AI security for geoscience and remote sensing: Challenges and future trends
Recent advances in artificial intelligence (AI) have significantly intensified research in the
geoscience and remote sensing (RS) field. AI algorithms, especially deep learning-based …
geoscience and remote sensing (RS) field. AI algorithms, especially deep learning-based …
Class attention network for image recognition
Visual attention has become a popular and widely used component for image recognition.
Although various attention-based methods have been proposed and achieved relatively …
Although various attention-based methods have been proposed and achieved relatively …
Threatening patch attacks on object detection in optical remote sensing images
Advanced patch attacks (PAs) on object detection in natural images have pointed out the
great safety vulnerability in methods based on deep neural networks (DNNs). However, little …
great safety vulnerability in methods based on deep neural networks (DNNs). However, little …
Task-specific importance-awareness matters: On targeted attacks against object detection
Targeted Attacks on Object Detection (TAOD) aim to deceive the victim detector into
recognizing a specific instance as the predefined target category while minimizing the …
recognizing a specific instance as the predefined target category while minimizing the …
Adversarial robustness via random projection filters
Abstract Deep Neural Networks show superior performance in various tasks but are
vulnerable to adversarial attacks. Most defense techniques are devoted to the adversarial …
vulnerable to adversarial attacks. Most defense techniques are devoted to the adversarial …
STDatav2: Accessing Efficient Black-Box Stealing for Adversarial Attacks
On account of the extreme settings, stealing the black-box model without its training data is
difficult in practice. On this topic, along the lines of data diversity, this paper substantially …
difficult in practice. On this topic, along the lines of data diversity, this paper substantially …
Natural weather-style black-box adversarial attacks against optical aerial detectors
G Tang, W Yao, T Jiang, W Zhou… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Most existing adversarial attack methods against detectors involve adding adversarial
perturbations to benign images to synthesize adversarial examples. However, directly …
perturbations to benign images to synthesize adversarial examples. However, directly …
Backdoor attacks for remote sensing data with wavelet transform
Recent years have witnessed the great success of deep learning algorithms in the
geoscience and remote sensing (RS) realm. Nevertheless, the security and robustness of …
geoscience and remote sensing (RS) realm. Nevertheless, the security and robustness of …
On single-model transferable targeted attacks: A closer look at decision-level optimization
Known as a hard nut, the single-model transferable targeted attacks via decision-level
optimization objectives have attracted much attention among scholars for a long time. On …
optimization objectives have attracted much attention among scholars for a long time. On …
Sok: Pitfalls in evaluating black-box attacks
Numerous works study black-box attacks on image classifiers, where adversaries generate
adversarial examples against unknown target models without having access to their internal …
adversarial examples against unknown target models without having access to their internal …