{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T20:25:29Z","timestamp":1770495929817,"version":"3.49.0"},"reference-count":69,"publisher":"MDPI AG","issue":"6","license":[{"start":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T00:00:00Z","timestamp":1710201600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Natural Science Foundation of China","award":["41801291"],"award-info":[{"award-number":["41801291"]}]},{"name":"National Natural Science Foundation of China","award":["22XJ01010"],"award-info":[{"award-number":["22XJ01010"]}]},{"name":"Major Program Project of Xiangjiang Laboratory","award":["41801291"],"award-info":[{"award-number":["41801291"]}]},{"name":"Major Program Project of Xiangjiang Laboratory","award":["22XJ01010"],"award-info":[{"award-number":["22XJ01010"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Remote Sensing"],"abstract":"<jats:p>In synthetic aperture radar (SAR) imaging, intelligent object detection methods are facing significant challenges in terms of model robustness and application security, which are posed by adversarial examples. The existing adversarial example generation methods for SAR object detection can be divided into two main types: global perturbation attacks and local perturbation attacks. Due to the dynamic changes and irregular spatial distribution of SAR coherent speckle backgrounds, the attack effectiveness of global perturbation attacks is significantly reduced by coherent speckle. In contrast, by focusing on the image objects, local perturbation attacks achieve targeted and effective advantages over global perturbations by minimizing interference from the SAR coherent speckle background. However, the adaptability of conventional local perturbations is limited because they employ a fixed size without considering the diverse sizes and shapes of SAR objects under various conditions. This paper presents a framework for region-adaptive local perturbations (RaLP) specifically designed for SAR object detection tasks. The framework consists of two modules. To address the issue of coherent speckle noise interference in SAR imagery, we develop a local perturbation generator (LPG) module. By filtering the original image, this module reduces the speckle features introduced during perturbation generation. It then superimposes adversarial perturbations in the form of local perturbations on areas of the object with weaker speckles, thereby reducing the mutual interference between coherent speckles and adversarial perturbation. To address the issue of insufficient adaptability in terms of the size variation in local adversarial perturbations, we propose an adaptive perturbation optimizer (APO) module. This optimizer adapts the size of the adversarial perturbations based on the size and shape of the object, effectively solving the problem of adaptive perturbation size and enhancing the universality of the attack. The experimental results show that RaLP reduces the detection accuracy of the YOLOv3 detector by 29.0%, 29.9%, and 32.3% on the SSDD, SAR-Ship, and AIR-SARShip datasets, respectively, and the model-to-model and dataset-to-dataset transferability of RaLP attacks are verified.<\/jats:p>","DOI":"10.3390\/rs16060997","type":"journal-article","created":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T12:17:16Z","timestamp":1710245836000},"page":"997","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A Region-Adaptive Local Perturbation-Based Method for Generating Adversarial Examples in Synthetic Aperture Radar Object Detection"],"prefix":"10.3390","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-5503-3885","authenticated-orcid":false,"given":"Jiale","family":"Duan","sequence":"first","affiliation":[{"name":"School of Geosciences and Info-Physics, Central South University, South Lushan Road, Changsha 410083, China"},{"name":"Xiangjiang Laboratory, Changsha 410205, China"}]},{"given":"Linyao","family":"Qiu","sequence":"additional","affiliation":[{"name":"China Academy of Electronics and Information Technology, Shuangyuan Road, Beijing 100041, China"}]},{"given":"Guangjun","family":"He","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Space-Ground Integrated Information Technology, Beijing Institute of Satellite Information Engineering, Beijing 100086, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6103-1113","authenticated-orcid":false,"given":"Ling","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Geosciences and Info-Physics, Central South University, South Lushan Road, Changsha 410083, China"}]},{"given":"Zhenshi","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Basic Education, National University of Defense Technology, Changsha 410073, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1173-6593","authenticated-orcid":false,"given":"Haifeng","family":"Li","sequence":"additional","affiliation":[{"name":"School of Geosciences and Info-Physics, Central South University, South Lushan Road, Changsha 410083, China"},{"name":"Xiangjiang Laboratory, Changsha 410205, China"}]}],"member":"1968","published-online":{"date-parts":[[2024,3,12]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"839","DOI":"10.1109\/JOE.2007.903985","article-title":"A physically consistent speckle model for marine SLC SAR images","volume":"32","author":"Migliaccio","year":"2007","journal-title":"IEEE J. Ocean. Eng."