Li B, Zhu J Y, Generating Adversarial Examples with Adversarial Networks[C]\/\/ 27th International Joint Conference on Artificial Intelligence, 2018: 3905-3911."},{"key":"e_1_3_2_1_13_1","volume-title":"A Neural Algorithm of Artistic Style [C\/OL]\/\/ Computer Vision and Pattern Recognition","author":"Gatys L A","year":"2016","unstructured":"Gatys L A, Ecker A S, and Bethge M. A Neural Algorithm of Artistic Style [C\/OL]\/\/ Computer Vision and Pattern Recognition, 2016. https:\/\/arxiv.org\/pdf\/1508.06576v1.pdf."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.265"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2020.2965989"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2577031"}],"event":{"name":"EITCE 2022: 2022 6th International Conference on Electronic Information Technology and Computer Engineering","acronym":"EITCE 2022","location":"Xiamen China"},"container-title":["Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3573428.3573620","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3573428.3573620","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:33Z","timestamp":1750182573000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3573428.3573620"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,21]]},"references-count":16,"alternative-id":["10.1145\/3573428.3573620","10.1145\/3573428"],"URL":"https:\/\/doi.org\/10.1145\/3573428.3573620","relation":{},"subject":[],"published":{"date-parts":[[2022,10,21]]},"assertion":[{"value":"2023-03-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}