{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,22]],"date-time":"2026-02-22T18:52:29Z","timestamp":1771786349709,"version":"3.50.1"},"reference-count":47,"publisher":"MDPI AG","issue":"24","license":[{"start":{"date-parts":[[2022,12,16]],"date-time":"2022-12-16T00:00:00Z","timestamp":1671148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2019YFB1706003"],"award-info":[{"award-number":["2019YFB1706003"]}]},{"name":"National Key Research and Development Program of China","award":["PCL2022A03"],"award-info":[{"award-number":["PCL2022A03"]}]},{"name":"National Key Research and Development Program of China","award":["2019B010136003"],"award-info":[{"award-number":["2019B010136003"]}]},{"name":"National Key Research and Development Program of China","award":["2020KCXTD007"],"award-info":[{"award-number":["2020KCXTD007"]}]},{"name":"National Key Research and Development Program of China","award":["202032854"],"award-info":[{"award-number":["202032854"]}]},{"name":"National Key Research and Development Program of China","award":["2019"],"award-info":[{"award-number":["2019"]}]},{"name":"National Key Research and Development Program of China","award":["202201010606"],"award-info":[{"award-number":["202201010606"]}]},{"name":"Major Key Project of PCL","award":["2019YFB1706003"],"award-info":[{"award-number":["2019YFB1706003"]}]},{"name":"Major Key Project of PCL","award":["PCL2022A03"],"award-info":[{"award-number":["PCL2022A03"]}]},{"name":"Major Key Project of PCL","award":["2019B010136003"],"award-info":[{"award-number":["2019B010136003"]}]},{"name":"Major Key Project of PCL","award":["2020KCXTD007"],"award-info":[{"award-number":["2020KCXTD007"]}]},{"name":"Major Key Project of PCL","award":["202032854"],"award-info":[{"award-number":["202032854"]}]},{"name":"Major Key Project of PCL","award":["2019"],"award-info":[{"award-number":["2019"]}]},{"name":"Major Key Project of PCL","award":["202201010606"],"award-info":[{"award-number":["202201010606"]}]},{"name":"Guangdong Key R&amp;D Program of China","award":["2019YFB1706003"],"award-info":[{"award-number":["2019YFB1706003"]}]},{"name":"Guangdong Key R&amp;D Program of China","award":["PCL2022A03"],"award-info":[{"award-number":["PCL2022A03"]}]},{"name":"Guangdong Key R&amp;D Program of China","award":["2019B010136003"],"award-info":[{"award-number":["2019B010136003"]}]},{"name":"Guangdong Key R&amp;D Program of China","award":["2020KCXTD007"],"award-info":[{"award-number":["2020KCXTD007"]}]},{"name":"Guangdong Key R&amp;D Program of China","award":["202032854"],"award-info":[{"award-number":["202032854"]}]},{"name":"Guangdong Key R&amp;D Program of China","award":["2019"],"award-info":[{"award-number":["2019"]}]},{"name":"Guangdong Key R&amp;D Program of China","award":["202201010606"],"award-info":[{"award-number":["202201010606"]}]},{"name":"Guangdong Higher Education Innovation Group","award":["2019YFB1706003"],"award-info":[{"award-number":["2019YFB1706003"]}]},{"name":"Guangdong Higher Education Innovation Group","award":["PCL2022A03"],"award-info":[{"award-number":["PCL2022A03"]}]},{"name":"Guangdong Higher Education Innovation Group","award":["2019B010136003"],"award-info":[{"award-number":["2019B010136003"]}]},{"name":"Guangdong Higher Education Innovation Group","award":["2020KCXTD007"],"award-info":[{"award-number":["2020KCXTD007"]}]},{"name":"Guangdong Higher Education Innovation Group","award":["202032854"],"award-info":[{"award-number":["202032854"]}]},{"name":"Guangdong Higher Education Innovation Group","award":["2019"],"award-info":[{"award-number":["2019"]}]},{"name":"Guangdong Higher Education Innovation Group","award":["202201010606"],"award-info":[{"award-number":["202201010606"]}]},{"name":"Guangzhou Higher Education Innovation Group","award":["2019YFB1706003"],"award-info":[{"award-number":["2019YFB1706003"]}]},{"name":"Guangzhou Higher Education Innovation Group","award":["PCL2022A03"],"award-info":[{"award-number":["PCL2022A03"]}]},{"name":"Guangzhou Higher Education Innovation Group","award":["2019B010136003"],"award-info":[{"award-number":["2019B010136003"]}]},{"name":"Guangzhou Higher Education Innovation Group","award":["2020KCXTD007"],"award-info":[{"award-number":["2020KCXTD007"]}]},{"name":"Guangzhou Higher Education Innovation Group","award":["202032854"],"award-info":[{"award-number":["202032854"]}]},{"name":"Guangzhou Higher Education