{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T17:18:51Z","timestamp":1724951931164},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,11,6]],"date-time":"2018-11-06T00:00:00Z","timestamp":1541462400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,11,6]]},"DOI":"10.1145\/3274895.3274904","type":"proceedings-article","created":{"date-parts":[[2018,11,14]],"date-time":"2018-11-14T13:19:29Z","timestamp":1542201569000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":51,"title":["Adversarial examples in remote sensing"],"prefix":"10.1145","author":[{"given":"Wojciech","family":"Czaja","sequence":"first","affiliation":[{"name":"University of Maryland"}]},{"given":"Neil","family":"Fendley","sequence":"additional","affiliation":[{"name":"Johns Hopkins University Applied Physics Laboratory"}]},{"given":"Michael","family":"Pekala","sequence":"additional","affiliation":[{"name":"Johns Hopkins University Applied Physics Laboratory"}]},{"given":"Christopher","family":"Ratto","sequence":"additional","affiliation":[{"name":"Johns Hopkins University Applied Physics Laboratory"}]},{"given":"I-Jeng","family":"Wang","sequence":"additional","affiliation":[{"name":"Johns Hopkins University Applied Physics Laboratory"}]}],"member":"320","published-online":{"date-parts":[[2018,11,6]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"On the Robustness of the CVPR 2018 White-Box Adversarial Example Defenses. arXivpreprint arXiv:1804","author":"Athalye Anish","year":"2018","unstructured":"Anish Athalye and Nicholas Carlini . 2018 . On the Robustness of the CVPR 2018 White-Box Adversarial Example Defenses. arXivpreprint arXiv:1804 .03286 (2018). Anish Athalye and Nicholas Carlini. 2018. On the Robustness of the CVPR 2018 White-Box Adversarial Example Defenses. arXivpreprint arXiv:1804.03286 (2018)."},{"key":"e_1_3_2_1_2_1","volume-title":"Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples. arXiv preprint arXiv:1802.00420","author":"Athalye Anish","year":"2018","unstructured":"Anish Athalye , Nicholas Carlini , and David Wagner . 2018. Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples. arXiv preprint arXiv:1802.00420 ( 2018 ). Anish Athalye, Nicholas Carlini, and David Wagner. 2018. Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples. arXiv preprint arXiv:1802.00420 (2018)."},{"key":"e_1_3_2_1_3_1","volume-title":"Synthesizing robust adversarial examples. arXiv preprint arXiv:1707.07397","author":"Athalye Anish","year":"2017","unstructured":"Anish Athalye and Ilya Sutskever . 2017. Synthesizing robust adversarial examples. arXiv preprint arXiv:1707.07397 ( 2017 ). Anish Athalye and Ilya Sutskever. 2017. Synthesizing robust adversarial examples. arXiv preprint arXiv:1707.07397 (2017)."},{"key":"e_1_3_2_1_4_1","volume-title":"Adversarial patch. arXiv preprint arXiv:1712.09665","author":"Brown Tom B","year":"2017","unstructured":"Tom B Brown , Dandelion Man\u00e9 , Aurko Roy , Mart\u00edn Abadi , and Justin Gilmer . 2017. Adversarial patch. arXiv preprint arXiv:1712.09665 ( 2017 ). Tom B Brown, Dandelion Man\u00e9, Aurko Roy, Mart\u00edn Abadi, and Justin Gilmer. 2017. Adversarial patch. arXiv preprint arXiv:1712.09665 (2017)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140444"},{"key":"e_1_3_2_1_6_1","volume-title":"Robust Physical Adversarial Attack on Faster R-CNN Object Detector. arXiv preprint arXiv:1804.05810","author":"Chen Shang-Tse","year":"2018","unstructured":"Shang-Tse Chen , Cory Cornelius , Jason Martin , and Duen Horng Chau . 