| _ | black | _ |
| Accelerated Testing and Evaluation for | black | -Box Autonomous Driving Systems via Adaptive Markov Chain Monte Carlo |
| Accuracy Assessment Of Go Pro Hero 3 ( | black | ) Camera In Underwater Environment |
| accurate | black | lung detection using transfer learning based on deep neural networks, An |
| ADU: Adaptive Detection of Unknown Categories in | black | -Box Domain Adaptation |
| Adversarial Attack on Fake-Faces Detectors Under White and | black | Box Scenarios |
| Aha! Adaptive History-driven Attack for Decision-based | black | -box Models |
| Algorithm of Additional Correction of Level 2 Remote Sensing Reflectance Data Using Modelling of the Optical Properties of the | black | Sea Waters |
| Aligning Logits Generatively for Principled | black | -Box Knowledge Distillation |
| Aligning Logits Generatively for Principled | black | -Box Knowledge Distillation in the Wild |
| Application of YOLOv5 for Point Label Based Object Detection of | black | Pine Trees with Vitality Losses in UAV Data |
| Applications of ALOS PALSAR for monitoring biophysical parameters of a degraded | black | mangrove (Avicennia germinans) forest |
| Applying force fields to | black | -box GUIs using computer vision |
| Are Exemplar-Based Class Incremental Learning Models Victim of | black | -Box Poison Attacks? |
| Army of Thieves: Enhancing | black | -Box Model Extraction via Ensemble based sample selection |
| Assessing Habitat Suitability: The Case of | black | Rhino in the Ngorongoro Conservation Area |
| Assessing the Generalizability of Deep Neural Networks-based Models for | black | Skin Lesions |
| Assessment of Spatio-Temporal Patterns of | black | Spruce Bud Phenology across Quebec Based on MODIS-NDVI Time Series and Field Observations |
| Automatic Method for | black | Margin Elimination of Sentinel-1A Images over Antarctica, An |
| Auxiliary Task-Guided CycleGAN for | black | -Box Model Domain Adaptation |
| Bandits for Structure Perturbation-based | black | -box Attacks to Graph Neural Networks with Theoretical Guarantees |
| BASAR: | black | -box Attack on Skeletal Action Recognition |
| Binary is the New | black | (and White): Recent Advances on Binary Image Processing |
| black | Box Few-Shot Adaptation for Vision-Language models |
| black | Carbon Concentration Estimation with Mobile-Based Measurements in a Complex Urban Environment |
| black | Carbon over Wuhan, China: Seasonal Variations in Its Optical Properties, Radiative Forcing and Contribution to Atmospheric Aerosols |
| black | Desert Drone Survey: New Perspectives on an Ancient Landscape, The |
| black | Gram Disease Classification via Deep Ensemble Model with Optimal Training |
| black | Hole-Driven Identity Absorbing in Diffusion Models |
| black | Ice Detection Method Based on 1-Dimensional CNN Using mmWave Sensor Backscattering, A |
| black | Spot: A prototype camera module |
| black | Swan: Abductive and Defeasible Video Reasoning in Unpredictable Events |
| black | -box Adversarial Attack against Visual Interpreters for Deep Neural Networks |
| black | -box adversarial attack for poisoning clustering, A |
| black | -box adversarial attack strategy with adjustable sparsity and generalizability for deep image classifiers, A |
| black | -Box Adversarial Defense Based on Image Decomposition and Reconstruction |
| black | -box attack against handwritten signature verification with region-restricted adversarial perturbations |
| black | -Box Attacks on Image Activity Prediction and its Natural Language Explanations |
| black | -Box Attacks, Robustness |
| black | -box Detection of Backdoor Attacks with Limited Information and Data |
| black | -Box Dissector: Towards Erasing-Based Hard-Label Model Stealing Attack |
| black | -Box Explainability-Guided Adversarial Attack for 3D Object Tracking |
| black | -box Explanation of Object Detectors via Saliency Maps |
| black | -Box Few-Shot Knowledge Distillation |
| black | -Box Forgery Attacks on Semantic Watermarks for Diffusion Models |
| black | -box image deblurring and defiltering |
| black | -box model adaptation for semantic segmentation |