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1109\/LGRS.2023.3303323","article-title":"Polarimetric scattering by a vessel at different incidence angles","volume":"20","author":"Adil","year":"2023","journal-title":"IEEE Geosci. Remote Sens. Lett."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"760","DOI":"10.1109\/LGRS.2008.2005255","article-title":"A physical full-resolution SAR ship detection filter","volume":"5","author":"Gambardella","year":"2008","journal-title":"IEEE Geosci. Remote Sens. Lett."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1219","DOI":"10.1109\/JSTARS.2013.2247741","article-title":"A notch filter for ship detection with polarimetric SAR data","volume":"6","author":"Marino","year":"2013","journal-title":"IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Chang, Y.L., Anagaw, A., Chang, L., Wang, Y.C., Hsiao, C.Y., and Lee, W.H. (2019). Ship detection based on YOLOv2 for SAR imagery. Remote Sens., 11.","DOI":"10.3390\/rs11070786"},{"key":"ref_6","unstructured":"Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I., and Fergus, R. (2013). Intriguing properties of neural networks. arXiv."},{"key":"ref_7","unstructured":"Goodfellow, I.J., Shlens, J., and Szegedy, C. (2014). Explaining and harnessing adversarial examples. arXiv."},{"key":"ref_8","unstructured":"Song, D., Eykholt, K., Evtimov, I., Fernandes, E., Li, B., Rahmati, A., Tramer, F., Prakash, A., and Kohno, T. (2018, January 13\u201314). Physical adversarial examples for object detectors. Proceedings of the 12th USENIX Workshop on Offensive Technologies (WOOT 18), Baltimore, MD, USA."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Chow, K.H., Liu, L., Loper, M., Bae, J., Gursoy, M.E., Truex, S., Wei, W., and Wu, Y. (2020, January 28\u201331). Adversarial objectness gradient attacks in real-time object detection systems. Proceedings of the 2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), Atlanta, GA, USA.","DOI":"10.1109\/TPS-ISA50397.2020.00042"},{"key":"ref_10","unstructured":"Xie, C., Wang, J., Zhang, Z., Zhou, Y., Xie, L., and Yuille, A. (, January October). Adversarial examples for semantic segmentation and object detection. Proceedings of the IEEE International Conference on Computer Vision, Venice, Italy."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"775","DOI":"10.3390\/s100100775","article-title":"Statistical modeling of SAR images: A survey","volume":"10","author":"Gao","year":"2010","journal-title":"Sensors"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"117342","DOI":"10.1016\/j.eswa.2022.117342","article-title":"SAR data applications in earth observation: An overview","volume":"205","author":"Tsokas","year":"2022","journal-title":"Expert Syst. Appl."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"4633","DOI":"10.1007\/s11831-021-09548-z","article-title":"A Review on SAR Image and its Despeckling","volume":"28","author":"Singh","year":"2021","journal-title":"Arch. Comput. Methods Eng."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Saha, A., Subramanya, A., Patil, K., and Pirsiavash, H. (2020, January 14\u201319). Role of spatial context in adversarial robustness for object detection. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops, Seattle, WA, USA.","DOI":"10.1109\/CVPRW50498.2020.00400"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Thys, S., Van Ranst, W., and Goedem\u00e9, T. (2019, January 16\u201320). Fooling automated surveillance cameras: Adversarial patches to attack person detection. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops, Long Beach, CA, USA.","DOI":"10.1109\/CVPRW.2019.00012"},{"key":"ref_16","unstructured":"Liu, X., Yang, H., Liu, Z., Song, L., Li, H., and Chen, Y. (2018). Dpatch: An adversarial patch attack on object detectors. arXiv."},{"key":"ref_17","unstructured":"Xu, K., Zhang, G., Liu, S., Fan, Q., Sun, M., Chen, H., Chen, P.Y., Wang, Y., and Lin, X. (2020). Proceedings of the Computer Vision\u2013ECCV 2020: 16th European Conference, Glasgow, UK, 23\u201328 August 2020, Springer. Proceedings, Part V 16."