{"id":"https://openalex.org/W7125786540","doi":"https://doi.org/10.1002/spy2.70195","title":"Environment\u2010Adaptive Stealth Attack Framework for Natural Camouflage Adversarial Attacks in Remote\u2010Sensing Image","display_name":"Environment\u2010Adaptive Stealth Attack Framework for Natural Camouflage Adversarial Attacks in Remote\u2010Sensing Image","publication_year":2026,"publication_date":"2026-01-27","ids":{"openalex":"https://openalex.org/W7125786540","doi":"https://doi.org/10.1002/spy2.70195"},"language":"en","primary_location":{"id":"doi:10.1002/spy2.70195","is_oa":false,"landing_page_url":"https://doi.org/10.1002/spy2.70195","pdf_url":null,"source":{"id":"https://openalex.org/S4210233143","display_name":"Security and Privacy","issn_l":"2475-6725","issn":["2475-6725"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SECURITY AND PRIVACY","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5124012694","display_name":"Dianlong Fang","orcid":null},"institutions":[{"id":"https://openalex.org/I4472751","display_name":"Anhui Normal University","ror":"https://ror.org/05fsfvw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I4472751"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dianlong Fang","raw_affiliation_strings":["School of Computer and Information Anhui Normal University  Anhui China"],"raw_orcid":"https://orcid.org/0009-0003-9758-4750","affiliations":[{"raw_affiliation_string":"School of Computer and Information Anhui Normal University  Anhui China","institution_ids":["https://openalex.org/I4472751"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124021243","display_name":"Jie Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I4472751","display_name":"Anhui Normal University","ror":"https://ror.org/05fsfvw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I4472751"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jie Wang","raw_affiliation_strings":["School of Computer and Information Anhui Normal University  Anhui China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer and Information Anhui Normal University  Anhui China","institution_ids":["https://openalex.org/I4472751"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5123886241","display_name":"Wenjun Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I4472751","display_name":"Anhui Normal University","ror":"https://ror.org/05fsfvw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I4472751"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenjun Hu","raw_affiliation_strings":["School of Computer and Information Anhui Normal University  Anhui China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer and Information Anhui Normal University  Anhui China","institution_ids":["https://openalex.org/I4472751"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5124021243"],"corresponding_institution_ids":["https://openalex.org/I4472751"],"apc_list":{"value":3140,"currency":"USD","value_usd":3140},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1667394,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":"2","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9563999772071838,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9563999772071838,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10775","display_name":"Generative Adversarial Networks and Image Synthesis","score":0.0044999998062849045,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10036","display_name":"Advanced Neural Network Applications","score":0.0031999999191612005,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/camouflage","display_name":"Camouflage","score":0.828499972820282},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7307999730110168},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep neural