Proceedings of the 1st International Workshop on Adversarial Learning for Multimedia 2021
DOI: 10.1145/3475724.3483602
|View full text |Cite
|
Sign up to set email alerts
|

Generating Adversarial Remote Sensing Images via Pan-Sharpening Technique

Abstract: Pan-sharpening, as one of the most commonly used techniques in remote sensing systems, aims to inject spatial details from panchromatic images into multi-spectral images to obtain high-resolution MS images. Since deep learning has received widespread attention because of its powerful fitting ability and efficient feature extraction, a variety of pan-sharpening methods have been proposed to achieve remarkable performance. However, current pan-sharpening methods usually require the paired PAN and MS images as th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 61 publications
0
3
0
Order By: Relevance
“…8, gradient-based adversarial attack methods aim to generate adversarial perturbations that are farthest from the decision boundary within the specified perturbation range. On the other hand, optimizationbased methods aim to minimize the size of the adversarial perturbation, i.e., the distance between the adversarial and (a) Pixel [16] (b) Watermark [84] (c) Trigger [85] (d) Patch [86] (e) Viewpoint [87] (f) Style [88] (g) Erosion [89] (h) Sticker [72] (i) Light [90] (j) Laser [91] (k) Color [92] (l) Zoom [93] (m) Texture [94] (n) 3D object [95] (o) Projection [96] (p) Makeup [97] (q) PS [98] (r) Location [99] Fig. 6: Adversarial perturbations in different forms.…”
Section: A Background Knowledgementioning
confidence: 99%
See 2 more Smart Citations
“…8, gradient-based adversarial attack methods aim to generate adversarial perturbations that are farthest from the decision boundary within the specified perturbation range. On the other hand, optimizationbased methods aim to minimize the size of the adversarial perturbation, i.e., the distance between the adversarial and (a) Pixel [16] (b) Watermark [84] (c) Trigger [85] (d) Patch [86] (e) Viewpoint [87] (f) Style [88] (g) Erosion [89] (h) Sticker [72] (i) Light [90] (j) Laser [91] (k) Color [92] (l) Zoom [93] (m) Texture [94] (n) 3D object [95] (o) Projection [96] (p) Makeup [97] (q) PS [98] (r) Location [99] Fig. 6: Adversarial perturbations in different forms.…”
Section: A Background Knowledgementioning
confidence: 99%
“…Specifically, they employ an optimization process to create an adversarial pattern that, when overlaid onto a cloudless scene, causes the DNNs to falsely detect clouds in the image. In paper [98], the authors devise a novel approach for generating adversarial pan-sharpened images. To achieve this, a generative network is employed to generate the pan-sharpened images, followed by the application of shape and label loss to carry out the attack task.…”
Section: ① Digital Attackmentioning
confidence: 99%
See 1 more Smart Citation