{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:55:02Z","timestamp":1730213702105,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T00:00:00Z","timestamp":1699920000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"publisher","award":["2021YFF0602104-2"],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,14]]},"DOI":"10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361358","type":"proceedings-article","created":{"date-parts":[[2023,12,25]],"date-time":"2023-12-25T19:38:38Z","timestamp":1703533118000},"page":"0200-0207","source":"Crossref","is-referenced-by-count":0,"title":["Adversarial Patch Attacks Against Aerial Imagery Object Detectors Based on Interpretable Guidance"],"prefix":"10.1109","author":[{"given":"Fengyi","family":"Liu","sequence":"first","affiliation":[{"name":"School of Cyberspace Security, Nanjing University of Science and Technology,Nanjing,China"}]},{"given":"Zhichao","family":"Lian","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, Nanjing University of Science and Technology,Nanjing,China"}]}],"member":"263","reference":[{"article-title":"Visdrone-det2018: The vision meets drone object detection in image challenge results","volume-title":"Proceedings of the European Conference on Computer Vision (ECCV)","year":"2018","author":"Zhu","key":"ref1"},{"article-title":"Detecting Objects in Aerial Images","volume-title":"CVPR Workshop","year":"2019","key":"ref2"},{"article-title":"Computer Vision for UA Vs","volume-title":"ICCV Workshop","year":"2017","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cja.2021.09.016"},{"journal-title":"Eprint Arxiv","article-title":"OverFeat: Integrated Recognition, Localization and Detection using Convolutional Networks","year":"2013","author":"Sermanet","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2015.2437384"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10578-9_23"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2016.2577031"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/LGRS.2017.2657778"},{"journal-title":"[50][J]","article-title":"ImageNet Classification with Deep Convolutional Neural Networks","year":"2023","author":"Technicolor","key":"ref10"},{"volume-title":"Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift","year":"2015","author":"Ioffe","key":"ref11"},{"journal-title":"Computer Science","article-title":"Very Deep Convolutional Networks for Large-Scale Image Recognition","year":"2014","author":"Simonyan","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.308"},{"key":"ref14","article-title":"Intriguing properties of neural networks","volume":"abs\/1312.6199","author":"Szegedy","year":"2014","journal-title":"CoRR"},{"volume-title":"Adversarial Examples that Fool Detectors","year":"2017","author":"Lu","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.153"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10925-7_4"},{"volume-title":"Attacking Object Detectors via Imperceptible Patches on Background","year":"2018","author":"Li","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/icme51207.2021.9428301"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICME46284.2020.9102805"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/134"},{"article-title":"G-UAP: Generic Universal Adversarial Perturbation that Fools RPN-based Detectors","volume-title":"Asian Conference on Machine Learning","author":"Wu","key":"ref22"},{"article-title":"DPATCH: An Adversarial Patch Attack on Object Detectors","volume-title":"National Conference on Artificial Intelligence","year":"2019","author":"Liu","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00012"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.08.087"},{"volume-title":"On Physical Adversarial Patches for Object Detection","year":"2019","author":"Lee","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"journal-title":"arXiv preprint","article-title":"Explaining and harnessing adversarial examples","year":"2014","author":"Goodfellow","key":"ref28"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.282"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.49"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2016.319"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.690"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1117\/12.2575907"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/WACV51458.2022.00385"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3390\/rs13204078"},{"journal-title":"arXiv preprint","article-title":"Adam: A method for stochastic optimization","year":"2014","author":"Kingma","key":"ref36"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00418"},{"journal-title":"arXiv e-prints","article-title":"YOLOv3: An Incremental Improvement","year":"2018","author":"Redmon","key":"ref38"}],"event":{"name":"2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)","start":{"date-parts":[[2023,11,14]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2023,11,17]]}},"container-title":["2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10361260\/10360496\/10361358.pdf?arnumber=10361358","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T20:29:26Z","timestamp":1705091366000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10361358\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,14]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/dasc\/picom\/cbdcom\/cy59711.2023.10361358","relation":{},"subject":[],"published":{"date-parts":[[2023,11,14]]}}}