| black | -box reversible adversarial example for authorizable recognition to shared images, A |
| black | -box reversible adversarial examples with invertible neural network |
| black | -Box Sparse Adversarial Attack via Multi-Objective Optimisation CVPR Proceedings |
| black | -Box Steganography for Large Language Models |
| black | -Box Targeted Adversarial Attack on Segment Anything (SAM) |
| black | -Box Test-Time Shape REFINEment for Single View 3D Reconstruction |
| black | -box Unsupervised Domain Adaptation with Bi-directional Atkinson-Shiffrin Memory |
| black | -Grass Monitoring Using Hyperspectral Image Data Is Limited by Between-Site Variability |
| black | -White Representation of a Gray-Scale Picture, A |
| black | boxBench: A Comprehensive Benchmark of Black-Box Adversarial Attacks |
| black | VIP: Black-Box Visual Prompting for Robust Transfer Learning |
| Blue Color Indices as a Reference for Remote Sensing of | black | Sea Water |
| Boosting | black | -Box Attack with Partially Transferred Conditional Adversarial Distribution |
| Boosting | black | -Box Variational Inference by Incorporating the Natural Gradient |
| Boosting Decision-based | black | -box Adversarial Attacks with Random Sign Flip |
| Boundary Defense Against | black | -box Adversarial Attacks |
| C-RISE: A Post-Hoc Interpretation Method of | black | -Box Models for SAR ATR |
| Calibrating color cameras using metameric | black | s |
| Can We Use the QA4ECV | black | -sky Fraction of Absorbed Photosynthetically Active Radiation (FAPAR) using AVHRR Surface Reflectance to Assess Terrestrial Global Change? |
| Catching Both Gray and | black | Swans: Open-set Supervised Anomaly Detection* |
| CGBA: Curvature-aware Geometric | black | -box Attack |
| Chain-Link Compression of Arbitrary | black | -White Images |
| Characterization of | black | Sand Mining Activities and Their Environmental Impacts in the Philippines Using Remote Sensing |
| CIE Color Purity Algorithm to Detect | black | and Odorous Water in Urban Rivers Using High-Resolution Multispectral Remote Sensing Images, A |
| ClarityDiffuseNet: Enhancing fundus image quality under | black | shadows with diffusion model-based research |
| Close Imitation of Expert Retouching for | black | -and-White Photography |
| Co-MDA: Federated Multisource Domain Adaptation on | black | -Box Models |
| Color from | black | and White |
| Color from | black | -and-white surveillance cameras |
| Coloring a | black | and white signal using motion detection |
| Colorization of | black | -and-white cartoons |
| combination of color- | black | -and-white visual cryptography and polynomial based secret image sharing, A |
| Combining optical and SAR satellite data to monitor coastline changes in the | black | Sea |
| Comment: Projection Methods Require | black | Border Removal |
| Comparison of In Situ and Remote-Sensing Methods to Determine Turbidity and Concentration of Suspended Matter in the Estuary Zone of the Mzymta River, | black | Sea |
| Compression of | black | and White Images with Arithmetic Coding |
| Consistency and Uncertainty: Identifying Unreliable Responses From | black | -Box Vision-Language Models for Selective Visual Question Answering |
| Consistency-Sensitivity Guided Ensemble | black | -Box Adversarial Attacks in Low-Dimensional Spaces |
| Context-Guided | black | -Box Attack for Visual Tracking |
| Controllable Inversion of | black | -Box Face Recognition Models via Diffusion |
| Convex Partition: A Bayesian Regression Tree for | black | -box Optimisation |
| Copycat CNN: Are random non-Labeled data enough to steal knowledge from | black | -box models? |
| Cross-Domain Transfer Learning with CoRTe: Consistent and Reliable Transfer from | black | -Box to Lightweight Segmentation Model |
| Curls and Whey: Boosting | black | -Box Adversarial Attacks |
| Cyclical Adversarial Attack Pierces | black | -box Deep Neural Networks |
| DA3Attacker: A Diffusion-Based Attacker Against Aesthetics-Oriented | black | -Box Models |
| Data-free Defense of | black | Box Models Against Adversarial Attacks |
| Data-free Universal Adversarial Perturbation and | black | -box Attack |
