2018 24th International Conference on Pattern Recognition (ICPR) 2018
DOI: 10.1109/icpr.2018.8545522
|View full text |Cite
|
Sign up to set email alerts
|

CANDY: Conditional Adversarial Networks based End-to-End System for Single Image Haze Removal

Abstract: Single image haze removal is a very challenging and ill-posed problem. The existing haze removal methods in literature, including the recently introduced deep learning methods, model the problem of haze removal as that of estimating intermediate parameters, viz., scene transmission map and atmospheric light. These are used to compute the haze-free image from the hazy input image. Such an approach only focuses on accurate estimation of intermediate parameters, while the aesthetic quality of the haze-free image … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(15 citation statements)
references
References 41 publications
0
15
0
Order By: Relevance
“…Isola et al [20] completed the style transformation of paired images through the conditional generation antagonism network (CGAN) [20]. GANs [7] are also often used in dehazing [21,22]. Visual Geometry Group Network (VGG) features was introduced by Li et al [23,24] introduced, and the L1-regularized gradient of CGAN [20] was used for image dehazing.…”
Section: Related Workmentioning
confidence: 99%
“…Isola et al [20] completed the style transformation of paired images through the conditional generation antagonism network (CGAN) [20]. GANs [7] are also often used in dehazing [21,22]. Visual Geometry Group Network (VGG) features was introduced by Li et al [23,24] introduced, and the L1-regularized gradient of CGAN [20] was used for image dehazing.…”
Section: Related Workmentioning
confidence: 99%
“…• Gradient Sign-based Adversarial AƩacks [28,25,43] • OpƟmizaƟon-based Adversarial aƩacks [6,54] • Backdooring AƩacks [15] • Pruning-based Defenses [15] • Preprocessing-based Defenses [26,27,3,55] • GAN-based Defenses [52,9,63,67] • Methodology for Building Resilient Hardware [18] • Error-Resilience Analysis [18,17] • Fault-Aware Pruning (FAP) [66] • Fault-Aware Pruning + Training (FAP+T) [66] • Timing Error-Drop (TE-Drop) [64] • StaƟc Voltage Underscaling (ThVolt-StaƟc) [64] • Per-layer Voltage Underscaling (ThVolt-Dynamic) [64] Fig . 3 Overview of the works discussed in this chapter for addressing reliability and security vulnerabilities of deep learning-based systems 3.…”
Section: Reliability Securitymentioning
confidence: 99%
“…depth information or known 3D model of the scene. Single image dehazing approaches are divided into prior information-based methods [3,5,12,16,20,32] and learning based methods [10,24,30,34,35]. Prior information-based methods are mainly based on the parameter estimation of atmospheric scattering model by utilizing the priors, such as dark channel priors [16], color attenuation prior [38], haze-line prior [8,9].…”
Section: Introductionmentioning
confidence: 99%
“…Even though most of the deep learning approaches use the estimation of intermediate parameters, e.g. transmis-sion map and atmospheric light [10,24], there are also other approaches based on generative adversarial networks (GANs), which build a model without benefiting from these intermediate parameters [30].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation