{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T10:26:50Z","timestamp":1761388010961,"version":"build-2065373602"},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T00:00:00Z","timestamp":1755734400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T00:00:00Z","timestamp":1755734400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2022MF260"],"award-info":[{"award-number":["ZR2022MF260"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62376285"],"award-info":[{"award-number":["62376285"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2021YFA1000102"],"award-info":[{"award-number":["2021YFA1000102"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s00530-025-01971-7","type":"journal-article","created":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T12:46:39Z","timestamp":1755780399000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["DiffRA: universal restorative adversarial attack based on diffusion model"],"prefix":"10.1007","volume":"31","author":[{"given":"Mingwen","family":"Shao","sequence":"first","affiliation":[]},{"given":"Wenjie","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Lingzhuang","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Huan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xiaodong","family":"Tan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,21]]},"reference":[{"issue":"4","key":"1971_CR1","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/s00530-024-01407-8","volume":"30","author":"H Cai","year":"2024","unstructured":"Cai, H., Lin, H., Liu, D.: Traffictrack: rethinking the motion and appearance cue for multi-vehicle tracking in traffic monitoring. Multimedia Syst. 30(4), 216 (2024)","journal-title":"Multimedia Syst."},{"key":"1971_CR2","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.: Towards evaluating the robustness of neural networks. In: 2017 IEEE Symposium on Security and Privacy (SP), pp 39\u201357 (2017)","DOI":"10.1109\/SP.2017.49"},{"key":"1971_CR3","unstructured":"Chen, H., Dong, Y., Wang, Z., et al.: Robust classification via a single diffusion model. arXiv preprint arXiv:2305.15241 (2023)"},{"issue":"2","key":"1971_CR4","doi-asserted-by":"publisher","first-page":"961","DOI":"10.1109\/TPAMI.2024.3480519","volume":"47","author":"J Chen","year":"2025","unstructured":"Chen, J., Chen, H., Chen, K., et al.: Diffusion models for imperceptible and transferable adversarial attack. IEEE Trans. Pattern Anal. Mach. Intell. 47(2), 961\u2013977 (2025)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"1971_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2021.102340","volume":"77","author":"W Chen","year":"2022","unstructured":"Chen, W., Yu, S., Ma, K., et al.: Tw-gan: Topology and width aware gan for retinal artery\/vein classification. Med. Image Anal. 77, 102340 (2022)","journal-title":"Med. Image Anal."},{"key":"1971_CR6","doi-asserted-by":"crossref","unstructured":"Chen, Z., Li, B., Wu, S., et al.: Shape matters: deformable patch attack. In: European Conference on Computer Vision, pp 529\u2013548 (2022)","DOI":"10.1007\/978-3-031-19772-7_31"},{"key":"1971_CR7","first-page":"93","volume":"2024","author":"X Dai","year":"2024","unstructured":"Dai, X., Liang, K., Xiao, B.: Advdiff: Generating unrestricted adversarial examples using diffusion models. Comput. Vision. ECCV. 2024, 93\u2013109 (2024)","journal-title":"Comput. Vision. ECCV."},{"key":"1971_CR8","first-page":"8780","volume":"34","author":"P Dhariwal","year":"2021","unstructured":"Dhariwal, P., Nichol, A.: Diffusion models beat gans on image synthesis. Adv. Neural. Inf. Process. Syst. 34, 8780\u20138794 (2021)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"1971_CR9","doi-asserted-by":"crossref","unstructured":"Dong, Y., Liao, F., Pang, T., et al.: Boosting adversarial attacks with momentum. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp 9185\u20139193 (2018)","DOI":"10.1109\/CVPR.2018.00957"},{"key":"1971_CR10","doi-asserted-by":"crossref","unstructured":"Dong, Y., Pang, T., Su, H., et al.: Evading defenses to transferable adversarial examples by translation-invariant attacks. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp 4312\u20134321 (2019)","DOI":"10.1109\/CVPR.2019.00444"},{"key":"1971_CR11","doi-asserted-by":"crossref","unstructured":"Duan, R., Ma, X., Wang, Y., et al.: Adversarial camouflage: Hiding physical-world attacks with natural styles. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 1000\u20131008 (2020)","DOI":"10.1109\/CVPR42600.2020.00108"},{"key":"1971_CR12","doi-asserted-by":"crossref","unstructured":"Duan, R., Mao, X., Qin, A. K., et al.: Adversarial laser beam: Effective physical-world attack to dnns in a blink. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp 16057\u201316066 (2021)","DOI":"10.1109\/CVPR46437.2021.01580"},{"key":"1971_CR13","doi-asserted-by":"crossref","unstructured":"Eykholt, K., Evtimov, I., Fernandes, E., et al.: Robust physical-world attacks on deep learning visual classification. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp 1625\u20131634 (2018)","DOI":"10.1109\/CVPR.2018.00175"},{"issue":"7953","key":"1971_CR14","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1038\/s41586-023-05732-2","volume":"615","author":"S Feng","year":"2023","unstructured":"Feng, S., Sun, H., Yan, X., et al.: Dense reinforcement learning for safety validation of autonomous vehicles. Nature 615(7953), 620\u2013627 (2023)","journal-title":"Nature"},{"key":"1971_CR15","unstructured":"Gao, R., Guo, Q., Juefei-Xu, F., et al.: Advhaze: Adversarial haze attack. arXiv preprint arXiv:2104.13673 (2021)"},{"key":"1971_CR16","doi-asserted-by":"crossref","unstructured":"Ge, Z., Shang, F., Liu, H., et al.: Improving the transferability of adversarial examples with arbitrary style transfer. In: Proceedings of the 31st ACM International Conference on Multimedia, pp 4440\u20134449 (2023)","DOI":"10.1145\/3581783.3612070"},{"key":"1971_CR17","unstructured":"Goodfellow, I. J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. In: Bengio, Y., LeCun, Y. (eds) 3rd International Conference on Learning Representations (2015)"},{"key":"1971_CR18","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., et\u00a0al.: Deep residual learning for image recognition. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"1971_CR19","doi-asserted-by":"crossref","unstructured":"Hingun, N., Sitawarin, C., Li, J., et al.: Reap: A large-scale realistic adversarial patch benchmark. In IEEE\/CVF Conference on Computer Vision and Pattern Recognition pp 4640\u20134651 (2023)","DOI":"10.1109\/ICCV51070.2023.00428"},{"issue":"5","key":"1971_CR20","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/s00530-024-01506-6","volume":"30","author":"J Jiang","year":"2024","unstructured":"Jiang, J., Zhai, H., Yang, Y., et al.: Multi-focus image fusion method based on adaptive weighting and interactive information modulation. Multimedia Syst. 30(5), 290 (2024)","journal-title":"Multimedia Syst."},{"key":"1971_CR21","doi-asserted-by":"crossref","unstructured":"Kurakin, A., Goodfellow, I., Bengio, S., et al.: Adversarial attacks and defences competition. Advances in Neural Information Processing Systems pp 195\u2013231 (2018)","DOI":"10.1007\/978-3-319-94042-7_11"},{"key":"1971_CR22","doi-asserted-by":"crossref","unstructured":"Kurakin, A., Goodfellow, I. J., Bengio, S.: Adversarial examples in the physical world. In: Artificial Intelligence Safety and Security, pp 99\u2013112 (2018)","DOI":"10.1201\/9781351251389-8"},{"key":"1971_CR23","first-page":"52323","volume":"37","author":"J Li","year":"2024","unstructured":"Li, J., He, Z., Luo, A., et al.: Advad: Exploring non-parametric diffusion for imperceptible adversarial attacks. Adv. Neural. Inf. Process. Syst. 37, 52323\u201352353 (2024)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"issue":"2","key":"1971_CR24","doi-asserted-by":"publisher","first-page":"674","DOI":"10.1109\/TMI.2023.3317088","volume":"43","author":"Y Ling","year":"2024","unstructured":"Ling, Y., Wang, Y., Dai, W., et al.: Mtanet: Multi-task attention network for automatic medical image segmentation and classification. IEEE Trans. Med. Imaging 43(2), 674\u2013685 (2024). https:\/\/doi.org\/10.1109\/TMI.2023.3317088","journal-title":"IEEE Trans. Med. Imaging"},{"key":"1971_CR25","unstructured":"Liu Jy, Lu, B., Xiong, M., et al.: Adversarial attack with raindrops. arXiv preprint arXiv:2302.14267 (2023)"},{"key":"1971_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.106594","volume":"124","author":"Z Lou","year":"2023","unstructured":"Lou, Z., Cao, G., Lin, M.: Black-box attack against gan-generated image detector with contrastive perturbation. Eng. Appl. Artif. Intell. 