| Decision-based | black | -box Attack Specific to Large-size Images |
| DeepDIST: A | black | -Box Anti-Collusion Framework for Secure Distribution of Deep Models |
| Defending | black | Box Facial Recognition Classifiers Against Adversarial Attacks |
| Delving into Data: Effectively Substitute Training for | black | -box Attack |
| Detecting and Tracking Bottoms and Faces of the Crested | black | Macaque in the Wild |
| Detecting the Surface Signature of Riverine and Effluent Plumes along the Bulgarian | black | Sea Coast Using Satellite Data |
| Detection and Mapping of | black | Rock Coatings Using Hyperion Images: Sudbury, Ontario, Canada |
| Detection of Invasive | black | Locust (Robinia pseudoacacia) in Small Woody Features Using Spatiotemporal Compositing of Sentinel-2 Data |
| Detection of Soil Erosion Hotspots in the Croplands of a Typical | black | Soil Region in Northeast China: Insights from Sentinel-2 Multispectral Remote Sensing |
| DINE: Domain Adaptation from Single and Multiple | black | -box Predictors |
| Direct Adversarial Attack on Stego Sandwiched Between | black | Boxes |
| Discrete | black | and White Object Recognition Via Morphological Functions |
| Distribution of | black | Nodes at Various Levels in a Linear Quadtree |
| Does explainable machine learning uncover the | black | box in vision applications? |
| DST: Dynamic Substitute Training for Data-free | black | -box Attack |
| Dynamic Routing and Knowledge Re-Learning for Data-Free | black | -Box Attack |
| Earth Observation-Based Cyanobacterial Bloom Index Testing for Ecological Status Assessment in the Open, Coastal and Transitional Waters of the Baltic and | black | Seas |
| Ecological Security Pattern and Its Constraint on Urban Expansion of a | black | Soil Farming Area in Northeast China, The |
| Eddy Induced Cross-Shelf Exchanges in the | black | Sea |
| Effect of | black | Carbon Concentration on the Reflection Property of Snow: A Comparison With Model Results |
| Effective Way to Boost | black | -box Adversarial Attack, An |
| Efficient | black | -Box Adversarial Attack on Deep Clustering Models |
| Efficient Decision-Based | black | -Box Adversarial Attacks on Face Recognition |
| Efficient Decision-based | black | -box Patch Attacks on Video Recognition |
| Emission-Based Machine Learning Approach for Large-Scale Estimates of | black | Carbon in China |
| Empirical Study of Fully | black | -Box and Universal Adversarial Attack for SAR Target Recognition, An |
| Enhanced error-diffusion method for color or | black | -and-white reproduction |
| Enhancing Cross-Task | black | -Box Transferability of Adversarial Examples With Dispersion Reduction |
| Ensemble adversarial | black | -box attacks against deep learning systems |
| ErasableMask: A Robust and Erasable Privacy Protection Scheme Against | black | -Box Face Recognition Models |
| Estimating Stand Age from Airborne Laser Scanning Data to Improve Models of | black | Spruce Wood Density in the Boreal Forest of Ontario |
| Estimation of Surface Concentrations of | black | Carbon from Long-Term Measurements at Aeronet Sites over Korea |
| Evading Deepfake-Image Detectors with White- and | black | -Box Attacks |
| Evaluating AISA+ Hyperspectral Imagery for Mapping | black | Mangrove along the South Texas Gulf Coast |
| Evaluating Different Deep Learning Approaches for Tree Health Classification Using High-Resolution Multispectral UAV Data in the | black | Forest, Harz Region, and Gottinger Forest |
| Evaluating the Capability of Satellite Hyperspectral Imager, the ZY1-02D, for Topsoil Nitrogen Content Estimation and Mapping of Farmlands in | black | Soil Area, China |
| Explain | black | -box Image Classifications Using Superpixel-based Interpretation |
| Exploiting the Local Parabolic Landscapes of Adversarial Losses to Accelerate | black | -Box Adversarial Attack |
| Explore Adversarial Attack via | black | Box Variational Inference |
| Exploring Appropriate Preprocessing Techniques for Hyperspectral Soil Organic Matter Content Estimation in | black | Soil Area |
| Exploring | black | -box adversarial attacks on Interpretable Deep Learning Systems |
| Exploring Effective Data for Surrogate Training Towards | black | -box Attack |
| Exploring Vulnerabilities of No-Reference Image Quality Assessment Models: A Query-Based | black | -Box Method |
| Exposing the Limits of Deepfake Detection using novel Facial mole attack: A Perceptual | black | - Box Adversarial Attack Study |
| Extracting Duckweed/Algal Bloom-Type | black | -Odorous Waters from Remote Sensing Images Based on SwinTf-Unet Model |
| Fabricate-Vanish: An Effective and Transferable | black | -Box Adversarial Attack Incorporating Feature Distortion |
| Fast | black | Run Rotation Algorithm for Binary Images, A |
| Feature selection based on a | black | hole model of data reorganization |
| Finding Needles in a Haystack: A | black | -box Approach to Invisible Watermark Detection |
| Fooling Decision-Based | black | -Box Automotive Vision Perception Systems in Physical World |
| From Head to Tail: Efficient | black | -box Model Inversion Attack via Long-tailed Learning |
| GACE: Geometry Aware Confidence Enhancement for | black | -box 3D Object Detectors on LiDAR-Data |
| General Framework for Combining Visual Trackers: The | black | Boxes Approach, A |
| Generalizable | black | -Box Adversarial Attack With Meta Learning |
| Generalized | black | hole clustering algorithm |
| Generalized block coding of | black | and white images |
| GeoDA: A Geometric Framework for | black | -Box Adversarial Attacks |
| Global White-Sky and | black | -Sky FAPAR Retrieval Using the Energy Balance Residual Method: Algorithm and Validation |
| GRACE Satellite-Based Analysis of Spatiotemporal Evolution and Driving Factors of Groundwater Storage in the | black | Soil Region of Northeast China |
| Gravitationally Lensed | black | Hole Emission Tomography |
| Guessing Smart: Biased Sampling for Efficient | black | -Box Adversarial Attacks |
| Gully Extraction in Northeast China's | black | Soil Region: A Multi-CNN Comparison with Texture-Enhanced Remote Sensing |
| GWO-GEA: A | black | -box Method for Generating Audio Adversarial Examples |
| Hard-label based Small Query | black | -box Adversarial Attack |
| Hijack-GAN: Unintended-Use of Pretrained, | black | -Box GANs |
| HOPE: High-Order Polynomial Expansion of | black | -Box Neural Networks |
| Hyperspectral Remote Sensing Inversion and Monitoring of Organic Matter in | black | Soil Based on Dynamic Fitness Inertia Weight Particle Swarm Optimization Neural Network |
| IASON: Fostering sustainability and uptake of research results through Networking activities in | black | Sea & Mediterranean areas |
| IBSD: Iterable | black | -Box Self-Defense Against Backdoor Attacks |
| Identification of | black | Reef Shipwreck Sites Using AI and Satellite Multispectral Imagery |
| Identification of Non- | black | Inks Using HSV Colour Space |
| Identifying Optimal Variables to Predict Soil Organic Carbon in Sandy, Saline, and | black | Soil Regions: Remote Sensing, Terrain, or Climate Factors? |
| Image gray-level enhancement using | black | Hole algorithm |
| Impact of | black | Edge Artifact on QoE of the FOV-Based Cloud VR Services, The |
| Impacts of the 2019-2020 | black | Summer Drought on Eastern Australian Forests |
| Improving Query Efficiency of | black | -box Adversarial Attack |
| Incremental pseudo-labeling for | black | -box unsupervised domain adaptation |
| Inference of | black | Hole Fluid-Dynamics from Sparse Interferometric Measurements |
| Intelligent mapping paradigm to overcome systematic bias in remote sensing SOC estimation: A case study of the | black | soil region in China and the United States |
| Intensity Values of Terrestrial Laser Scans Reveal Hidden | black | Rock Art Pigment |
| Inter-class Topology Alignment for Efficient | black | -box Substitute Attacks |
| Interpretable Explanations of | black | Boxes by Meaningful Perturbation |
| Interpreting Undesirable Pixels for Image Classification on | black | -Box Models |
| Investigating Top-k White-Box and Transferable | black | -box Attack |
| Invisible | black | -Box Backdoor Attack Through Frequency Domain, An |