Innovation Group","award":["2019"],"award-info":[{"award-number":["2019"]}]},{"name":"Guangzhou Higher Education Innovation Group","award":["202201010606"],"award-info":[{"award-number":["202201010606"]}]},{"name":"Guangdong Province Universities and Colleges Pearl River Scholar Funded Scheme","award":["2019YFB1706003"],"award-info":[{"award-number":["2019YFB1706003"]}]},{"name":"Guangdong Province Universities and Colleges Pearl River Scholar Funded Scheme","award":["PCL2022A03"],"award-info":[{"award-number":["PCL2022A03"]}]},{"name":"Guangdong Province Universities and Colleges Pearl River Scholar Funded Scheme","award":["2019B010136003"],"award-info":[{"award-number":["2019B010136003"]}]},{"name":"Guangdong Province Universities and Colleges Pearl River Scholar Funded Scheme","award":["2020KCXTD007"],"award-info":[{"award-number":["2020KCXTD007"]}]},{"name":"Guangdong Province Universities and Colleges Pearl River Scholar Funded Scheme","award":["202032854"],"award-info":[{"award-number":["202032854"]}]},{"name":"Guangdong Province Universities and Colleges Pearl River Scholar Funded Scheme","award":["2019"],"award-info":[{"award-number":["2019"]}]},{"name":"Guangdong Province Universities and Colleges Pearl River Scholar Funded Scheme","award":["202201010606"],"award-info":[{"award-number":["202201010606"]}]},{"name":"Guangzhou Science and technology program of China","award":["2019YFB1706003"],"award-info":[{"award-number":["2019YFB1706003"]}]},{"name":"Guangzhou Science and technology program of China","award":["PCL2022A03"],"award-info":[{"award-number":["PCL2022A03"]}]},{"name":"Guangzhou Science and technology program of China","award":["2019B010136003"],"award-info":[{"award-number":["2019B010136003"]}]},{"name":"Guangzhou Science and technology program of China","award":["2020KCXTD007"],"award-info":[{"award-number":["2020KCXTD007"]}]},{"name":"Guangzhou Science and technology program of China","award":["202032854"],"award-info":[{"award-number":["202032854"]}]},{"name":"Guangzhou Science and technology program of China","award":["2019"],"award-info":[{"award-number":["2019"]}]},{"name":"Guangzhou Science and technology program of China","award":["202201010606"],"award-info":[{"award-number":["202201010606"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Remote Sensing"],"abstract":"<jats:p>The acquisition of massive remote sensing data makes it possible to deeply fuse remote sensing and artificial intelligence (AI). The mobility and cost advantages of new sensing platforms in the Internet of Things (IoT) make them ideal for continuous deployment rather than traditional airborne platforms. However, remote sensing devices are vulnerable to malicious attacks and privacy leaks when sharing data due to the complex architecture and heterogeneity of IoT and the lack of a unified security protection mechanism. Traditional protection methods based on public-key encryption require not only complex operations but also energy consumption, which poses new challenges for resources-limited IoT. The objective of this paper was to propose a lightweight privacy-preserving system for the security of remote-sensing images based on visual cryptography. This stacking-to-see feature of visual cryptography enables the efficient encryption of big data such as high-resolution and multi-scale remote sensing images in resource-constrained IoT. To alleviate image quality degradation in visual cryptography, we combined denoising neural networks to extract high-quality images from encrypted datasets, thus improving the recognition accuracy of loss datasets. We conducted extensive experiments, and the results verify the effectiveness of the proposed method in terms of privacy protection and classification accuracy.