networks","score":0.44359999895095825},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.3905999958515167},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.37700000405311584},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.3587999939918518},{"id":"https://openalex.org/keywords/grasp","display_name":"GRASP","score":0.3483000099658966},{"id":"https://openalex.org/keywords/limiting","display_name":"Limiting","score":0.32820001244544983},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.31540000438690186}],"concepts":[{"id":"https://openalex.org/C2776196576","wikidata":"https://www.wikidata.org/wiki/Q196113","display_name":"Camouflage","level":2,"score":0.828499972820282},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7307999730110168},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6535999774932861},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5709999799728394},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.4560999870300293},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.44359999895095825},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3905999958515167},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.37700000405311584},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.3587999939918518},{"id":"https://openalex.org/C171268870","wikidata":"https://www.wikidata.org/wiki/Q1486676","display_name":"GRASP","level":2,"score":0.3483000099658966},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3370000123977661},{"id":"https://openalex.org/C188198153","wikidata":"https://www.wikidata.org/wiki/Q1613840","display_name":"Limiting","level":2,"score":0.32820001244544983},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.31540000438690186},{"id":"https://openalex.org/C87833898","wikidata":"https://www.wikidata.org/wiki/Q1060280","display_name":"Advanced driver assistance systems","level":2,"score":0.31150001287460327},{"id":"https://openalex.org/C2780615836","wikidata":"https://www.wikidata.org/wiki/Q2471869","display_name":"USable","level":2,"score":0.28139999508857727},{"id":"https://openalex.org/C177918212","wikidata":"https://www.wikidata.org/wiki/Q803623","display_name":"Perturbation (astronomy)","level":2,"score":0.2809000015258789},{"id":"https://openalex.org/C6528762","wikidata":"https://www.wikidata.org/wiki/Q1574298","display_name":"Traffic sign recognition","level":4,"score":0.2768000066280365},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.2750999927520752},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.27489998936653137},{"id":"https://openalex.org/C2776151529","wikidata":"https://www.wikidata.org/wiki/Q3045304","display_name":"Object detection","level":3,"score":0.26919999718666077},{"id":"https://openalex.org/C555745239","wikidata":"https://www.wikidata.org/wiki/Q133220","display_name":"Sonar","level":2,"score":0.26809999346733093},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.26440000534057617},{"id":"https://openalex.org/C178253425","wikidata":"https://www.wikidata.org/wiki/Q162668","display_name":"Visual perception","level":3,"score":0.2628999948501587},{"id":"https://openalex.org/C160086991","wikidata":"https://www.wikidata.org/wiki/Q5939193","display_name":"Human visual system model","level":3,"score":0.2621999979019165},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.2615000009536743},{"id":"https://openalex.org/C2776459999","wikidata":"https://www.wikidata.org/wiki/Q2119376","display_name":"Fidelity","level":2,"score":0.25940001010894775},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.2572999894618988},{"id":"https://openalex.org/C145424490","wikidata":"https://www.wikidata.org/wiki/Q618465","display_name":"Remotely operated underwater vehicle","level":4,"score":0.25619998574256897}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/spy2.70195","is_oa":false,"landing_page_url":"https://doi.org/10.1002/spy2.70195","pdf_url":null,"source":{"id":"https://openalex.org/S4210233143","display_name":"Security and Privacy","issn_l":"2475-6725","issn":["2475-6725"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"SECURITY AND PRIVACY","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Sustainable cities and communities","id":"https://metadata.un.org/sdg/11","score":0.7208056449890137}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1980038761","https://openalex.org/W2133665775","https://openalex.org/W2194775991","https://openalex.org/W2243397390","https://openalex.org/W2618530766","https://openalex.org/W2962785568","https://openalex.org/W2963446712","https://openalex.org/W2963542245","https://openalex.org/W2963857521","https://openalex.org/W2995339591","https://openalex.org/W3024988590","https://openalex.org/W3206216128","https://openalex.org/W3215404543","https://openalex.org/W4322502493","https://openalex.org/W4380763457","https://openalex.org/W4382789587","https://openalex.org/W4386525