Fooling the Image Dehazing Models by First Order Gradient
The research on the single image dehazing task has been widely explored. However, as far as we know, no comprehensive study has been conducted on the robustness of the well-trained dehazing models. Therefore, there is no evidence that the dehazing networks can resist malicious attacks. In this paper...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on circuits and systems for video technology 2024-07, Vol.34 (7), p.6265-6278 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 6278 |
---|---|
container_issue | 7 |
container_start_page | 6265 |
container_title | IEEE transactions on circuits and systems for video technology |
container_volume | 34 |
creator | Gui, Jie Cong, Xiaofeng Peng, Chengwei Tang, Yuan Yan Kwok, James Tin-Yau |
description | The research on the single image dehazing task has been widely explored. However, as far as we know, no comprehensive study has been conducted on the robustness of the well-trained dehazing models. Therefore, there is no evidence that the dehazing networks can resist malicious attacks. In this paper, we focus on designing a group of attack methods based on first order gradient to verify the robustness of the existing dehazing algorithms. By analyzing the general purpose of image dehazing task, four attack methods are proposed, which are predicted dehazed image attack, hazy layer mask attack, haze-free image attack and haze-preserved attack. The corresponding experiments are conducted on six datasets with different scales. Further, the defense strategy based on adversarial training is adopted for reducing the negative effects caused by malicious attacks. In summary, this paper defines a new challenging problem for the image dehazing area, which can be called as adversarial attack on dehazing networks (AADN). Code is available at https://github.com/Xiaofeng-life/AADN_Dehazing . |
doi_str_mv | 10.1109/TCSVT.2024.3357987 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_10414993</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10414993</ieee_id><sourcerecordid>3075426585</sourcerecordid><originalsourceid>FETCH-LOGICAL-c247t-744684f90522df402084501c42ac9b7c20c7609081faf85adcd99f77c0c65e933</originalsourceid><addsrcrecordid>eNpNkMFOAjEQhhujiYi-gPHQxPPitNtu26NBF0kwHESvTelOYQmw2C4HfHoX4eBpJpP_mz_5CLlnMGAMzNNs-PE1G3DgYpDnUhmtLkiPSakzzkFedjtIlmnO5DW5SWkFwIQWqkdM2TTrerug7RLpeOMWSF9w6X6Op_emwnWi8wMt65haOo0VRjqKrqpx296Sq-DWCe_Os08-y9fZ8C2bTEfj4fMk81yoNlNCFFoEA5LzKgjgoIUE5gV33syV5-BVAQY0Cy5o6SpfGROU8uALiSbP--Tx9HcXm-89ptaumn3cdpU2ByUFL6SWXYqfUj42KUUMdhfrjYsHy8AeFdk_RfaoyJ4VddDDCaoR8R8gmDBd8y8wx2Bb</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3075426585</pqid></control><display><type>article</type><title>Fooling the Image Dehazing Models by First Order Gradient</title><source>IEEE Electronic Library (IEL)</source><creator>Gui, Jie ; Cong, Xiaofeng ; Peng, Chengwei ; Tang, Yuan Yan ; Kwok, James Tin-Yau</creator><creatorcontrib>Gui, Jie ; Cong, Xiaofeng ; Peng, Chengwei ; Tang, Yuan Yan ; Kwok, James Tin-Yau</creatorcontrib><description>The research on the single image dehazing task has been widely explored. However, as far as we know, no comprehensive study has been conducted on the robustness of the well-trained dehazing models. Therefore, there is no evidence that the dehazing networks can resist malicious attacks. In this paper, we focus on designing a group of attack methods based on first order gradient to verify the robustness of the existing dehazing algorithms. By analyzing the general purpose of image dehazing task, four attack methods are proposed, which are predicted dehazed image attack, hazy layer mask attack, haze-free image attack and haze-preserved attack. The corresponding experiments are conducted on six datasets with different scales. Further, the defense strategy based on adversarial training is adopted for reducing the negative effects caused by malicious attacks. In summary, this paper defines a new challenging problem for the image dehazing area, which can be called as adversarial attack on dehazing networks (AADN). Code is available at https://github.com/Xiaofeng-life/AADN_Dehazing .