{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T02:07:00Z","timestamp":1760148420619,"version":"build-2065373602"},"reference-count":43,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2023,4,30]],"date-time":"2023-04-30T00:00:00Z","timestamp":1682812800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Natural Science Foundation of China","award":["62072250","U20B2065","61872203","61802212","2018JR0018","KYCX200974"],"award-info":[{"award-number":["62072250","U20B2065","61872203","61802212","2018JR0018","KYCX200974"]}]},{"name":"Plan for Scientific Talent of Henan Province","award":["62072250","U20B2065","61872203","61802212","2018JR0018","KYCX200974"],"award-info":[{"award-number":["62072250","U20B2065","61872203","61802212","2018JR0018","KYCX200974"]}]},{"name":"Postgraduate Research &amp; Practice Innovation Program of Jiangsu Province","award":["62072250","U20B2065","61872203","61802212","2018JR0018","KYCX200974"],"award-info":[{"award-number":["62072250","U20B2065","61872203","61802212","2018JR0018","KYCX200974"]}]},{"name":"Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD) fund","award":["62072250","U20B2065","61872203","61802212","2018JR0018","KYCX200974"],"award-info":[{"award-number":["62072250","U20B2065","61872203","61802212","2018JR0018","KYCX200974"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Remote Sensing"],"abstract":"<jats:p>Deep learning models have enabled significant performance improvements to remote sensing image processing. Usually, a large number of training samples is required for detection models. In this study, a dynamic simulation training strategy is designed to generate samples in real time during training. The few adversarial examples are not only directly involved in the training but are also used to fit the distribution model of adversarial noise, helping the real-time generated samples to be similar to adversarial examples. The noise of the training samples is randomly generated according to the distribution model, and the random variation of training inputs reduces the overfitting phenomenon. To enhance the detectability of adversarial noise, the input model is no longer a normalized image but a JPEG error image. Experiments show that with the proposed dynamic simulation training strategy, common classification models such as ResNet and DenseNet can effectively detect adversarial examples.<\/jats:p>","DOI":"10.3390\/rs15092379","type":"journal-article","created":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T12:10:03Z","timestamp":1682943003000},"page":"2379","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Detecting High-Resolution Adversarial Images with Few-Shot Deep Learning"],"prefix":"10.3390","volume":"15","author":[{"given":"Junjie","family":"Zhao","sequence":"first","affiliation":[{"name":"School of Electronics and Information Engineering, Nanjing University of Information Science and Technology, Nanjing 210044, China"}]},{"given":"Junfeng","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Computer Science, Nanjing University of Information Science and Technology, Nanjing 210044, China"}]},{"given":"James Msughter","family":"Adeke","sequence":"additional","affiliation":[{"name":"School of Electronics and Information Engineering, Nanjing University of Information Science and Technology, Nanjing 210044, China"}]},{"given":"Sen","family":"Qiao","sequence":"additional","affiliation":[{"name":"School of Electronics and Information Engineering, Nanjing University of Information Science and Technology, Nanjing 210044, China"}]},{"given":"Jinwei","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Nanjing University of Information Science and Technology, Nanjing 210044, China"},{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450003, China"}]}],"member":"1968","published-online":{"date-parts":[[2023,4,30]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Yang, J., Zhao, L., Dang, J., Wang, Y., Yue, B., and Gu, Z. (2022, January 4\u20135). A Semantic Segmentation Method for High-resolution Remote Sensing Images Based on Encoder-Decoder. Proceedings of the 2022 Tenth International Conference on Advanced Cloud and Big Data (CBD), Guilin, China.","DOI":"10.1109\/CBD58033.2022.00026"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Chen, Z., Zhao, J., and Deng, H. (2023). Global Multi-Attention UResNeXt for Semantic Segmentation of High-Resolution Remote Sensing Images. Remote Sens., 15.","DOI":"10.3390\/rs15071836"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"4045","DOI":"10.1109\/JSTARS.2022.3175191","article-title":"SPANet: Successive Pooling Attention Network for Semantic Segmentation of Remote Sensing Images","volume":"15","author":"Sun","year":"2022","journal-title":"IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"3829","DOI":"10.1109\/TCSVT.2019.2946723","article-title":"Low Rank Component Induced Spatial-Spectral Kernel Method for Hyperspectral Image Classification","volume":"30","author":"Sun","year":"2020","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"3735","DOI":"10.1109\/JSTARS.2020.3005403","article-title":"Remote Sensing Image Scene Classification Meets Deep Learning: Challenges, Methods, Benchmarks, and