<\/jats:p>","DOI":"10.3390\/rs14246371","type":"journal-article","created":{"date-parts":[[2022,12,19]],"date-time":"2022-12-19T08:41:41Z","timestamp":1671439301000},"page":"6371","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["A Lightweight Privacy-Preserving System for the Security of Remote Sensing Images on IoT"],"prefix":"10.3390","volume":"14","author":[{"given":"Denghui","family":"Zhang","sequence":"first","affiliation":[{"name":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou 510006, China"}]},{"given":"Lijing","family":"Ren","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Harbin Institute of Technology (Shenzhen), Shenzhen 518055, China"}]},{"given":"Muhammad","family":"Shafiq","sequence":"additional","affiliation":[{"name":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou 510006, China"}]},{"given":"Zhaoquan","family":"Gu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Harbin Institute of Technology (Shenzhen), Shenzhen 518055, China"},{"name":"Department of New Networks, Peng Cheng Laboratory, Shenzhen 518055, China"}]}],"member":"1968","published-online":{"date-parts":[[2022,12,16]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1125","DOI":"10.1109\/JIOT.2017.2683200","article-title":"A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications","volume":"4","author":"Lin","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Xu, C., Du, X., Yan, Z., and Fan, X. (2020). ScienceEarth: A Big Data Platform for Remote Sensing Data Processing. Remote Sens., 12.","DOI":"10.3390\/rs12040607"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Ullo, S.L., and Sinha, G.R. (2021). Advances in IoT and Smart Sensors for Remote Sensing and Agriculture Applications. Remote Sens., 13.","DOI":"10.3390\/rs13132585"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"8616","DOI":"10.1109\/JIOT.2021.3118024","article-title":"A Heterogeneous Access Metamodel for Efficient IoT Remote Sensing Observation Management: Taking Precision Agriculture as an Example","volume":"9","author":"Zhou","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Pallavi, S., Mallapur, J.D., and Bendigeri, K.Y. (2017, January 20\u201322). Remote Sensing and Controlling of Greenhouse Agriculture Parameters Based on IoT. Proceedings of the 2017 International Conference on Big Data, IoT and Data Science (BID), Pune, India.","DOI":"10.1109\/BID.2017.8336571"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Brenner, S., and Kapitza, R. (2019, January 3\u20135). Trust More, Serverless. Proceedings of the 12th ACM International Conference on Systems and Storage, Haifa Israel.","DOI":"10.1145\/3319647.3325825"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Wang, D., Wu, M., He, Y., Pang, L., Xu, Q., and Zhang, R. (2022). An HAP and UAVs Collaboration Framework for Uplink Secure Rate Maximization in NOMA-Enabled IoT Networks. Remote Sens., 14.","DOI":"10.3390\/rs14184501"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Fraga-Lamas, P., Ramos, L., Mond\u00e9jar-Guerra, V., and Fern\u00e1ndez-Caram\u00e9s, T.M. (2019). A Review on IoT Deep Learning UAV Systems for Autonomous Obstacle Detection and Collision Avoidance. Remote Sens., 11.","DOI":"10.3390\/rs11182144"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"e5137513","DOI":"10.1155\/2022\/5137513","article-title":"Internet of Things with Deep Learning-Based Face Recognition Approach for Authentication in Control Medical Systems","volume":"2022","author":"Hussain","year":"2022","journal-title":"Comput. Math. Methods Med."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"14410","DOI":"10.1109\/ACCESS.2018.2807385","article-title":"Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey","volume":"6","author":"Akhtar","year":"2018","journal-title":"IEEE Access"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"921","DOI":"10.1109\/TNSE.2020.2996738","article-title":"Gradient Shielding: Towards Understanding Vulnerability of Deep Neural Networks","volume":"8","author":"Gu","year":"2021","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"ref_12","unstructured":"Abadi, M., Barham, P., Chen, J., Chen, Z., Davis, A., Dean, J., Devin, M., Ghemawat, S., Irving, G., and Isard, M. (2016, January 2\u20134). TensorFlow: A System for Large-Scale Machine Learning. Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation, Savannah, GA, USA."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"617","DOI":"10.1080\/2150704X.2018.1453173","article-title":"Remote Sensing Image Scene Classification Based on Generative Adversarial Networks","volume":"9","author":"Xu","year":"2018","journal-title":"Remote Sens. Lett."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1109\/TGCN.2021.3095707","article-title":"IEPSBP: A Cost-Efficient Image Encryption Algorithm Based on Parallel Chaotic System for Green IoT","volume":"6","author":"Gu","year":"2022","journal-title":"IEEE Trans. Green Commun. Netw."