| IoU Attack: Towards Temporally Coherent | black | -Box Adversarial Attack for Visual Object Tracking |
| It's Not Just | black | and White: Classifying Defendant Mugshots Based on the Multidimensionality of Race and Ethnicity |
| Iterative and Adaptive Sampling with Spatial Attention for | black | -Box Model Explanations |
| Iterative | black | Top Hat Transform Algorithm for the Volume Estimation of Lunar Impact Craters, An |
| Jointly Optimize Positive and Negative Saliencies for | black | Box Classifiers |
| Knockoff Nets: Stealing Functionality of | black | -Box Models |
| Label Space-Induced Pseudo Label Refinement for Multi-Source | black | -Box Domain Adaptation |
| Language Models as | black | -Box Optimizers for Vision-Language Models |
| Large-Scale Multiple-Objective Method for | black | -box Attack Against Object Detection, A |
| Learning Instance-Specific Parameters of | black | -Box Models Using Differentiable Surrogates |
| Learning like a real student: | black | -box domain adaptation with preview, differentiated learning and review |
| Learning the Human Face Concept from | black | and White Images |
| Leveraging multi-level regularization for efficient Domain Adaptation of | black | -box Predictors |
| LiDAttack: Robust | black | -Box Attack on LiDAR-Based Object Detection |
| Long-Term Variation of | black | Carbon Absorption Aerosol Optical Depth from AERONET Data over East Asia |
| Low-Frequency | black | -Box Backdoor Attack via Evolutionary Algorithm |
| Lunar Surface Resource Exploration: Tracing Lithium, 7 Li and | black | Ice Using Spectral Libraries and Apollo Mission Samples |
| Mal2d: 2d Based Deep Learning Model for Malware Detection Using | black | and White Binary Image |
| Mapping Soil Organic Matter in a Typical | black | Soil Region Using Multi-Temporal Synthetic Images and Radar Indices Under Limited Bare Soil Windows |
| Mesoscale Eddies in the | black | Sea and Their Impact on River Plumes: Numerical Modeling and Satellite Observations |
| Mesoscale Eddy Chain Structures in the | black | Sea and Their Interaction with River Plumes: Numerical Modeling and Satellite Observations |
| Method for colorizing | black | and white footage |
| Method of displaying continuous tone picture using limited number of different colors or | black | -and-white levels, and display system therefor |
| Methods for converting a video signal into a | black | /white signal |
| MetricOpt: Learning to Optimize | black | -Box Evaluation Metrics |
| MFPP: Morphological Fragmental Perturbation Pyramid for | black | -Box Model Explanations |
| MimickNet, Mimicking Clinical Image Post- Processing Under | black | -Box Constraints |
| Mind the Gap: Detecting | black | -box Adversarial Attacks in the Making through Query Update Analysis |
| Minimizing Maximum Model Discrepancy for Transferable | black | -box Targeted Attacks |
| MLink: Linking | black | -Box Models From Multiple Domains for Collaborative Inference |
| model building approach to property measurement in | black | and white pictures, A |
| Modeling Shallow Landslide Runout Distance in Eocene Flysch Facies Using Empirical-Statistical Models (Western | black | Sea Region of Turkiye) |
| Monitoring of Urban | black | -Odor Water Based on Nemerow Index and Gradient Boosting Decision Tree Regression Using UAV-Borne Hyperspectral Imagery |
| Monte-Carlo Sure: A | black | -Box Optimization of Regularization Parameters for General Denoising Algorithms |
| Multi-bit, | black | -box Watermarking of Deep Neural Networks in Embedded Applications |
| Multi-directional decision fusion for | black | -box source-free anomaly detection |
| Multi-layered Approach for Tailored | black | -box Explanations, A |
| Multiresolution visualization of massive | black | oil reservoir models |
| Near-Time Measurement of Aerosol Optical Depth and | black | Carbon Concentration at Socheongcho Ocean Research Station: Aerosol Episode Case Analysis |
| New Method for Continuous Monitoring of | black | and Odorous Water Body Using Evaluation Parameters: A Case Study in Baoding, A |
