[1] Xu G, Zhang B, Yu H, et al. Sparse synthetic aperture radar imaging from compressed sensing and machine learning: theories, applications, and trends [J]. IEEE Geoscience and Remote Sensing Magazine, 2022, 10(4): 32-69. [2] Huang T, Zhang Q X, Liu J B, et al. Adversarial attacks on deep-learning-based SAR image target recognition [J]. Journal of Network and Computer Applications, 2020, 162: 102632. [3] 张帆, 闫敏超, 倪军, 等. 高阶条件随机场引导的多分支极化SAR图像分类[J]. 中国图象图形学报, 2023, 28(10): 3267-3280. Zhang F, Yan M C, Ni J, et al. High-order conditional random fields-relevant multi-branch polarimetric SAR image classification [J]. Journal of Image and Graphics, 2023, 28(10): 3267- 3280. (in Chinese) [4] Zeng Z Q, Sun J P, Han Z, et al. SAR automatic target recognition method based on multistream complex-valued networks [J]. IEEE Transactions on Geoscience and Remote Sensing, 2022, 60: 5228618. [5] Dai T, Feng Y, Chen B, et al. Deep image prior based defense against adversarial examples [J]. Pattern Recognition, 2022, 122: 108249. [6] Yue Z Y, Gao F, Xiong Q X, et al. A novel semi-supervised convolutional neural network method for synthetic aperture radar image recognition [J]. Cognitive Computation, 2021, 13(4): 795-806. [7] 张世辉, 张晓微, 宋丹丹, 等. 基于逆扰动融合生成对抗网络的对抗样本防御方法[J]. 电子学报, 2023, 51(4): 879-884. Zhang S H, Zhang X W, Song D D, et al. Adversarial example defense method based on inverse perturbation fusing generative adversarial network [J]. Acta Electronica Sinica, 2023, 51(4): 879-884. (in Chinese) [8] Zhang L B, Leng X G, Feng S J, et al. Domain knowledge powered two-stream deep network for few-shot SAR vehicle recognition [J]. IEEE Transactions on Geoscience and Remote Sensing, 2021, 60: 5215315. [9] Joriani M, Seifi H, Varjani A Y, et al. An optimization-based approach to recover the detected attacked grid variables after false data injection attack [J]. IEEE Transactions on Smart Grid, 2021, 12(6): 5322-5334. [10] Li C, Wang H D, Zhang J, et al. An approximated gradient sign method using differential evolution for black-box adversarial attack [J]. IEEE Transactions on Evolutionary Computation, 2022, 26(5): 976-990. [11] Liu X, Hsieh C J. Rob-GAN: generator, discriminator, and adversarial attacker [C]// IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2019: 11234-11243. [12] 高勋章, 张志伟, 刘梅, 等. 雷达像智能识别对抗研究进展[J]. 雷达学报, 2023, 12(4): 696-712. Gao X Z, Zhang Z W, Liu M, et al. Intelligent radar image recognition countermeasures: a review [J]. Journal of Radars, 2023, 12(4): 696-712. (in Chinese) [13] Wang Z, Yang H S, Feng Y H, et al. Towards transferable targeted adversarial examples [C]//IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023: 20534-20543. [14] Feng Y, Wu B, et al. CG-ATTACK: modeling the conditional distribution of adversarial perturbations to boost black-box attack [C]//IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022: 15095-15104. [15] Zhou M Y, Wu J, Liu Y P, et al. DaST: data-free substitute training for adversarial attacks [C]//IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020: 231-240. |