124, 106594 (2023)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"1971_CR27","unstructured":"Luo, Z., Gustafsson, F.K., Zhao, Z., et\u00a0al.: Image restoration with mean-reverting stochastic differential equations. In: International Conference on Machine Learning, ICML 2023, 23\u201329 July 2023, pp. 23045\u201323066. Honolulu, Hawaii, USA. PMLR (2023)"},{"key":"1971_CR28","doi-asserted-by":"crossref","unstructured":"Luo, Z., Gustafsson, F. K., Zhao, Z., et\u00a0al.: Refusion: Enabling large-size realistic image restoration with latent-space diffusion models. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2023 - Workshops, Vancouver, BC, Canada, June 17-24, 2023. IEEE, pp 1680\u20131691 (2023)","DOI":"10.1109\/CVPRW59228.2023.00169"},{"key":"1971_CR29","unstructured":"Madry, A., Makelov, A., Schmidt, L., et\u00a0al.: Towards deep learning models resistant to adversarial attacks. In: 6th International Conference on Learning Representations, ICLR 2018, Vancouver, BC, Canada, April 30 - May 3, 2018, Conference Track Proceedings. OpenReview.net (2018)"},{"issue":"3","key":"1971_CR30","doi-asserted-by":"publisher","first-page":"1544","DOI":"10.1109\/TR.2024.3369865","volume":"73","author":"L Meng","year":"2024","unstructured":"Meng, L., Shao, M., Wang, F., et al.: Advancing few-shot black-box attack with alternating training. IEEE Trans. Reliab. 73(3), 1544\u20131558 (2024). https:\/\/doi.org\/10.1109\/TR.2024.3369865","journal-title":"IEEE Trans. Reliab."},{"key":"1971_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.125665","volume":"262","author":"Y Ouyang","year":"2025","unstructured":"Ouyang, Y., Zhai, H., Hu, H., et al.: Fusiongcn: Multi-focus image fusion using superpixel features generation gcn and pixel-level feature reconstruction cnn. Expert Syst. Appl. 262, 125665 (2025)","journal-title":"Expert Syst. Appl."},{"key":"1971_CR32","doi-asserted-by":"crossref","unstructured":"Pomponi, J., Scardapane, S., Uncini, A.: Pixle: a fast and effective black-box attack based on rearranging pixels. In: 2022 International Joint Conference on Neural Networks (IJCNN), IEEE, pp 1\u20137 (2022)","DOI":"10.1109\/IJCNN55064.2022.9892966"},{"key":"1971_CR33","unstructured":"Ren, S., He, K., Girshick, R., et\u00a0al.: Faster R-CNN: towards real-time object detection with region proposal networks. Adv. Neural Inf. Process Syst. 28 (2015)"},{"key":"1971_CR34","doi-asserted-by":"crossref","unstructured":"Rombach, R., Blattmann, A., Lorenz, D., et\u00a0al.: High-resolution image synthesis with latent diffusion models. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 10684\u201310695 (2022)","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"1971_CR35","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11263-015-0816-y","volume":"115","author":"O Russakovsky","year":"2015","unstructured":"Russakovsky, O., Deng, J., Su, H., et al.: Imagenet large scale visual recognition challenge. Int. J. Comput. Vision 115, 211\u2013252 (2015)","journal-title":"Int. J. Comput. Vision"},{"key":"1971_CR36","doi-asserted-by":"crossref","unstructured":"Saharia, C., Chan, W., Chang, H., et al.: Palette: Image-to-image diffusion models. In: ACM SIGGRAPH 2022 conference proceedings, pp 1\u201310 (2022)","DOI":"10.1145\/3528233.3530757"},{"key":"1971_CR37","doi-asserted-by":"crossref","unstructured":"Sandler, M., Howard, A., Zhu, M., et al.: Mobilenetv2: Inverted residuals and linear bottlenecks. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp 4510\u20134520 (2018)","DOI":"10.1109\/CVPR.2018.00474"},{"issue":"17","key":"1971_CR38","doi-asserted-by":"publisher","first-page":"19843","DOI":"10.1007\/s10489-023-04532-5","volume":"53","author":"L Schwinn","year":"2023","unstructured":"Schwinn, L., Raab, R., Nguyen, A., et al.: Exploring misclassifications of robust neural networks to enhance adversarial attacks. Appl. Intell. 