| novel parallel design of a codec for | black | and white image compression, A |
| Novel Two-in-One Image Secret Sharing Scheme Based on Perfect | black | Visual Cryptography, A |
| Object-Based Mapping of Gullies Using Optical Images: A Case Study in the | black | Soil Region, Northeast of China |
| On | black | -Box Explanation for Face Verification |
| On the Design of | black | -Box Adversarial Examples by Leveraging Gradient-Free Optimization and Operator Splitting Method |
| On the Effectiveness of Small Input Noise for Defending Against Query-based | black | -Box Attacks |
| Opening the | black | Box: Hierarchical Sampling Optimization for Estimating Human Hand Pose |
| Opening the | black | Box: Hierarchical Sampling Optimization for Hand Pose Estimation |
| Opening up the | black | box of medical image segmentation with statistical shape models |
| Optimality of | black | to white ratio and information complexity for robust marker recognition |
| Organic Matter Retrieval in | black | Soil Based on Oblique Extremum Signatures |
| Pan-sharpening based on weighted red | black | wavelets |
| Pan-sharpening using weighted red- | black | wavelet |
| Parallel Rectangle Flip Attack: A Query-based | black | -box Attack against Object Detection |
| Patch Shortcuts: Interpretable Proxy Models Efficiently Find | black | -Box Vulnerabilities |
| Patchattack: A | black | -box Texture-based Attack with Reinforcement Learning |
| Pattern recognition problems in the study of carbon | black | |
| Perceptual quality-preserving | black | -box attack against deep learning image classifiers |
| Polarization-Based Surface Normal Estimation of | black | Specular Objects from Multiple Viewpoints |
| Pollution, | black | Carbon |
| Pornographic image screening by integrating recognition module and image | black | -list/ white-list subsystem |
| Practical | black | -Box Attacks on Deep Neural Networks Using Efficient Query Mechanisms |
| Prediction Exposes Your Face: | black | -box Model Inversion via Prediction Alignment |
| Prediction of Soil Properties in a Field in Typical | black | Soil Areas Using in situ MIR Spectra and Its Comparison with vis-NIR Spectra |
| Preemptive Defense Algorithm Based on Generalizable | black | -Box Feedback Regulation Strategy Against Face-Swapping Deepfake Models |
| Privacy Preserving Defense For | black | Box Classifiers Against On-Line Adversarial Attacks |
| Probabilistic color visual cryptography schemes for | black | and white secret images |
| Projection Probability-Driven | black | -Box Attack |
| QAIR: Practical Query-efficient | black | -Box Attacks for Image Retrieval |
| QELDBA: Query-Efficient and Low Distortion | black | -Box Attack for Brainprint Recognition |
| Quantitative Analysis of Factors Influencing Organic Matter Concentration in the Topsoil of | black | Soil in Northeast China Based on Spatial Heterogeneous Patterns, A |
| Quantitative Evaluation of Dust and | black | Carbon Column Concentration in the MERRA-2 Reanalysis Dataset Using Satellite-Based Component Retrievals |
| Quantitative Evaluation of Gully Erosion Using Multitemporal UAV Data in the Southern | black | Soil Region of Northeast China: A Case Study |
| Query efficient | black | -box adversarial attack on deep neural networks |
| Query Efficient | black | -Box Visual Prompting with Subspace Learning |
| Query-Efficient | black | -Box Adversarial Attack With Customized Iteration and Sampling |
| Query-Efficient | black | -Box Adversarial Attacks Guided by a Transfer-Based Prior |
| Query-efficient | black | -box ensemble attack via dynamic surrogate weighting |
| Quick Recognition of Circular Objects in a | black | -White Picture |
| Random grid based color visual cryptography scheme for | black | and white secret images with general access structures |
| Randomized Channel-pass Mask for Channel-wise Explanation of | black | -box Models |
| Raster Scale Farmland Productivity Assessment with Multi-Source Data Fusion: A Case of Typical | black | Soil Region in Northeast China |
| Recent Sea Level Change in the | black | Sea from Satellite Altimetry and Tide Gauge Observations |