2018. Robust Physical Adversarial Attack on Faster R-CNN Object Detector. arXiv preprint arXiv:1804.05810 ( 2018 ). Shang-Tse Chen, Cory Cornelius, Jason Martin, and Duen Horng Chau. 2018. Robust Physical Adversarial Attack on Faster R-CNN Object Detector. arXiv preprint arXiv:1804.05810 (2018)."},{"key":"e_1_3_2_1_7_1","volume-title":"Functional Map of the World. arXiv preprint arXiv:1711.07846","author":"Christie Gordon","year":"2017","unstructured":"Gordon Christie , Neil Fendley , James Wilson , and Ryan Mukherjee . 2017. Functional Map of the World. arXiv preprint arXiv:1711.07846 ( 2017 ). Gordon Christie, Neil Fendley, James Wilson, and Ryan Mukherjee. 2017. Functional Map of the World. arXiv preprint arXiv:1711.07846 (2017)."},{"key":"e_1_3_2_1_8_1","volume-title":"Adversarial Examples in Remote Sensing. arXiv:1805.10997","author":"Czaja Wojciech","year":"2018","unstructured":"Wojciech Czaja , Neil Fendley , Michael Pekala , Christopher Ratto , and I- Jeng Wang . 2018. Adversarial Examples in Remote Sensing. arXiv:1805.10997 ( 2018 ). Wojciech Czaja, Neil Fendley, Michael Pekala, Christopher Ratto, and I-Jeng Wang. 2018. Adversarial Examples in Remote Sensing. arXiv:1805.10997 (2018)."},{"key":"e_1_3_2_1_9_1","volume-title":"IKONOS: Data Sheet.","year":"2013","unstructured":"DigitalGlobe. 2013 . IKONOS: Data Sheet. (2013). https:\/\/dg-cms-uploads-production.s3.amazonaws.com\/uploads\/document\/file\/96\/DG_IKONOS_DS.pdf {Online; accessed 11-May-2018}. DigitalGlobe. 2013. IKONOS: Data Sheet. (2013). https:\/\/dg-cms-uploads-production.s3.amazonaws.com\/uploads\/document\/file\/96\/DG_IKONOS_DS.pdf {Online; accessed 11-May-2018}."},{"key":"e_1_3_2_1_10_1","volume-title":"Robust Physical-World Attacks on Deep Learning Models. arXiv preprint arXiv:1707.08945 1","author":"Evtimov Ivan","year":"2017","unstructured":"Ivan Evtimov , Kevin Eykholt , Earlence Fernandes , Tadayoshi Kohno , Bo Li , Atul Prakash , Amir Rahmati , and Dawn Song . 2017. Robust Physical-World Attacks on Deep Learning Models. arXiv preprint arXiv:1707.08945 1 ( 2017 ). Ivan Evtimov, Kevin Eykholt, Earlence Fernandes, Tadayoshi Kohno, Bo Li, Atul Prakash, Amir Rahmati, and Dawn Song. 2017. Robust Physical-World Attacks on Deep Learning Models. arXiv preprint arXiv:1707.08945 1 (2017)."},{"key":"e_1_3_2_1_11_1","unstructured":"Fartash Faghri Ian Goodfellow Justin Gilmer Luke Metz Maithra Raghu and Sam Schoenholz. 2018. Adversarial Spheres. (2018). Fartash Faghri Ian Goodfellow Justin Gilmer Luke Metz Maithra Raghu and Sam Schoenholz. 2018. Adversarial Spheres. (2018)."},{"key":"e_1_3_2_1_12_1","first-page":"1632","article-title":"Robustness of classifiers: from adversarial to random noise","author":"Fawzi Alhussein","year":"2016","unstructured":"Alhussein Fawzi , Seyed-Mohsen Moosavi-Dezfooli , and Pascal Frossard . 2016 . Robustness of classifiers: from adversarial to random noise . In Advances in Neural Information Processing Systems. 1632 - 1640 . Alhussein Fawzi, Seyed-Mohsen Moosavi-Dezfooli, and Pascal Frossard. 2016. Robustness of classifiers: from adversarial to random noise. In Advances in Neural Information Processing Systems. 1632-1640.","journal-title":"Advances in Neural Information Processing Systems."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2740965"},{"key":"e_1_3_2_1_14_1","volume-title":"Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572","author":"Goodfellow Ian J","year":"2014","unstructured":"Ian J Goodfellow , Jonathon Shlens , and Christian Szegedy 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 ( 2014 ). Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy 2014. Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572 (2014)."