},{"key":"ref_18","unstructured":"Brown, T.B., Man\u00e9, D., Roy, A., Abadi, M., and Gilmer, J. (2017). Adversarial patch. arXiv."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Zhang, T., Zhang, X., Li, J., Xu, X., Wang, B., Zhan, X., Xu, Y., Ke, X., Zeng, T., and Su, H. (2021). SAR ship detection dataset (SSDD): Official release and comprehensive data analysis. Remote Sens., 13.","DOI":"10.3390\/rs13183690"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Wang, Y., Wang, C., Zhang, H., Dong, Y., and Wei, S. (2019). A SAR dataset of ship detection for deep learning under complex backgrounds. Remote Sens., 11.","DOI":"10.3390\/rs11070765"},{"key":"ref_21","first-page":"852","article-title":"AIR-SARShip-1.0: High-resolution SAR ship detection dataset","volume":"8","author":"Xian","year":"2019","journal-title":"J. Radars"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Samanta, S., and Mehta, S. (2017). Towards crafting text adversarial samples. arXiv.","DOI":"10.1007\/978-3-319-76941-7_71"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Ebrahimi, J., Rao, A., Lowd, D., and Dou, D. (2017). Hotflip: White-box adversarial examples for text classification. arXiv.","DOI":"10.18653\/v1\/P18-2006"},{"key":"ref_24","unstructured":"Gao, J., Lanchantin, J., Soffa, M.L., and Qi, Y. Proceedings of the 2018 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA, 24 May 2018, IEEE."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Carlini, N., and Wagner, D. (2018, January 24). Audio adversarial examples: Targeted attacks on speech-to-text. Proceedings of the 2018 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA.","DOI":"10.1109\/SPW.2018.00009"},{"key":"ref_26","unstructured":"Kuleshov, V., and Thakoor, S.L.T.E.S. (May, January 30). Adversarial examples for natural language classification problems. Proceedings of the 6th International Conference on Learning Representations (ICLR 2018), Vancouver, BC, Canada."},{"key":"ref_27","unstructured":"Athalye, A., Engstrom, L., Ilyas, A., and Kwok, K. (2018, January 10\u201315). Synthesizing robust adversarial examples. Proceedings of the International Conference on Machine Learning, Stockholm, Sweden."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Yakura, H., and Sakuma, J. (2018). Robust audio adversarial example for a physical attack. arXiv.","DOI":"10.24963\/ijcai.2019\/741"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Hendrycks, D., Zhao, K., Basart, S., Steinhardt, J., and Song, D. (2021, January 20\u201325). Natural adversarial examples. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Nashville, TN, USA.","DOI":"10.1109\/CVPR46437.2021.01501"},{"key":"ref_30","unstructured":"Qin, Y., Carlini, N., Cottrell, G., Goodfellow, I., and Raffel, C. (2019, January 10\u201315). Imperceptible, robust, and targeted adversarial examples for automatic speech recognition. Proceedings of the 36th International Conference on Machine Learning (PMLR), Long Beach, CA, USA."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Duan, R., Ma, X., Wang, Y., Bailey, J., Qin, A.K., and Yang, Y. (2020, January 13\u201319). Adversarial camouflage: Hiding physical-world attacks with natural styles. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Seattle, WA, USA.","DOI":"10.1109\/CVPR42600.2020.00108"},{"key":"ref_32","unstructured":"Zhang, Z., Liu, S., Gao, X., and Diao, Y. (2022). Proceedings of the 2022 International Conference on Image Processing, Computer Vision and Machine Learning (ICICML), Xi\u2019an, China, 28\u201330 October 2022, IEEE."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Sun, H., Xu, Y., Kuang, G., and Chen, J. (2021, January 11\u201316). Adversarial robustness evaluation of deep convolutional neural network based SAR ATR algorithm. Proceedings of the 2021 IEEE International Geoscience and Remote Sensing Symposium IGARSS, Brussels, Belgium.","DOI":"10.1109\/IGARSS47720.2021.9554783"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Pang, L., Wang, L., Zhang, Y., and Li, H. (2021). Proceedings of the 2021 IEEE 6th International Conference on Signal and Image Processing (ICSIP), Nanjing, China, 22\u201324 October 2021, IEEE.","DOI":"10.1109\/ICSIP52628.2021.9688913"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"1333","DOI":"10.1109\/JSTARS.2020.3038683","article-title":"Adversarial examples for CNN-based SAR image classification: An experience study","volume":"14","author":"Li","year":"2021","journal-title":"IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens."},{"key":"ref_36","unstructured":"Zhou, J., Peng, B., and Peng, B. (2022). Proceedings of the IGARSS 2022\u20132022 IEEE International Geoscience and Remote Sensing Symposium, Kuala Lumpur, Malaysia, 17\u201322 July 2022, IEEE."