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Korala, H., Georgakopoulos, D., Jayaraman, P.P., and Yavari, A. (2021). Managing Time-Sensitive IoT Applications via Dynamic Application Task Distribution and Adaptation. Remote Sens., 13.","DOI":"10.3390\/rs13204148"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"17043","DOI":"10.1007\/s11042-017-5275-8","article-title":"Face Authentication in Encrypted Domain Based on Correlation Filters","volume":"77","author":"Taheri","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"13455","DOI":"10.1007\/s11042-016-3750-2","article-title":"An Image Zero-Watermarking Algorithm Based on the Encryption of Visual Map Feature with Watermark Information","volume":"76","author":"Thanh","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"3142","DOI":"10.1109\/TIP.2017.2662206","article-title":"Beyond a Gaussian Denoiser: Residual Learning of Deep CNN for Image Denoising","volume":"26","author":"Zhang","year":"2017","journal-title":"IEEE Trans. Image Process."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Boulila, W., Khlifi, M.K., Ammar, A., Koubaa, A., Benjdira, B., and Farah, I.R. (2022). A Hybrid Privacy-Preserving Deep Learning Approach for Object Classification in Very High-Resolution Satellite Images. Remote Sens., 14.","DOI":"10.3390\/rs14184631"},{"key":"ref_20","first-page":"349","article-title":"A Weighted Threshold Secret Sharing Scheme for Remote Sensing Images Based on Chinese Remainder Theorem","volume":"58","author":"He","year":"2019","journal-title":"Comput. Mater. Contin."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MC.2017.9","article-title":"The Emergence of Edge Computing","volume":"50","author":"Satyanarayanan","year":"2017","journal-title":"Computer"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/MCOM.2019.1800378","article-title":"A Privacy-Preserving Lightweight Biometric System for Internet of Things Security","volume":"57","author":"Yang","year":"2019","journal-title":"IEEE Commun. Mag."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"2710","DOI":"10.1016\/j.adhoc.2013.05.003","article-title":"DTLS Based Security and Two-Way Authentication for the Internet of Things","volume":"11","author":"Kothmayr","year":"2013","journal-title":"Ad. Hoc. Networks"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"31927","DOI":"10.1007\/s11042-021-11229-9","article-title":"An Overview of Visual Cryptography Techniques","volume":"80","author":"Ibrahim","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1007\/978-3-642-14298-7_5","article-title":"A Comprehensive Study of Visual Cryptography","volume":"Volume 6010","author":"Shi","year":"2010","journal-title":"Transactions on Data Hiding and Multimedia Security V"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/BFb0053419","article-title":"Visual cryptography","volume":"Volume 950","year":"1995","journal-title":"Advances in Cryptology\u2014EUROCRYPT\u201994"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/j.jvcir.2021.103186","article-title":"HP-VCS: A High-Quality and Printer-Friendly Visual Cryptography Scheme","volume":"78","author":"Zhang","year":"2021","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Wang, L., Yan, B., Yang, H.-M., and Pan, J.-S. (2020). Flip Extended Visual Cryptography for Gray-Scale and Color Cover Images. Symmetry, 13.","DOI":"10.3390\/sym13010065"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1109\/TIFS.2011.2167611","article-title":"An Extended Visual Cryptography Algorithm for General Access Structures","volume":"7","author":"Lee","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"102793","DOI":"10.1016\/j.jvcir.2020.102793","article-title":"Probabilistic Color Visual Cryptography Schemes for Black and White Secret Images","volume":"70","author":"Wu","year":"2020","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"4035","DOI":"10.1109\/JIOT.2020.3019199","article-title":"Toward Location-Enabled IoT (LE-IoT): IoT Positioning Techniques, Error Sources, and Error Mitigation","volume":"8","author":"Li","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"4681","DOI":"10.1109\/TII.2019.2943898","article-title":"Deep Residual Shrinkage Networks for Fault Diagnosis","volume":"16","author":"Zhao","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"4608","DOI":"10.1109\/TIP.2018.2839891","article-title":"FFDNet: Toward a Fast and Flexible Solution for CNN-Based Image Denoising","volume":"27","author":"Zhang","year":"2018","journal-title":"IEEE Trans. Image Process."