{"id":"https://openalex.org/W4387802709","doi":"https://doi.org/10.1109/igarss52108.2023.10282092","title":"Contextual Adversarial Attack Against Aerial Detection in The Physical World","display_name":"Contextual Adversarial Attack Against Aerial Detection in The Physical World","publication_year":2023,"publication_date":"2023-07-16","ids":{"openalex":"https://openalex.org/W4387802709","doi":"https://doi.org/10.1109/igarss52108.2023.10282092"},"language":"en","primary_location":{"id":"doi:10.1109/igarss52108.2023.10282092","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/igarss52108.2023.10282092","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IGARSS 2023 - 2023 IEEE International Geoscience and Remote Sensing Symposium","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008908652","display_name":"Jiawei Lian","orcid":null},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiawei Lian","raw_affiliation_strings":["Northwestern Polytechnical University,School of Electronics and Information,Xi&#x2019;an,China,710129"],"affiliations":[{"raw_affiliation_string":"Northwestern Polytechnical University,School of Electronics and Information,Xi&#x2019;an,China,710129","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100363489","display_name":"Xiaofei Wang","orcid":"https://orcid.org/0009-0004-6683-3969"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaofei Wang","raw_affiliation_strings":["Northwestern Polytechnical University,School of Electronics and Information,Xi&#x2019;an,China,710129"],"affiliations":[{"raw_affiliation_string":"Northwestern Polytechnical University,School of Electronics and Information,Xi&#x2019;an,China,710129","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009270521","display_name":"Yuru Su","orcid":"https://orcid.org/0009-0007-6640-316X"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuru Su","raw_affiliation_strings":["Northwestern Polytechnical University,School of Electronics and Information,Xi&#x2019;an,China,710129"],"affiliations":[{"raw_affiliation_string":"Northwestern Polytechnical University,School of Electronics and Information,Xi&#x2019;an,China,710129","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046390538","display_name":"Mingyang Ma","orcid":"https://orcid.org/0000-0002-2944-628X"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingyang Ma","raw_affiliation_strings":["Xi&#x2019;an Jiaotong University,School of Information and Communications Engineering,Xi&#x2019;an,China,710049"],"affiliations":[{"raw_affiliation_string":"Xi&#x2019;an Jiaotong University,School of Information and Communications Engineering,Xi&#x2019;an,China,710049","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067207818","display_name":"Shaohui Mei","orcid":"https://orcid.org/0000-0002-8018-596X"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shaohui Mei","raw_affiliation_strings":["Northwestern Polytechnical University,School of Electronics and Information,Xi&#x2019;an,China,710129"],"affiliations":[{"raw_affiliation_string":"Northwestern Polytechnical University,School of Electronics and Information,Xi&#x2019;an,China,710129","institution_ids":["https://openalex.org/I17145004"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5008908652"],"corresponding_institution_ids":["https://openalex.org/I17145004"],"apc_list":null,"apc_paid":null,"fwci":0.6993,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.76123258,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"32","issue":null,"first_page":"6632","last_page":"6635"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9800000190734863,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8743295669555664},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8176636695861816},{"id":"https://openalex.org/keywords/object-detection","display_name":"Object detection","score":0.5864812135696411},{"id":"https://openalex.org/keywords/detector","display_name":"Detector","score":0.5372573733329773},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5212393403053284},{"id":"https://openalex.org/keywords/physical-security","display_name":"Physical security","score":0.4696827530860901},{"id":"https://openalex.org/keywords/deep-neural-networks","display_name":"Deep neural