},{"key":"ref_37","unstructured":"Kurakin, A., Goodfellow, I.J., and Bengio, S. (2018). Artificial Intelligence Safety and Security, Chapman and Hall\/CRC."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1016\/j.ins.2020.03.066","article-title":"Adversarial attacks on deep-learning-based radar range profile target recognition","volume":"531","author":"Huang","year":"2020","journal-title":"Inf. Sci."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Dong, Y., Liao, F., Pang, T., Su, H., Zhu, J., Hu, X., and Li, J. (2018, January 18\u201322). Boosting adversarial attacks with momentum. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Salt Lake City, UT, USA.","DOI":"10.1109\/CVPR.2018.00957"},{"key":"ref_40","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., and Vladu, A. (2017). Towards deep learning models resistant to adversarial attacks. arXiv."},{"key":"ref_41","unstructured":"Inkawhich, N., Davis, E., Majumder, U., Capraro, C., and Chen, Y. (2020). Proceedings of the 2020 IEEE International Radar Conference (RADAR), Washington, DC, USA, 28\u201330 April 2020, IEEE."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Dong, Y., Pang, T., Su, H., and Zhu, J. (2019, January 16\u201320). Evading defenses to transferable adversarial examples by translation-invariant attacks. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Long Beach, CA, USA.","DOI":"10.1109\/CVPR.2019.00444"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Carlini, N., and Wagner, D. (2017, January 25). Towards evaluating the robustness of neural networks. Proceedings of the 2017 IEEE Symposium on Security and Privacy (sp), San Jose, CA, USA.","DOI":"10.1109\/SP.2017.49"},{"key":"ref_44","unstructured":"Chen, P.Y., Sharma, Y., Zhang, H., Yi, J., and Hsieh, C.J. (2018, January 2\u20137). Ead: Elastic-net attacks to deep neural networks via adversarial examples. Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, (AAAI-18), the 30th innovative Applications of Artificial Intelligence (IAAI-18), and the 8th AAAI Symposium on Educational Advances in Artificial Intelligence (EAAI-18), New Orleans, LA, USA."},{"key":"ref_45","first-page":"1","article-title":"Fast C&W: A fast adversarial attack algorithm to fool SAR target recognition with deep convolutional neural networks","volume":"19","author":"Du","year":"2021","journal-title":"IEEE Geosci. Remote Sens. Lett."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S.M., Fawzi, A., and Frossard, P. (2016, January 27\u201330). Deepfool: A simple and accurate method to fool deep neural networks. Proceedings of the IEEE Conference on Computer Vision and Pattern recognition, Las Vegas, NV, USA.","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Chen, J., Jordan, M.I., and Wainwright, M.J. (2020, January 18\u201321). Hopskipjumpattack: A query-efficient decision-based attack. Proceedings of the 2020 IEEE Symposium on Security and Privacy (sp), San Francisco, CA, USA.","DOI":"10.1109\/SP40000.2020.00045"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Moosavi-Dezfooli, S.M., Fawzi, A., Fawzi, O., and Frossard, P. (2017, January 21\u201326). Universal adversarial perturbations. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Honolulu, HI, USA.","DOI":"10.1109\/CVPR.2017.17"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Papernot, N., McDaniel, P., Jha, S., Fredrikson, M., Celik, Z.B., and Swami, A. (2016, January 21\u201324). The limitations of deep learning in adversarial settings. Proceedings of the 2016 IEEE European Symposium on Security and Privacy (EuroS&P), Saarbr\u00fccken, Germany.","DOI":"10.1109\/EuroSP.2016.36"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Dong, X., Han, J., Chen, D., Liu, J., Bian, H., Ma, Z., Li, H., Wang, X., Zhang, W., and Yu, N. (2020, January 13\u201319). Robust superpixel-guided attentional adversarial attack. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Seattle, WA, USA.","DOI":"10.1109\/CVPR42600.2020.01291"},{"key":"ref_51","unstructured":"Li, Y., Tian, D., Chang, M.C., Bian, X., and Lyu, S. (2018). Robust adversarial perturbation on deep proposal-based models. arXiv."},{"key":"ref_52","unstructured":"Yu, Y., Zou, H., and Zhang, F. (2023). Proceedings of the IGARSS 2023-2023 IEEE International Geoscience and Remote Sensing Symposium, Pasadena, CA, USA, 16\u201321 July 2023, IEEE."},{"key":"ref_53","first-page":"1","article-title":"Speckle-variant attack: Toward transferable adversarial attack to SAR target recognition","volume":"19","author":"Peng","year":"2022","journal-title":"IEEE Geosci. Remote Sens. Lett."