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Guo, S., Yan, Z., Zhang, K., Zuo, W., and Zhang, L. (2019, January 15\u201320). Toward Convolutional Blind Denoising of Real Photographs. Proceedings of the 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Long Beach, CA, USA.","DOI":"10.1109\/CVPR.2019.00181"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Lo, S.-Y., and Patel, V.M. (2021, January 19\u201322). Error Diffusion Halftoning Against Adversarial Examples. Proceedings of the 2021 IEEE International Conference on Image Processing (ICIP), Anchorage, AK, USA.","DOI":"10.1109\/ICIP42928.2021.9506591"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2508363.2508408","article-title":"Halftone QR Codes","volume":"32","author":"Chu","year":"2013","journal-title":"ACM Trans. Graph."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Rudrawar, A. (2018, January 30\u201331). Content Based Remote-Sensing Image Retrieval with Bag of Visual Words Representation. Proceedings of the 2018 2nd International Conference I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India.","DOI":"10.1109\/I-SMAC.2018.8653688"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MGRS.2016.2540798","article-title":"Deep Learning for Remote Sensing Data: A Technical Tutorial on the State of the Art","volume":"4","author":"Zhang","year":"2016","journal-title":"IEEE Geosci. Remote Sens. Mag."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"1071","DOI":"10.1007\/s11831-019-09344-w","article-title":"A Survey of Deep Learning and Its Applications: A New Paradigm to Machine Learning","volume":"27","author":"Dargan","year":"2020","journal-title":"Arch. Comput. Methods Eng."},{"key":"ref_40","unstructured":"Norouzi, M., Fleet, D.J., and Salakhutdinov, R.R. (2012, January 3\u20136). Hamming Distance Metric Learning. Proceedings of the Advances in Neural Information Processing Systems, Lake Tahoe, NV, USA."},{"key":"ref_41","first-page":"e6645629","article-title":"Research on Target Tracking Algorithm Based on Siamese Neural Network","volume":"2021","author":"Pang","year":"2021","journal-title":"Mob. Inf. Syst."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Hore, A., and Ziou, D. (2010, January 23\u201326). Image Quality Metrics: PSNR vs. SSIM. Proceedings of the 2010 20th International Conference on Pattern Recognition, Istanbul, Turkey.","DOI":"10.1109\/ICPR.2010.579"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"3287774","DOI":"10.1155\/2021\/3287774","article-title":"A Novel Raster Map Exchange Scheme Based on Visual Cryptography","volume":"2021","author":"Ren","year":"2021","journal-title":"Adv. Multimed."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Yang, Y., and Newsam, S. (2010, January 2\u20135). Bag-of-Visual-Words and Spatial Extensions for Land-Use Classification. Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems, San Jose, CA, USA.","DOI":"10.1145\/1869790.1869829"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Shafiq, M., and Gu, Z. (2022). Deep Residual Learning for Image Recognition: A Survey. Appl. Sci., 12.","DOI":"10.3390\/app12188972"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Burger, H.C., Schuler, C.J., and Harmeling, S. (2012, January 16\u201321). Image Denoising: Can Plain Neural Networks Compete with BM3D?. Proceedings of the 2012 IEEE Conference on Computer Vision and Pattern Recognition, Providence, RI, USA.","DOI":"10.1109\/CVPR.2012.6247952"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"2321","DOI":"10.1109\/LGRS.2015.2475299","article-title":"Deep Learning Based Feature Selection for Remote Sensing Scene Classification","volume":"12","author":"Zou","year":"2015","journal-title":"IEEE Geosci. Remote Sens. Lett."}],"container-title":["Remote Sensing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2072-4292\/14\/24\/6371\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:42:39Z","timestamp":1760146959000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2072-4292\/14\/24\/6371"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,16]]},"references-count":47,"journal-issue":{"issue":"24","published-online":{"date-parts":[[2022,12]]}},"alternative-id":["rs14246371"],"URL":"https:\/\/doi.org\/10.3390\/rs14246371","relation":{},"ISSN":["2072-4292"],"issn-type":[{"value":"2072-4292","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,16]]}}}