Opportunities","volume":"13","author":"Cheng","year":"2020","journal-title":"IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"5522214","DOI":"10.1109\/TGRS.2022.3221534","article-title":"Spectral-Spatial Feature Tokenization Transformer for Hyperspectral Image Classification","volume":"60","author":"Sun","year":"2022","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"5539217","DOI":"10.1109\/TGRS.2022.3208165","article-title":"Multi-Structure KELM With Attention Fusion Strategy for Hyperspectral Image Classification","volume":"60","author":"Sun","year":"2022","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Kim, M., Jeong, J., and Kim, S. (2021). ECAP-YOLO: Efficient Channel Attention Pyramid YOLO for Small Object Detection in Aerial Image. Remote Sens., 13.","DOI":"10.3390\/rs13234851"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1109\/MGRS.2021.3115137","article-title":"Deep Learning for Unmanned Aerial Vehicle-Based Object Detection and Tracking: A survey","volume":"10","author":"Wu","year":"2022","journal-title":"IEEE Geosci. Remote Sens. Mag."},{"key":"ref_10","unstructured":"Goodfellow, I.J., Shlens, J., and Szegedy, C. (2015, January 7\u20139). Explaining and Harnessing Adversarial Examples. Proceedings of the 3rd International Conference on Learning Representations (ICLR), San Diego, CA, USA."},{"key":"ref_11","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., and Vladu, A. (May, January 30). Towards Deep Learning Models Resistant to Adversarial Attacks. Proceedings of the 6th International Conference on Learning Representations (ICLR), Vancouver, BC, Canada."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Carlini, N., and Wagner, D.A. (2017, January 22\u201324). Towards Evaluating the Robustness of Neural Networks. Proceedings of the 2017 IEEE Symposium on Security and Privacy (SSP), San Jose, CA, USA.","DOI":"10.1109\/SP.2017.49"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1109\/TMM.2021.3050057","article-title":"SmsNet: A New Deep Convolutional Neural Network Model for Adversarial Example Detection","volume":"24","author":"Wang","year":"2022","journal-title":"IEEE Trans. Multimed."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Zhao, J., and Wang, J. (2020, January 25\u201327). Lightweight DCT-Like Domain Forensics Model for Adversarial Example. Proceedings of the 19th International Workshop on Digital Forensics and Watermarking (IWDW), Melbourne, Australia.","DOI":"10.1007\/978-3-030-69449-4_20"},{"key":"ref_15","unstructured":"Grosse, K., Manoharan, P., Papernot, N., Backes, M., and McDaniel, P.D. (2017). On the (Statistical) Detection of Adversarial Examples. arXiv."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Li, X., and Li, F. (2017, January 22\u201329). Adversarial Examples Detection in Deep Networks with Convolutional Filter Statistics. Proceedings of the IEEE International Conference on Computer Vision (ICCV), Venice, Italy.","DOI":"10.1109\/ICCV.2017.615"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Liu, J., Zhang, W., Zhang, Y., Hou, D., Liu, Y., Zha, H., and Yu, N. (2019, January 15\u201320). Detection Based Defense Against Adversarial Examples From the Steganalysis Point of View. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Long Beach, CA, USA.","DOI":"10.1109\/CVPR.2019.00496"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S., Fawzi, A., and Frossard, P. (2016, January 27\u201330). DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV, USA.","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Rony, J., Hafemann, L.G., Oliveira, L.S., Ayed, I.B., Sabourin, R., and Granger, E. (2019, January 15\u201320). Decoupling Direction and Norm for Efficient Gradient-Based L2 Adversarial Attacks and Defenses. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Long Beach, CA, USA.","DOI":"10.1109\/CVPR.2019.00445"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"108472","DOI":"10.1016\/j.patcog.2021.108472","article-title":"Semi-supervised robust training with generalized perturbed neighborhood","volume":"124","author":"Li","year":"2022","journal-title":"Pattern Recognit."},{"key":"ref_21","unstructured":"Zhang, J., Xu, X., Han, B., Niu, G., Cui, L., Sugiyama, M., and Kankanhalli, M.S. (2020, January 13\u201318). Attacks Which Do Not Kill Training Make Adversarial Learning Stronger. Proceedings of the 37th International Conference on Machine Learning (ICML), Virtual."},{"key":"ref_22","unstructured":"Song, C., Fan, Y., Yang, Y., Wu, B., Li, Y., Li, Z., and He, K. (2021). Regional Adversarial Training for Better Robust Generalization. arXiv."},{"key":"ref_23","unstructured":"Kurakin, A., Goodfellow, I.J., and Bengio, S. (2017, January 24\u201326). Adversarial examples in the physical world. Proceedings of the 5th International Conference on Learning Representations (ICLR), Toulon, France."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Dong, Y., Liao, F., Pang, T., Su, H., Zhu, J., Hu, X., and Li, J. (2018, January 18\u201322). Boosting Adversarial Attacks with Momentum. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Salt Lake City, UT, USA.","DOI":"10.1109\/CVPR.2018.00957"},{"key":"ref_25","unstructured":"Ilyas, A., Engstrom, L., and Madry, A. (2019, January 6\u20139). Prior Convictions: Black-box Adversarial Attacks with Bandits and Priors. Proceedings of the 7th International Conference on Learning Representations (ICLR), New Orleans, LA, USA."