53(17), 19843\u201319859 (2023)","journal-title":"Appl. Intell."},{"key":"1971_CR39","unstructured":"Shamsabadi, A. S., S\u00e1nchez-Matilla, R., Cavallaro, A.: Colorfool: Semantic adversarial colorization. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp 1148\u20131157 (2020)"},{"key":"1971_CR40","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. In: Bengio, Y., LeCun, Y. (eds) 3rd International Conference on Learning Representations (2015)"},{"key":"1971_CR41","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/j.neunet.2012.02.016","volume":"32","author":"J Stallkamp","year":"2012","unstructured":"Stallkamp, J., Schlipsing, M., Salmen, J., et al.: Man vs. computer: Benchmarking machine learning algorithms for traffic sign recognition. Neural Netw. 32, 323\u2013332 (2012)","journal-title":"Neural Netw."},{"issue":"5","key":"1971_CR42","doi-asserted-by":"publisher","first-page":"828","DOI":"10.1109\/TEVC.2019.2890858","volume":"23","author":"J Su","year":"2019","unstructured":"Su, J., Vargas, D.V., Sakurai, K.: One pixel attack for fooling deep neural networks. IEEE Trans. Evol. Comput. 23(5), 828\u2013841 (2019)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"1971_CR43","unstructured":"Szegedy, C., Zaremba, W., Sutskever, I., et\u00a0al.: Intriguing properties of neural networks. In: Bengio, Y., LeCun, Y. (eds) 2nd International Conference on Learning Representations (2014)"},{"key":"1971_CR44","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Vanhoucke, V., Ioffe, S., et\u00a0al.: Rethinking the inception architecture for computer vision. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp 2818\u20132826 (2016)","DOI":"10.1109\/CVPR.2016.308"},{"key":"1971_CR45","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Ioffe, S., Vanhoucke, V., et\u00a0al.: Inception-v4, inception-resnet and the impact of residual connections on learning. In: Proceedings of the AAAI Conference on Artificial Intelligence, pp 4278\u20134284 (2017)","DOI":"10.1609\/aaai.v31i1.11231"},{"key":"1971_CR46","unstructured":"Tram\u00e8r, F., Kurakin, A., Papernot, N., et\u00a0al.: Ensemble adversarial training: Attacks and defenses. In: 6th International Conference on Learning Representations (2018)"},{"key":"1971_CR47","unstructured":"Vasluianu, F. A., Seizinger, T., Timofte, R., et\u00a0al.: Ntire 2023 image shadow removal challenge report. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp 1788\u20131807 (2023)"},{"key":"1971_CR48","doi-asserted-by":"crossref","unstructured":"Wang, D., Yao, W., Jiang, T., et al.: RFLA: A stealthy reflected light adversarial attack in the physical world. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp 4455\u20134465 (2023)","DOI":"10.1109\/ICCV51070.2023.00411"},{"key":"1971_CR49","doi-asserted-by":"crossref","unstructured":"Wang, X., He, K.: Enhancing the transferability of adversarial attacks through variance tuning. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 1924\u20131933 (2021)","DOI":"10.1109\/CVPR46437.2021.00196"},{"key":"1971_CR50","doi-asserted-by":"crossref","unstructured":"Xia, B., Hang, Y., Tian, Y., et al.: Efficient non-local contrastive attention for image super-resolution. In: Proceedings of the AAAI conference on artificial intelligence, pp 2759\u20132767 (2022)","DOI":"10.1609\/aaai.v36i3.20179"},{"key":"1971_CR51","doi-asserted-by":"crossref","unstructured":"Xia, B., Zhang, Y., Wang, S., et al.: DiffIR: Efficient diffusion model for image restoration. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp 13095\u201313105 (2023)","DOI":"10.1109\/ICCV51070.2023.01204"},{"key":"1971_CR52","doi-asserted-by":"crossref","unstructured":"Xie, C., Zhang, Z., Zhou, Y., et al.: Improving transferability of adversarial examples with input diversity. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp 2730\u20132739 (2019)","DOI":"10.1109\/CVPR.2019.00284"},{"key":"1971_CR53","doi-asserted-by":"crossref","unstructured":"Xu, K., Zhang, G., Liu, S., et al.: Adversarial t-shirt! evading person detectors in a physical world. In: European Conference on Computer Vision, pp 665\u2013681 (2020)","DOI":"10.1007\/978-3-030-58558-7_39"},{"key":"1971_CR54","first-page":"2894","volume":"36","author":"H Xue","year":"2023","unstructured":"Xue, H., Araujo, A., Hu, B., et al.: Diffusion-based adversarial sample generation for improved stealthiness and controllability. Adv. Neural. Inf. Process. Syst. 36, 2894\u20132921 (2023)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"1971_CR55","first-page":"2894","volume":"36","author":"H Xue","year":"2024","unstructured":"Xue, H., Araujo, A., Hu, B., et al.: Diffusion-based adversarial sample generation for improved stealthiness and controllability. Adv. Neural. Inf. Process. Syst. 36, 2894\u20132921 (2024)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"1971_CR56","first-page":"7546","volume":"35","author":"S Yuan","year":"2022","unstructured":"Yuan, S., Zhang, Q., Gao, L., et al.: Natural color fool: Towards boosting black-box unrestricted attacks. Adv. Neural. Inf. Process. Syst. 35, 7546\u20137560 (2022)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"1971_CR57","doi-asserted-by":"crossref","unstructured":"Zamir, S. W., Arora, A., Khan, S., et al.: Restormer: Efficient transformer for high-resolution image restoration. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 5728\u20135739 (2022)","DOI":"10.1109\/CVPR52688.2022.00564"},{"key":"1971_CR58","doi-asserted-by":"publisher","DOI":"10.1016\/j.displa.2024.102837","volume":"85","author":"H Zhai","year":"2024","unstructured":"Zhai, H., Ouyang, Y., Luo, N., et al.: Msi-dtrans: A multi-focus image fusion using multilayer semantic interaction and dynamic transformer. Displays 85, 102837 (2024)","journal-title":"Displays"},{"issue":"6","key":"1971_CR59","doi-asserted-by":"publisher","first-page":"3745","DOI":"10.1007\/s00530-023-01183-x","volume":"29","author":"H Zhang","year":"2023","unstructured":"Zhang, H., Wang, Q., Feng, G.: Artistic image adversarial attack via style perturbation. Multimedia Syst. 29(6), 3745\u20133755 (2023)","journal-title":"Multimedia Syst."},{"key":"1971_CR60","doi-asserted-by":"crossref","unstructured":"Zheng, S., Lu, C., Wu, Y., et\u00a0al.: Sapnet: Segmentation-aware progressive network for perceptual contrastive deraining. In: Proceedings of the IEEE\/CVF winter conference on applications of computer vision, pp 52\u201362 (2022)","DOI":"10.1109\/WACVW54805.2022.00011"},{"key":"1971_CR61","doi-asserted-by":"crossref","unstructured":"Zhong, Y., Liu, X., Zhai, D., et\u00a0al.: Shadows can be dangerous: Stealthy and effective physical-world adversarial attack by natural phenomenon. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp 15324\u201315333 (2022)","DOI":"10.1109\/CVPR52688.2022.01491"},{"key":"1971_CR62","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Wang, T., Fu, X., et\u00a0al.: Learning weather-general and weather-specific features for image restoration under multiple adverse weather conditions. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 21747\u201321758 (2023)","DOI":"10.1109\/CVPR52729.2023.02083"}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-025-01971-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-025-01971-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-025-01971-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T10:24:36Z","timestamp":1761387876000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-025-01971-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,21]]},"references-count":62,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["1971"],"URL":"https:\/\/doi.org\/10.1007\/s00530-025-01971-7","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"type":"print","value":"0942-4962"},{"type":"electronic","value":"1432-1882"}],"subject":[],"published":{"date-parts":[[2025,8,21]]},"assertion":[{"value":"19 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 August 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest. The authors have no relevant financial or non-financial interests to disclose. All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The authors have no financial or proprietary interests in any material discussed in this article.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Financial or Proprietary interests"}}],"article-number":"383"}}