},{"key":"e_1_3_2_1_15_1","volume-title":"Adversarial examples in the physical world. arXiv preprint arXiv:1607.02533","author":"Kurakin Alexey","year":"2016","unstructured":"Alexey Kurakin , Ian Goodfellow , and Samy Bengio . 2016. Adversarial examples in the physical world. arXiv preprint arXiv:1607.02533 ( 2016 ). Alexey Kurakin, Ian Goodfellow, and Samy Bengio. 2016. Adversarial examples in the physical world. arXiv preprint arXiv:1607.02533 (2016)."},{"key":"e_1_3_2_1_16_1","volume-title":"No need to worry about adversarial examples in object detection in autonomous vehicles. arXiv preprint arXiv:1707.03501","author":"Lu Jiajun","year":"2017","unstructured":"Jiajun Lu , Hussein Sibai , Evan Fabry , and David Forsyth . 2017. No need to worry about adversarial examples in object detection in autonomous vehicles. arXiv preprint arXiv:1707.03501 ( 2017 ). Jiajun Lu, Hussein Sibai, Evan Fabry, and David Forsyth. 2017. No need to worry about adversarial examples in object detection in autonomous vehicles. arXiv preprint arXiv:1707.03501 (2017)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1888212.1888230"},{"key":"e_1_3_2_1_18_1","volume-title":"Practical black-box attacks against deep learning systems using adversarial examples. arXiv preprint","author":"Papernot Nicolas","year":"2016","unstructured":"Nicolas Papernot , Patrick McDaniel , Ian Goodfellow , Somesh Jha , Z Berkay Celik , and Ananthram Swami . 2016. Practical black-box attacks against deep learning systems using adversarial examples. arXiv preprint ( 2016 ). Nicolas Papernot, Patrick McDaniel, Ian Goodfellow, Somesh Jha, Z Berkay Celik, and Ananthram Swami. 2016. Practical black-box attacks against deep learning systems using adversarial examples. arXiv preprint (2016)."},{"key":"e_1_3_2_1_19_1","volume-title":"2016 IEEE European Symposium on. IEEE, 372-387","author":"Papernot Nicolas","year":"2016","unstructured":"Nicolas Papernot , Patrick McDaniel , Somesh Jha , Matt Fredrikson , Z Berkay Celik , and Ananthram Swami . 2016 . The limitations of deep learning in adversarial settings. In Security and Privacy (EuroS&P) , 2016 IEEE European Symposium on. IEEE, 372-387 . Nicolas Papernot, Patrick McDaniel, Somesh Jha, Matt Fredrikson, Z Berkay Celik, and Ananthram Swami. 2016. The limitations of deep learning in adversarial settings. In Security and Privacy (EuroS&P), 2016 IEEE European Symposium on. IEEE, 372-387."},{"key":"e_1_3_2_1_20_1","volume-title":"Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199","author":"Szegedy Christian","year":"2013","unstructured":"Christian Szegedy , Wojciech Zaremba , Ilya Sutskever , Joan Bruna , Dumitru Erhan , Ian Goodfellow , and Rob Fergus . 2013. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 ( 2013 ). Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. 2013. Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199 (2013)."}],"event":{"name":"SIGSPATIAL '18: 26th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems","location":"Seattle Washington","acronym":"SIGSPATIAL '18","sponsor":["SIGSPATIAL ACM Special Interest Group on Spatial Information"]},"container-title":["Proceedings of the 26th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3274895.3274904","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T02:31:56Z","timestamp":1673145116000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3274895.3274904"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,6]]},"references-count":20,"alternative-id":["10.1145\/3274895.3274904","10.1145\/3274895"],"URL":"https:\/\/doi.org\/10.1145\/3274895.3274904","relation":{},"subject":[],"published":{"date-parts":[[2018,11,6]]},"assertion":[{"value":"2018-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}