},{"key":"ref_26","unstructured":"Brendel, W., Rauber, J., and Bethge, M. (May, January 30). Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box Machine Learning Models. Proceedings of the 6th International Conference on Learning Representations (ICLR), Vancouver, BC, Canada."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1809","DOI":"10.1007\/s00530-022-00953-3","article-title":"ESGAN for generating high quality enhanced samples","volume":"28","author":"Wu","year":"2022","journal-title":"Multim. Syst."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Xiao, C., Li, B., Zhu, J., He, W., Liu, M., and Song, D. (2018, January 13\u201319). Generating Adversarial Examples with Adversarial Networks. Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence (IJCAI), Stockholm, Sweden.","DOI":"10.24963\/ijcai.2018\/543"},{"key":"ref_29","unstructured":"Mangla, P., Jandial, S., Varshney, S., and Balasubramanian, V.N. (November, January 27). AdvGAN++: Harnessing latent layers for adversary generation. Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV), Seoul, Republic of Korea."},{"key":"ref_30","unstructured":"Feinman, R., Curtin, R.R., Shintre, S., and Gardner, A.B. (2017). Detecting Adversarial Samples from Artifacts. arXiv."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Sch\u00f6ttle, P., Schl\u00f6gl, A., Pasquini, C., and B\u00f6hme, R. (2018). Detecting Adversarial Examples\u2014A Lesson from Multimedia Forensics. arXiv.","DOI":"10.23919\/EUSIPCO.2018.8553164"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Jia, X., Wei, X., Cao, X., and Foroosh, H. (2019, January 15\u201320). ComDefend: An Efficient Image Compression Model to Defend Adversarial Examples. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Long Beach, CA, USA.","DOI":"10.1109\/CVPR.2019.00624"},{"key":"ref_33","first-page":"50","article-title":"Recovery of Adversarial Examples based on SmsGAN","volume":"42","author":"Zhao","year":"2021","journal-title":"J. Zhengzhou Univ. Eng. Sci."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Xu, W., Evans, D., and Qi, Y. (2018, January 18\u201321). Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks. Proceedings of the 25th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA.","DOI":"10.14722\/ndss.2018.23198"},{"key":"ref_35","unstructured":"Kannan, H., Kurakin, A., and Goodfellow, I.J. (2018). Adversarial Logit Pairing. arXiv."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"2736","DOI":"10.1109\/TCSVT.2019.2922309","article-title":"Detecting Double JPEG Compressed Color Images with the Same Quantization Matrix in Spherical Coordinates","volume":"30","author":"Wang","year":"2020","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"4065","DOI":"10.1109\/TCSVT.2021.3111195","article-title":"Detecting Aligned Double JPEG Compressed Color Image with Same Quantization Matrix Based on the Stability of Image","volume":"32","author":"Wang","year":"2022","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_38","unstructured":"Simonyan, K., and Zisserman, A. (2015, January 7\u20139). Very Deep Convolutional Networks for Large-Scale Image Recognition. Proceedings of the 3rd International Conference on Learning Representations (ICLR), San Diego, CA, USA."},{"key":"ref_39","unstructured":"Brendel, W., Rauber, J., K\u00fcmmerer, M., Ustyuzhaninov, I., and Bethge, M. (2019, January 8\u201314). Accurate, reliable and fast robustness evaluation. Proceedings of the Annual Conference on Neural Information Processing Systems 2019 (NIPS), Vancouver, BC, Canada."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., and Sun, J. (2016, January 27\u201330). Deep Residual Learning for Image Recognition. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV, USA.","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Zagoruyko, S., and Komodakis, N. (2016, January 19\u201322). Wide Residual Networks. Proceedings of the Proceedings of the British Machine Vision Conference 2016 (BMVC), York, UK.","DOI":"10.5244\/C.30.87"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Huang, G., Liu, Z., van der Maaten, L., and Weinberger, K.Q. (2017, January 21\u201326). Densely Connected Convolutional Networks. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Honolulu, HI, USA.","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"652","DOI":"10.1109\/TPAMI.2019.2938758","article-title":"Res2Net: A New Multi-Scale Backbone Architecture","volume":"43","author":"Gao","year":"2021","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."}],"container-title":["Remote Sensing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2072-4292\/15\/9\/2379\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T19:27:33Z","timestamp":1760124453000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2072-4292\/15\/9\/2379"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,30]]},"references-count":43,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2023,5]]}},"alternative-id":["rs15092379"],"URL":"https:\/\/doi.org\/10.3390\/rs15092379","relation":{},"ISSN":["2072-4292"],"issn-type":[{"type":"electronic","value":"2072-4292"}],"subject":[],"published":{"date-parts":[[2023,4,30]]}}}