| Recent Sea Level Changes in the | black | Sea From Satellite Gravity And Altimeter Mesurements |
| Reconstructing Large- and Mesoscale Dynamics in the | black | Sea Region from Satellite Imagery and Altimetry Data: A Comparison of Two Methods |
| Recovering color from | black | and white photographs |
| Reflection removal for in-vehicle | black | box videos |
| Reflections: Spectral Investigation of | black | Band Disease in Hawaiian Corals |
| Reinforcement Learning-Based | black | -Box Model Inversion Attacks |
| Relative Sea Level Change Along The | black | Sea Coast From Tide-gauge Observations |
| Remote Sensing of | black | Lakes and Using 810 nm Reflectance Peak for Retrieving Water Quality Parameters of Optically Complex Waters |
| Rendition: Reclaiming What a | black | Box Takes Away |
| Research on Cultivated Land Quality Assessment at the Farm Scale for | black | Soil Region in Northeast China Based on Typical Period Remote Sensing Images from Landsat 9 |
| Response to Projection Methods Require | black | Border Removal |
| Retrieval of | black | Carbon Absorption Aerosol Optical Depth from AERONET Observations over the World during 2000-2018 |
| Robust Decision-Based | black | -Box Adversarial Attack via Coarse-To-Fine Random Search |
| Role and Mechanisms of | black | Carbon Affecting Water Vapor Transport to Tibet |
| Satellite Survey of Inner Seas: Oil Pollution in the | black | and Caspian Seas |
| Satellite Survey of Internal Waves in the | black | and Caspian Seas |
| Satellite-Based Monitoring of Primary Production in a Mediterranean Islet Post | black | Rat Eradication |
| Satellite-Observed | black | Water Events off Southwest Florida: Implications for Coral Reef Health in the Florida Keys National Marine Sanctuary |
| Sea Surface Temperature Variability and Marine Heatwaves in the | black | Sea |
| Seeing Through a | black | Box: Toward High-Quality Terahertz Imaging via Subspace-and-Attention Guided Restoration |
| Self-Alignment for | black | -Box Domain Adaptation of Image Classification |
| Semi-Supervised | black | -Soil Area Detection on the Qinghai-Tibetan Plateau |
| Sequential architecture-agnostic | black | -box attack design and analysis |
| Simple | black | -Box Adversarial Attacks on Deep Neural Networks |
| Simplex Clustering via sBeta With Applications to Online Adjustment of | black | -Box Predictions |
| Simulating Unknown Target Models for Query-Efficient | black | -box Attacks |
| Simulator Attack+ for | black | -Box Adversarial Attack |
| Simultaneously Optimizing Perturbations and Positions for | black | -Box Adversarial Patch Attacks |
| Smart | black | Box: A Value-Driven High-Bandwidth Automotive Event Data Recorder, The |
| Source-free and | black | -box domain adaptation via distributionally adversarial training |
| Sparse | black | -Box Video Attack with Reinforcement Learning |
| Spatial Variation and Uncertainty Analysis of | black | Sea Level Change from Virtual Altimetry Stations over 1993-2020 |
| Spatiotemporal Conflict Analysis and Prediction of Long Time Series Land Cover Changes in the | black | Soil Region of Northeast China Using Remote Sensing and GIS |
| Spatiotemporal Patterns and Driving Factors on Crime Changing During | black | Lives Matter Protests |
| Spatiotemporal Patterns of Cropland Sustainability in | black | Soil Zones Based on Multi-Source Remote Sensing: A Case Study of Heilongjiang, China |
| Spreading of Lagrangian Particles in the | black | Sea: A Comparison between Drifters and a High-Resolution Ocean Model |
| Square Attack: A Query-efficient | black | -box Adversarial Attack via Random Search |
| STBA: Towards Evaluating the Robustness of DNNs for Query-Limited | black | -Box Scenario |
| STDatav2: Accessing Efficient | black | -Box Stealing for Adversarial Attacks |
| Submesoscale Currents from UAV: An Experiment over Small-Scale Eddies in the Coastal | black | Sea |
| Substitute Meta-Learning for | black | -Box Adversarial Attack |
| Substitute Model Generation for | black | -Box Adversarial Attack Based on Knowledge Distillation |
| Suitability of NASA's | black | Marble Daily Nighttime Lights for Population Studies at Varying Spatial and Temporal Scales |