</description><identifier>ISSN: 1051-8215</identifier><identifier>EISSN: 1558-2205</identifier><identifier>DOI: 10.1109/TCSVT.2024.3357987</identifier><identifier>CODEN: ITCTEM</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>adversarial attack and defense ; Algorithms ; Effectiveness ; first order gradient ; Glass box ; Haze ; Image dehazing ; Image restoration ; Perturbation methods ; Robustness ; security ; Superresolution ; Task analysis ; Training</subject><ispartof>IEEE transactions on circuits and systems for video technology, 2024-07, Vol.34 (7), p.6265-6278</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c247t-744684f90522df402084501c42ac9b7c20c7609081faf85adcd99f77c0c65e933</cites><orcidid>0000-0001-8850-3507 ; 0000-0002-9450-1759 ; 0000-0002-4828-8248 ; 0000-0002-8270-6132 ; 0000-0002-6887-130X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10414993$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10414993$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Gui, Jie</creatorcontrib><creatorcontrib>Cong, Xiaofeng</creatorcontrib><creatorcontrib>Peng, Chengwei</creatorcontrib><creatorcontrib>Tang, Yuan Yan</creatorcontrib><creatorcontrib>Kwok, James Tin-Yau</creatorcontrib><title>Fooling the Image Dehazing Models by First Order Gradient</title><title>IEEE transactions on circuits and systems for video technology</title><addtitle>TCSVT</addtitle><description>The research on the single image dehazing task has been widely explored. However, as far as we know, no comprehensive study has been conducted on the robustness of the well-trained dehazing models. Therefore, there is no evidence that the dehazing networks can resist malicious attacks. In this paper, we focus on designing a group of attack methods based on first order gradient to verify the robustness of the existing dehazing algorithms. By analyzing the general purpose of image dehazing task, four attack methods are proposed, which are predicted dehazed image attack, hazy layer mask attack, haze-free image attack and haze-preserved attack. The corresponding experiments are conducted on six datasets with different scales. Further, the defense strategy based on adversarial training is adopted for reducing the negative effects caused by malicious attacks. In summary, this paper defines a new challenging problem for the image dehazing area, which can be called as adversarial attack on dehazing networks (AADN). Code is available at https://github.com/Xiaofeng-life/AADN_Dehazing .</description><subject>adversarial attack and defense</subject><subject>Algorithms</subject><subject>Effectiveness</subject><subject>first order gradient</subject><subject>Glass box</subject><subject>Haze</subject><subject>Image dehazing</subject><subject>Image restoration</subject><subject>Perturbation methods</subject><subject>Robustness</subject><subject>security</subject><subject>Superresolution</subject><subject>Task analysis</subject><subject>Training</subject><issn>1051-8215</issn><issn>1558-2205</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkMFOAjEQhhujiYi-gPHQxPPitNtu26NBF0kwHESvTelOYQmw2C4HfHoX4eBpJpP_mz_5CLlnMGAMzNNs-PE1G3DgYpDnUhmtLkiPSakzzkFedjtIlmnO5DW5SWkFwIQWqkdM2TTrerug7RLpeOMWSF9w6X6Op_emwnWi8wMt65haOo0VRjqKrqpx296Sq-DWCe_Os08-y9fZ8C2bTEfj4fMk81yoNlNCFFoEA5LzKgjgoIUE5gV33syV5-BVAQY0Cy5o6SpfGROU8uALiSbP--Tx9HcXm-89ptaumn3cdpU2ByUFL6SWXYqfUj42KUUMdhfrjYsHy8AeFdk_RfaoyJ4VddDDCaoR8R8gmDBd8y8wx2Bb</recordid><startdate>20240701</startdate><enddate>20240701</enddate><creator>Gui, Jie</creator><creator>Cong, Xiaofeng</creator><creator>Peng, Chengwei</creator><creator>Tang, Yuan Yan</creator><creator>Kwok, James Tin-Yau</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0001-8850-3507</orcidid><orcidid>https://orcid.org/0000-0002-9450-1759</orcidid><orcidid>https://orcid.org/0000-0002-4828-8248</orcidid><orcidid>https://orcid.org/0000-0002-8270-6132</orcidid><orcidid>https://orcid.org/0000-0002-6887-130X</orcidid></search><sort><creationdate>20240701</creationdate><title>Fooling the Image Dehazing Models by First Order Gradient</title><author>Gui, Jie ; Cong, Xiaofeng ; Peng, Chengwei ; Tang, Yuan Yan ; Kwok, James