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"828","DOI":"10.1109\/TEVC.2019.2890858","article-title":"One pixel attack for fooling deep neural networks","volume":"23","author":"Su","year":"2019","journal-title":"IEEE Trans. Evolut. Comput."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Meng, T., Zhang, F., and Ma, F. (2022, January 20\u201322). A Target-region-based SAR ATR Adversarial Deception Method. Proceedings of the 2022 7th International Conference on Signal and Image Processing (ICSIP), Suzhou, China.","DOI":"10.1109\/ICSIP55141.2022.9887044"},{"key":"ref_56","unstructured":"Karmon, D., Zoran, D., and Goldberg, Y. (2018, January 10\u201315). Lavan: Localized and visible adversarial noise. Proceedings of the International Conference on Machine Learning, Stockholm, Sweden."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"102634","DOI":"10.1016\/j.jnca.2020.102634","article-title":"An adversarial attack on DNN-based black-box object detectors","volume":"161","author":"Wang","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Selvaraju, R.R., Cogswell, M., Das, A., Vedantam, R., Parikh, D., and Batra, D. (2017, January 22\u201329). Grad-cam: Visual explanations from deep networks via gradient-based localization. Proceedings of the IEEE International Conference on Computer Vision, Venice, Italy.","DOI":"10.1109\/ICCV.2017.74"},{"key":"ref_59","unstructured":"Redmon, J., and Farhadi, A. (2018). Yolov3: An incremental improvement. arXiv."},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Tian, Z., Shen, C., Chen, H., and He, T. (November, January 27). Fcos: Fully convolutional one-stage object detection. Proceedings of the 2019 IEEE\/CVF International Conference on Computer Vision (ICCV), Seoul, Republic of Korea.","DOI":"10.1109\/ICCV.2019.00972"},{"key":"ref_61","unstructured":"Ren, S., He, K., Girshick, R., and Sun, J. (2015). Faster r-cnn: Towards real-time object detection with region proposal networks. Adv. Neural Inf. Process. Syst., 28."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Peng, J., Ye, D., Tang, B., Lei, Y., Liu, Y., and Li, H. (2023). Lifelong learning with cycle memory networks. IEEE Trans. Neural Netw. Learn. Syst., 1\u201314.","DOI":"10.1109\/TNNLS.2023.3294495"},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"4243","DOI":"10.1109\/TNNLS.2021.3056201","article-title":"Overcoming long-term catastrophic forgetting through adversarial neural pruning and synaptic consolidation","volume":"33","author":"Peng","year":"2021","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"ref_64","first-page":"1","article-title":"GraSS: Contrastive Learning With Gradient-Guided Sampling Strategy for Remote Sensing Image Semantic Segmentation","volume":"61","author":"Zhang","year":"2023","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Li, H., Cao, J., Zhu, J., Luo, Q., He, S., and Wang, X. (2023). Augmentation-Free Graph Contrastive Learning of Invariant-Discriminative Representations. IEEE Trans. Neural Netw. Learn. Syst., 1\u201311.","DOI":"10.1109\/TNNLS.2023.3248871"},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"5610426","DOI":"10.1109\/TGRS.2023.3276853","article-title":"Self-supervised remote sensing feature learning: Learning paradigms, challenges, and future works","volume":"61","author":"Tao","year":"2023","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"15055","DOI":"10.1109\/TITS.2021.3136287","article-title":"KST-GCN: A knowledge-driven spatial-temporal graph convolutional network for traffic forecasting","volume":"23","author":"Zhu","year":"2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1016\/j.ins.2021.12.077","article-title":"Curvature graph neural network","volume":"592","author":"Li","year":"2022","journal-title":"Inf. Sci."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"4916","DOI":"10.1109\/JSTARS.2023.3271312","article-title":"TOV: The original vision model for optical remote sensing image understanding via self-supervised learning","volume":"33","author":"Tao","year":"2023","journal-title":"IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens."}],"container-title":["Remote Sensing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2072-4292\/16\/6\/997\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T14:12:31Z","timestamp":1760105551000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2072-4292\/16\/6\/997"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,12]]},"references-count":69,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2024,3]]}},"alternative-id":["rs16060997"],"URL":"https:\/\/doi.org\/10.3390\/rs16060997","relation":{},"ISSN":["2072-4292"],"issn-type":[{"value":"2072-4292","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,12]]}}}