| Suitability of Remote Sensing Images at Different Resolutions for Mapping of Gullies in the | black | Soil Region, Northeast China, The |
| SurFree: a fast surrogate-free | black | -box attack |
| Symbiotic | black | -Box Tracker |
| Tartaglia-Pascal triangle and Brownian motion in non-euclidean geometries: application to heat and | black | -Scholes equations |
| Terrestrial Laser Scanning And 3d Imaging: Heritage Case Study: The | black | Gate, Newcastle Upon Tyne |
| Testing Side-Scan Sonar and Multibeam Echosounder to Study | black | Coral Gardens: A Case Study from Macaronesia |
| Text-to-Image Models for Counterfactual Explanations: A | black | -Box Approach |
| Theft model-based | black | -box adversarial attack in embedding space |
| Toward Building a Data-Driven System For Detecting Mounting Actions of | black | Beef Cattle |
| Toward Visual Distortion in | black | -Box Attacks |
| Towards | black | -Box Explainability with Gaussian Discriminant Knowledge Distillation |
| Towards Query Efficient and Generalizable | black | -Box Face Reconstruction Attack |
| Training linear ranking SVMs in linearithmic time using red- | black | trees |
| True | black | -Box Explanation in Facial Analysis |
| Unboxing the | black | Box of Attention Mechanisms in Remote Sensing Big Data Using XAI |
| Uncertainty Estimation for | black | -Box Classification Models: A Use Case for Sentiment Analysis |
| Understanding the vulnerability of skeleton-based Human Activity Recognition via | black | -box attack |
| Underwater Acoustic Localization of the | black | Box Based on Generalized Second-Order Time Difference of Arrival (GSTDOA) |
| Universal | black | -Box Adversarial Patch Attack with Optimized Genetic Algorithm |
| Universal domain adaptation from multiple | black | -box sources |
| Universal Multi-View | black | -Box Attack Against Object Detectors via Layout Optimization |
| Universal Perturbation Generation for | black | -box Attack Using Evolutionary Algorithms |
| Unleash the | black | Magic in Age: A Multi-Task Deep Neural Network Approach for Cross-Age Face Verification |
| Unlocking the | black | Box: Concept-Based Modeling for Interpretable Affective Computing Applications |
| Unrestricted | black | -box Adversarial Attack Using GAN with Limited Queries |
| Unsupervised Segmentation for Transmission Imaging of Carbon | black | |
| Using Advanced InSAR Techniques and Machine Learning in Google Earth Engine (GEE) to Monitor Regional | black | Soil Erosion: A Case Study of Yanshou County, Heilongjiang Province, Northeastern China |
| Using Dual Spatial Clustering Models for Urban Fringe Areas Extraction Based on Night-time Light Data: Comparison of NPP/VIIRS, Luojia 1-01, and NASA's | black | Marble |
| Using Laser Altimetry-based Segmentation to Refine Automated Tree Identification in Managed Forests of the | black | Hills, South Dakota |
| Variabilities in PM2.5 and | black | Carbon Surface Concentrations Reproduced by Aerosol Optical Properties Estimated by In-Situ Data, Ground Based Remote Sensing and Modeling |
| Verriest Lecture: Visual properties of metameric | black | s beyond cone vision, The |
| Vertical Structures of Meteorological Elements and | black | Carbon at Mt. Tianshan Using an Unmanned Aerial Vehicle System |
| Vision Research Strategy: | black | Magic, Metaphors, Mechanisms, Miniworlds, and Maps |
| Visual explanation of | black | -box model: Similarity Difference and Uniqueness (SIDU) method |
| Visual Landmark Based 3D Road Course Estimation with | black | Box Variational Inference |
| Visualizing Color-wise Saliency of | black | -box Image Classification Models |
| Watermark Embedding for | black | -Box Channels |
| Where's the liability in the Generative Era? Recovery-based | black | -Box Detection of AI-Generated Content |
| Why Is It Important to Consider Dust Aerosol in the Sevastopol and | black | Sea Region during Remote Sensing Tasks? A Case Study |
| You See What I Want You to See: Exploring Targeted | black | -Box Transferability Attack for Hash-based Image Retrieval Systems |
345 for black