921","https://openalex.org/W4386634500","https://openalex.org/W4386996713","https://openalex.org/W4387267624","https://openalex.org/W4387808162","https://openalex.org/W4391998869","https://openalex.org/W4393207068","https://openalex.org/W4402337565","https://openalex.org/W4405904413","https://openalex.org/W4408503131","https://openalex.org/W4410522179"],"related_works":[],"abstract_inverted_index":{"ABSTRACT":[0],"Deep":[1],"neural":[2],"networks":[3],"(DNNs)":[4],"have":[5],"significantly":[6],"advanced":[7],"the":[8,94,127,157,165,237,250],"classification":[9],"of":[10,123,159,239,249],"remote\u2010sensing":[11],"images":[12],"(RSIs),":[13],"achieving":[14],"remarkable":[15],"performance":[16],"in":[17,46,257],"critical":[18,56],"applications":[19],"such":[20],"as":[21],"disaster":[22],"monitoring,":[23],"urban":[24],"planning,":[25],"and":[26,68,79,147,187,216,229,255],"environmental":[27,134,180,230],"assessment.":[28],"However,":[29],"despite":[30],"their":[31,44,84],"sophistication,":[32],"these":[33,90],"systems":[34],"remain":[35],"highly":[36,112],"vulnerable":[37],"to":[38,110,155,194,233,245],"adversarial":[39,50,114,240],"attacks":[40,160],"that":[41,71,207],"can":[42],"undermine":[43],"reliability":[45],"real\u2010world":[47],"deployments.":[48],"Current":[49],"attack":[51,97,214,222,253],"methods":[52],"suffer":[53],"from":[54],"a":[55,210,246],"drawback:":[57],"they":[58],"produce":[59],"visually":[60],"apparent":[61],"perturbations":[62,174],"characterized":[63],"by":[64,75],"artificial":[65],"geometric":[66],"patterns":[67],"unnatural":[69],"textures":[70],"are":[72],"easily":[73],"identified":[74],"both":[76],"human":[77],"observers":[78],"automated":[80],"detection":[81],"systems,":[82,260],"limiting":[83],"practical":[85],"threat":[86],"potential.":[87],"To":[88],"overcome":[89],"limitations,":[91],"we":[92],"introduce":[93],"environment\u2010adaptive":[95],"stealth":[96,103,128],"(EASA)":[98],"framework,":[99],"which":[100],"strategically":[101],"combines":[102],"patch":[104],"placement":[105,158],"with":[106,116,191],"environment\u2010conscious":[107],"perturbation":[108,196],"generation":[109],"create":[111],"effective":[113],"examples":[115],"high":[117],"visual":[118,217,227],"fidelity.":[119],"The":[120],"framework":[121],"consists":[122],"two":[124],"complementary":[125],"components:":[126],"region":[129,149],"locator":[130],"(SRL)":[131],"performs":[132],"comprehensive":[133,267],"analysis":[135],"using":[136],"HSV\u2010based":[137],"sky":[138],"detection,":[139],"discrete":[140],"cosine":[141],"transform":[142],"(DCT)":[143],"frequency\u2010domain":[144],"texture":[145],"evaluation,":[146],"gradient\u2010aware":[148],"identification.":[150],"It":[151],"incorporates":[152],"probability\u2010guided":[153],"sampling":[154],"optimize":[156],"while":[161],"preserving":[162],"spatial":[163],"naturalness;":[164],"Adaptive":[166],"Environment":[167],"Perturbation":[168],"Optimizer":[169],"(AEPO)":[170],"generates":[171],"physically":[172],"plausible":[173],"via":[175],"multilayer":[176],"noise":[177],"synthesis,":[178],"integrating":[179],"color":[181],"schemes":[182],"through":[183],"illumination":[184],"physics":[185],"modeling,":[186],"utilizing":[188],"momentum\u2010based":[189],"optimization":[190],"projection":[192],"constraints":[193],"control":[195],"intensity.":[197],"Comprehensive":[198],"experiments":[199],"across":[200],"diverse":[201],"state\u2010of\u2010the\u2010art":[202],"deep":[203],"learning":[204],"architectures":[205],"demonstrate":[206],"EASA":[208,225],"achieves":[209],"favorable":[211],"balance":[212],"between":[213,252],"effectiveness":[215,256],"naturalness.":[218],"While":[219],"maintaining":[220],"competitive":[221],"success":[223],"rates,":[224],"improves":[226],"fidelity":[228],"realism":[231],"compared":[232],"existing":[234],"approaches,":[235],"enhancing":[236],"imperceptibility":[238],"perturbations.":[241],"This":[242],"work":[243],"contributes":[244],"deeper":[247],"understanding":[248],"trade\u2010offs":[251],"stealthiness":[254],"remote":[258],"sensing":[259],"providing":[261],"valuable":[262],"insights":[263],"for":[264],"developing":[265],"more":[266],"defense":[268],"strategies.":[269]},"counts_by_year":[],"updated_date":"2026-01-28T23:18:48.515280","created_date":"2026-01-28T00:00:00"}