Tin-Yau</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c247t-744684f90522df402084501c42ac9b7c20c7609081faf85adcd99f77c0c65e933</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>adversarial attack and defense</topic><topic>Algorithms</topic><topic>Effectiveness</topic><topic>first order gradient</topic><topic>Glass box</topic><topic>Haze</topic><topic>Image dehazing</topic><topic>Image restoration</topic><topic>Perturbation methods</topic><topic>Robustness</topic><topic>security</topic><topic>Superresolution</topic><topic>Task analysis</topic><topic>Training</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Gui, Jie</creatorcontrib><creatorcontrib>Cong, Xiaofeng</creatorcontrib><creatorcontrib>Peng, Chengwei</creatorcontrib><creatorcontrib>Tang, Yuan Yan</creatorcontrib><creatorcontrib>Kwok, James Tin-Yau</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on circuits and systems for video technology</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Gui, Jie</au><au>Cong, Xiaofeng</au><au>Peng, Chengwei</au><au>Tang, Yuan Yan</au><au>Kwok, James Tin-Yau</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Fooling the Image Dehazing Models by First Order Gradient</atitle><jtitle>IEEE transactions on circuits and systems for video technology</jtitle><stitle>TCSVT</stitle><date>2024-07-01</date><risdate>2024</risdate><volume>34</volume><issue>7</issue><spage>6265</spage><epage>6278</epage><pages>6265-6278</pages><issn>1051-8215</issn><eissn>1558-2205</eissn><coden>ITCTEM</coden><abstract>The research on the single image dehazing task has been widely explored. However, as far as we know, no comprehensive study has been conducted on the robustness of the well-trained dehazing models. Therefore, there is no evidence that the dehazing networks can resist malicious attacks. In this paper, we focus on designing a group of attack methods based on first order gradient to verify the robustness of the existing dehazing algorithms. By analyzing the general purpose of image dehazing task, four attack methods are proposed, which are predicted dehazed image attack, hazy layer mask attack, haze-free image attack and haze-preserved attack. The corresponding experiments are conducted on six datasets with different scales. Further, the defense strategy based on adversarial training is adopted for reducing the negative effects caused by malicious attacks. In summary, this paper defines a new challenging problem for the image dehazing area, which can be called as adversarial attack on dehazing networks (AADN). Code is available at https://github.com/Xiaofeng-life/AADN_Dehazing .</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TCSVT.2024.3357987</doi><tpages>14</tpages><orcidid>https://orcid.org/0000-0001-8850-3507</orcidid><orcidid>https://orcid.org/0000-0002-9450-1759</orcidid><orcidid>https://orcid.org/0000-0002-4828-8248</orcidid><orcidid>https://orcid.org/0000-0002-8270-6132</orcidid><orcidid>https://orcid.org/0000-0002-6887-130X</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1051-8215 |
ispartof | IEEE transactions on circuits and systems for video technology, 2024-07, Vol.34 (7), p.6265-6278 |
issn | 1051-8215 1558-2205 |
language | eng |
recordid | cdi_ieee_primary_10414993 |
source | IEEE Electronic Library (IEL) |
subjects | adversarial attack and defense Algorithms Effectiveness first order gradient Glass box Haze Image dehazing Image restoration Perturbation methods Robustness security Superresolution Task analysis Training |
title | Fooling the Image Dehazing Models by First Order Gradient |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-09T04%3A24%3A00IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Fooling%20the%20Image%20Dehazing%20Models%20by%20First%20Order%20Gradient&rft.jtitle=IEEE%20transactions%20on%20circuits%20and%20systems%20for%20video%20technology&rft.au=Gui,%20Jie&rft.date=2024-07-01&rft.volume=34&rft.issue=7&rft.spage=6265&rft.epage=6278&rft.pages=6265-6278&rft.issn=1051-8215&rft.eissn=1558-2205&rft.coden=ITCTEM&rft_id=info:doi/10.1109/TCSVT.2024.3357987&rft_dat=%3Cproquest_RIE%3E3075426585%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3075426585&rft_id=info:pmid/&rft_ieee_id=10414993&rfr_iscdi=true |