networks","score":0.4495398998260498},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.447664737701416},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38842272758483887},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3644055128097534},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.30035847425460815},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.21058869361877441},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.06714069843292236}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8743295669555664},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8176636695861816},{"id":"https://openalex.org/C2776151529","wikidata":"https://www.wikidata.org/wiki/Q3045304","display_name":"Object detection","level":3,"score":0.5864812135696411},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.5372573733329773},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5212393403053284},{"id":"https://openalex.org/C2776157020","wikidata":"https://www.wikidata.org/wiki/Q851598","display_name":"Physical security","level":2,"score":0.4696827530860901},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.4495398998260498},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.447664737701416},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38842272758483887},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3644055128097534},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.30035847425460815},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.21058869361877441},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.06714069843292236},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/igarss52108.2023.10282092","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/igarss52108.2023.10282092","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IGARSS 2023 - 2023 IEEE International Geoscience and Remote Sensing Symposium","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W639708223","https://openalex.org/W1673923490","https://openalex.org/W2535873859","https://openalex.org/W2962749812","https://openalex.org/W2962858109","https://openalex.org/W2963726920","https://openalex.org/W2970575838","https://openalex.org/W3138516171","https://openalex.org/W3185095134","https://openalex.org/W4282936640","https://openalex.org/W4312611884","https://openalex.org/W6637162671","https://openalex.org/W6767109091"],"related_works":["https://openalex.org/W2950183588","https://openalex.org/W3080754722","https://openalex.org/W4383221314","https://openalex.org/W3093978547","https://openalex.org/W2953536436","https://openalex.org/W3203790781","https://openalex.org/W4313346231","https://openalex.org/W2738001131","https://openalex.org/W4285785480","https://openalex.org/W2997056298"],"abstract_inverted_index":{"Deep":[0],"Neural":[1],"Networks":[2],"(DNNs)":[3],"have":[4,23],"been":[5],"extensively":[6],"utilized":[7],"in":[8,53,59,73,109,136,156],"aerial":[9,57,71,86,110],"detection.":[10],"However,":[11],"DNNs":[12],"are":[13,143],"susceptible":[14],"and":[15,31,81,162],"vulnerable":[16],"to":[17,28,37,49,128,145],"adversarial":[18],"examples":[19],"Recently,":[20],"physical":[21,51,61,137,163],"attacks":[22,52,135],"gradually":[24],"garnered":[25],"attention":[26,116],"due":[27],"their":[29],"effectiveness":[30,148],"practicality,":[32],"which":[33,76],"pose":[34],"great":[35],"threats":[36],"some":[38],"security-critical":[39],"applications.":[40],"In":[41],"this":[42],"paper,":[43],"we":[44,118],"take":[45],"the":[46,60,93,98,101,114,121,125,133,147,150],"first":[47],"attempt":[48],"perform":[50],"contextual":[54,67,103,122],"form":[55],"against":[56,70],"detection":[58,72,111],"world.":[62],"We":[63],"propose":[64],"an":[65,106],"innovative":[66],"attack":[68,79,160],"method":[69],"real":[74],"scenarios,":[75],"achieves":[77],"powerful":[78],"performance":[80],"transfers":[82],"well":[83],"between":[84],"various":[85],"object":[87],"detectors":[88],"without":[89],"smearing":[90],"or":[91],"blocking":[92],"interested":[94,126],"objects.":[95],"Based":[96],"on":[97],"findings":[99],"that":[100],"targets\u2019":[102],"information":[104],"plays":[105],"important":[107],"role":[108],"by":[112],"observing":[113],"detectors\u2019":[115],"maps,":[117],"fully":[119],"use":[120],"feature":[123],"of":[124,149,158],"targets":[127],"elaborate":[129],"background":[130],"perturbations":[131],"for":[132],"uncovered":[134],"scenarios.":[138],"Experiments":[139],"with":[140],"proportional":[141],"scaling":[142],"conducted":[144],"evaluate":[146],"proposed":[151],"method,":[152],"demonstrating":[153],"its":[154],"superiority":[155],"terms":[157],"both":[159],"efficacy":[161],"practicality.":[164]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2}],"updated_date":"2025-12-19T19:40:27.379048","created_date":"2025-10-10T00:00:00"}
