{"id":"https://openalex.org/W4414404630","doi":"https://doi.org/10.1109/tmm.2025.3613152","title":"Unrevealed Threats: Adversarial Robustness Analysis of Underwater Image Enhancement Models","display_name":"Unrevealed Threats: Adversarial Robustness Analysis of Underwater Image Enhancement Models","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4414404630","doi":"https://doi.org/10.1109/tmm.2025.3613152"},"language":"en","primary_location":{"id":"doi:10.1109/tmm.2025.3613152","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmm.2025.3613152","pdf_url":null,"source":{"id":"https://openalex.org/S137030581","display_name":"IEEE Transactions on Multimedia","issn_l":"1520-9210","issn":["1520-9210","1941-0077"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Multimedia","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089707083","display_name":"Siyu Zhai","orcid":null},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Siyu Zhai","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110924445","display_name":"Zhibo He","orcid":null},"institutions":[{"id":"https://openalex.org/I69356397","display_name":"Xi\u2019an Jiaotong-Liverpool University","ror":"https://ror.org/03zmrmn05","country_code":"CN","type":"education","lineage":["https://openalex.org/I69356397"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhibo He","raw_affiliation_strings":["Information Management and Information Systems, Xian Jiaotong Liverpool University, Suzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Information Management and Information Systems, Xian Jiaotong Liverpool University, Suzhou, China","institution_ids":["https://openalex.org/I69356397"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100688534","display_name":"Xiaofeng Cong","orcid":"https://orcid.org/0000-0001-8850-3507"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaofeng Cong","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0001-8850-3507","affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100725527","display_name":"Junming Hou","orcid":"https://orcid.org/0000-0002-5860-5665"},"institutions":[{"id":"https://openalex.org/I4391768253","display_name":"State Key Laboratory of Millimeter Waves","ror":"https://ror.org/02q1v5910","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391768253","https://openalex.org/I76569877"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junming Hou","raw_affiliation_strings":["State Key Laboratory of Millimeter Waves, School of Information Science and Engineering, Southeast University, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0002-5860-5665","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Millimeter Waves, School of Information Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877","https://openalex.org/I4391768253"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110740283","display_name":"Jie Gui","orcid":"https://orcid.org/0000-0002-9450-1759"},"institutions":[{"id":"https://openalex.org/I4210100356","display_name":"Ministry of Education","ror":"https://ror.org/018f7hf93","country_code":"CL","type":"government","lineage":["https://openalex.org/I4210100356"]},{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CL","CN"],"is_corresponding":false,"raw_author_name":"Jie Gui","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China","School of Cyber Science and Engineering, Southeast University; Engineering Research Center of Blockchain Application, Supervision And Management (Southeast University), Ministry of Education; Purple Mountain Laboratories, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0002-9450-1759","affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]},{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University; Engineering Research Center of Blockchain Application, Supervision And Management (Southeast University), Ministry of Education; Purple Mountain Laboratories, Nanjing, China","institution_ids":["https://openalex.org/I4210155350","https://openalex.org/I4210100356"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009075976","display_name":"Jian Wei You","orcid":"https://orcid.org/0000-0001-5761-9507"},"institutions":[{"id":"https://openalex.org/I4391768253","display_name":"State Key Laboratory of Millimeter Waves","ror":"https://ror.org/02q1v5910","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391768253","https://openalex.org/I76569877"]},{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Wei You","raw_affiliation_strings":["State Key Laboratory of Millimeter Waves, School of Information Science and Engineering, Southeast University, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0001-5761-9507","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Millimeter Waves, School of Information Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877","https://openalex.org/I4391768253"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088135162","display_name":"Xin Gong","orcid":"https://orcid.org/0000-0001-6883-5088"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Gong","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0001-6883-5088","affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070273088","display_name":"James T. Kwok","orcid":"https://orcid.org/0000-0002-4828-8248"},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"James Tin-Yau Kwok","raw_affiliation_strings":["Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong SAR, China","Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong, China"],"raw_orcid":"https://orcid.org/0000-0002-4828-8248","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong SAR, China","institution_ids":["https://openalex.org/I200769079"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Hong Kong, China","institution_ids":["https://openalex.org/I200769079"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085140523","display_name":"Yuan Yan Tang","orcid":"https://orcid.org/0000-0002-6887-130X"},"institutions":[{"id":"https://openalex.org/I204512498","display_name":"University of Macau","ror":"https://ror.org/01r4q9n85","country_code":"MO","type":"education","lineage":["https://openalex.org/I204512498"]}],"countries":["MO"],"is_corresponding":false,"raw_author_name":"Yuan Yan Tang","raw_affiliation_strings":["Department of Computer and Information Science, University of Macau, Macau, China"],"raw_orcid":"https://orcid.org/0000-0002-6887-130X","affiliations":[{"raw_affiliation_string":"Department of Computer and Information Science, University of