[1] |
XIA W J , LIU Z , LI Y . SAR-PeGA:a generation method of adversarial examples for SAR image target recognition network[J]. IEEE Transactions on Aerospace and Electronic Systems, 2023,59(2): 1910-1920.
|
[2] |
何涛, 李大亮, 曹兰英 . 基于深度学习的机载SAR典型目标识别算法[J]. 现代雷达, 2022,44(12): 87-92.
|
|
HE T , LI D L , CAO L Y . An algorithm of typical target recognition for airborne SAR based on deep learning[J]. Modern Radar, 2022,44(12): 87-92.
|
[3] |
SHI J . SAR target recognition method of MSTAR data set based on multi-feature fusion[C]// Proceedings of the 2022 International Conference on Big Data,Information and Computer Network (BDICN). Piscataway:IEEE Press, 2022: 626-632.
|
[4] |
FANG C , SONG Y M , GUAN F H ,et al. A robust complexvalued deep neural network for target recognition of UAV SAR imagery[J]. IEEE Journal on Miniaturization for Air and Space Systems, 2023,4(2): 175-185.
|
[5] |
王志波, 王雪, 马菁菁 ,等. 面向计算机视觉系统的对抗样本攻击综述[J]. 计算机学报, 2023,46(2): 436-468.
|
|
WANG Z B , WANG X , MA J J ,et al. Survey on adversarial example attack for computer vision systems[J]. Chinese Journal of Computers, 2023,46(2): 436-468.
|
[6] |
赵宏, 常有康, 王伟杰 . 深度神经网络的对抗攻击及防御方法综述[J]. 计算机科学, 2022,49(S2): 662-672.
|
|
ZHAO H , CHANG Y K , WANG W J . Summary of anti-attack and defense methods of deep neural networks[J]. Computer Science, 2022,49(S2): 662-672.
|
[7] |
WANG X M , LI J , KUANG X H ,et al. The security of machine learning in an adversarial setting:a survey[J]. Journal of Parallel and Distributed Computing, 2019(130): 12-23.
|
[8] |
HUANG T , ZHANG Q X , LIU J B ,et al. Adversarial attacks on deep-learning-based SAR image target recognition[J]. Journal of Network and Computer Applications, 2020(162): 102632.
|
[9] |
MOOSAVI-DEZFOOLI S M , FAWZI A , FROSSARD P . DeepFool:a simple and accurate method to fool deep neural networks[C]// Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). Piscataway:IEEE Press, 2016: 2574-2582.
|
[10] |
CARLINI N , WAGNER D . Towards evaluating the robustness of neural networks[C]// Proceedings of the 2017 IEEE Symposium on Security and Privacy (SP). Piscataway:IEEE Press, 2017: 39-57.
|
[11] |
XIAO C W , LI B , ZHU J Y ,et al. Generating adversarial examples with adversarial networks[C]// Proceedings of the Proceedings of the 27th International Joint Conference on Artificial Intelligence. New York:ACM Press, 2018: 3905-3911.
|
[12] |
LIU X Q , HSIEH C J . Rob-GAN:generator,discriminator,and adversarial attacker[C]// Proceedings of the 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). Piscataway:IEEE Press, 2019: 11226-11235.
|
[13] |
张高志, 刘新平, 邵明文 . 用于白盒目标攻击的GAN对抗样本生成[J]. 模式识别与人工智能, 2020,33(9): 830-838.
|
|
ZHANG G Z , LIU X P , SHAO M W . Generating adversarial example with GAN for white-box target attacks[J]. Pattern Recognition and Artificial Intelligence, 2020,33(9): 830-838.
|
[14] |
田宇 . 基于GAN的图像对抗样本生成方法研究[D]. 北京:北京邮电大学, 2020.
|
|
TIAN Y . Research of method on generating image adversarial samples based on GAN[D]. Beijing:Beijing University of Posts and Telecommunications, 2020.
|
[15] |
付睢宁, 路泽忠, 王舜瑶 . 一种改进的Lee滤波SAR图像去噪算法[J]. 计算机与数字工程, 2019,47(8): 2018-2021.
|
|
FU S N , LU Z Z , WANG S Y . An improved lee filter SAR image denoising algorithm[J]. Computer & Digital Engineering, 2019,47(8): 2018-2021.
|
[16] |
谢鹏鹤 . 图像阈值分割算法研究[D]. 湘潭:湘潭大学, 2012.
|
|
XIE P H . The study on the image thresholding segmentation algorithm[D]. Xiangtan:Xiangtan University, 2012.
|
[17] |
JOLICOEUR-MARTINEAU A . The relativistic discriminator:a key element missing from standard GAN[EB]. 2018:arXiv:1807.00734.
|
[18] |
CARLINI N , WAGNER D . Towards evaluating the robustness of neural networks[C]// Proceedings of the 2017 IEEE Symposium on Security and Privacy (SP). Piscataway:IEEE Press, 2017: 39-57.
|