Macau, Macau, China","institution_ids":["https://openalex.org/I204512498"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5089707083"],"corresponding_institution_ids":["https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12889151,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"27","issue":null,"first_page":"9532","last_page":"9541"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8865000009536743},{"id":"https://openalex.org/keywords/underwater","display_name":"Underwater","score":0.7322999835014343},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.7096999883651733},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5105999708175659},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.4422000050544739},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4366999864578247},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.40950000286102295}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8865000009536743},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7480000257492065},{"id":"https://openalex.org/C98083399","wikidata":"https://www.wikidata.org/wiki/Q3246517","display_name":"Underwater","level":2,"score":0.7322999835014343},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.7096999883651733},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5733000040054321},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5105999708175659},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.4422000050544739},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4366999864578247},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.40950000286102295},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.39100000262260437},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3718999922275543},{"id":"https://openalex.org/C33676613","wikidata":"https://www.wikidata.org/wiki/Q13415176","display_name":"Dimension (graph theory)","level":2,"score":0.34450000524520874},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.32330000400543213},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.32269999384880066},{"id":"https://openalex.org/C106430172","wikidata":"https://www.wikidata.org/wiki/Q6002272","display_name":"Image restoration","level":4,"score":0.3052999973297119},{"id":"https://openalex.org/C3017601658","wikidata":"https://www.wikidata.org/wiki/Q545981","display_name":"Image enhancement","level":3,"score":0.28679999709129333},{"id":"https://openalex.org/C2776429412","wikidata":"https://www.wikidata.org/wiki/Q4688011","display_name":"Aerial image","level":3,"score":0.2842999994754791},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.26170000433921814},{"id":"https://openalex.org/C75294576","wikidata":"https://www.wikidata.org/wiki/Q5165192","display_name":"Contextual image classification","level":3,"score":0.25949999690055847}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tmm.2025.3613152","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmm.2025.3613152","pdf_url":null,"source":{"id":"https://openalex.org/S137030581","display_name":"IEEE Transactions on Multimedia","issn_l":"1520-9210","issn":["1520-9210","1941-0077"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Multimedia","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3070022028","display_name":null,"funder_award_id":"62172090","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":50,"referenced_works":["https://openalex.org/W2133665775","https://openalex.org/W2243397390","https://openalex.org/W2603766943","https://openalex.org/W2744216855","https://openalex.org/W2769949067","https://openalex.org/W2890457524","https://openalex.org/W2963857521","https://openalex.org/W2964082701","https://openalex.org/W2974383094","https://openalex.org/W2985987886","https://openalex.org/W2990176100","https://openalex.org/W3006777311","https://openalex.org/W3035731588","https://openalex.org/W3127326842","https://openalex.org/W3134649899","https://openalex.org/W3171662571","https://openalex.org/W3198711216","https://openalex.org/W3203221304","https://openalex.org/W3204887334","https://openalex.org/W4213166222","https://openalex.org/W4220767255","https://openalex.org/W4226245048","https://openalex.org/W4285102172","https://openalex.org/W4285228564","https://openalex.org/W4285601497","https://openalex.org/W4285821234","https://openalex.org/W4296128870","https://openalex.org/W4307040579","https://openalex.org/W4313022653","https://openalex.org/W4322746704","https://openalex.org/W4380880261","https://openalex.org/W4381198963","https://openalex.org/W4383752898","https://openalex.org/W4385539485","https://openalex.org/W4386057757","https://openalex.org/W4386065769","https://openalex.org/W4386272912","https://openalex.org/W4388192825","https://openalex.org/W4388571559","https://openalex.org/W4388692378","https://openalex.org/W4391248671","https://openalex.org/W4391520444","https://openalex.org/W4392251911","https://openalex.org/W4392309355","https://openalex.org/W4392399455","https://openalex.org/W4392694051","https://openalex.org/W4393149751","https://openalex.org/W4399169033","https://openalex.org/W4403294202","https://openalex.org/W4403678707"],"related_works":[],"abstract_inverted_index":{"Learning-based":[0],"methods":[1],"for":[2],"underwater":[3,83,96,107],"image":[4,84,108],"enhancement":[5],"(UWIE)":[6],"have":[7],"undergone":[8],"extensive":[9],"exploration.":[10],"However,":[11],"learning-based":[12],"models":[13,47,79,139,160,173,191],"are":[14,48,155],"usually":[15],"vulnerable":[16],"to":[17,71,145],"adversarial":[18,38,54,63,73,121,146,169,180,187],"examples":[19],"so":[20],"as":[21],"the":[22,26,37,51,88,95,111,177,186],"UWIE":[23,41,46,78,159,190,199],"models.":[24,200],"To":[25],"best":[27],"of":[28,40,53,92,113,143,157,179,189,198],"our":[29],"knowledge,":[30],"there":[31,98],"is":[32],"no":[33],"comprehensive":[34],"study":[35],"on":[36,75,80,152,171],"robustness":[39],"models,":[42],"which":[43],"indicates":[44],"that":[45,137],"potentially":[49],"under":[50],"threat":[52],"attacks.":[55,181],"In":[56,165,182],"this":[57],"paper,":[58],"we":[59,115,167,184],"propose":[60,193],"a":[61,68,100,194],"general":[62],"attack":[64,122],"protocol.":[65],"We":[66],"make":[67],"first":[69],"attempt":[70],"conduct":[72,168],"attacks":[74,147],"five":[76,138],"well-designed":[77,149],"three":[81],"common":[82],"benchmark":[85],"datasets.":[86],"Considering":[87],"scattering":[89],"and":[90,106,126,148,174,192],"absorption":[91],"light":[93],"in":[94],"environment,":[97],"exists":[99],"strong":[101],"correlation":[102],"between":[103],"color":[104,132],"correction":[105],"enhancement.":[109],"On":[110],"basis":[112],"that,":[114],"also":[116],"design":[117],"two":[118],"effective":[119],"UWIE-oriented":[120],"methods,":[123],"Pixel":[124],"Attack":[125,129],"Color":[127],"Shift":[128],"targeting":[130],"different":[131],"spaces.":[133],"The":[134],"results":[135],"show":[136],"exhibit":[140],"varying":[141],"degrees":[142],"vulnerability":[144,188],"small":[150],"perturbations":[151],"degraded":[153],"images":[154],"capable":[156],"preventing":[158],"from":[161],"generating":[162],"enhanced":[163],"results.":[164],"addition,":[166],"training":[170],"these":[172],"successfully":[175],"mitigated":[176],"effectiveness":[178],"summary,":[183],"reveal":[185],"new":[195],"evaluation":[196],"dimension":[197]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
