{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T18:33:41Z","timestamp":1776882821803,"version":"3.51.2"},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T00:00:00Z","timestamp":1743897600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T00:00:00Z","timestamp":1743897600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,4,6]]},"DOI":"10.1109\/icassp49660.2025.10889488","type":"proceedings-article","created":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T17:15:02Z","timestamp":1741799702000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["A Method for Removing Reflections from Water Surface Images Based on Pre-trained Image Restoration"],"prefix":"10.1109","author":[{"given":"Minghua","family":"Zhao","sequence":"first","affiliation":[{"name":"Xi'an University of Technology,Shaanxi Key Laboratory for Network Computing and Security Technology,Xi&#x2019;an,China"}]},{"given":"Rui","family":"Zhi","sequence":"additional","affiliation":[{"name":"Xi'an University of Technology,Shaanxi Key Laboratory for Network Computing and Security Technology,Xi&#x2019;an,China"}]},{"given":"Shuangli","family":"Du","sequence":"additional","affiliation":[{"name":"Xi'an University of Technology,Shaanxi Key Laboratory for Network Computing and Security Technology,Xi&#x2019;an,China"}]},{"given":"Jing","family":"Hu","sequence":"additional","affiliation":[{"name":"Xi'an University of Technology,Shaanxi Key Laboratory for Network Computing and Security Technology,Xi&#x2019;an,China"}]},{"given":"Cheng","family":"Shi","sequence":"additional","affiliation":[{"name":"Xi'an University of Technology,Shaanxi Key Laboratory for Network Computing and Security Technology,Xi&#x2019;an,China"}]},{"given":"Lin","family":"Wang","sequence":"additional","affiliation":[{"name":"Xi'an University of Technology,Shaanxi Key Laboratory for Network Computing and Security Technology,Xi&#x2019;an,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5551-7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01228-1_15"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3059968"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00478"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.11.021"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.03.161"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.2478\/s13537-011-0020-2"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2019.2926501"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2018.2803179"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413586"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.13834"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.36"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2014.2360402"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.01.026"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15561-1_7"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16814-2_40"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01225-0_17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3169\/mta.7.92"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00497"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2021.3104188"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1117\/1.JEI.31.3.033013"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s41095-022-0273-9"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-007-0090-8"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.629"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.01200"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01252-6_6"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00192"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2019.00408"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.192"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2015.7298996"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.619"}],"event":{"name":"ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","location":"Hyderabad, India","start":{"date-parts":[[2025,4,6]]},"end":{"date-parts":[[2025,4,11]]}},"container-title":["ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10887540\/10887541\/10889488.pdf?arnumber=10889488","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T05:26:59Z","timestamp":1774416419000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10889488\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,6]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/icassp49660.2025.10889488","relation":{},"subject":[],"published":{"date-parts":[[2025,4,6]]}}}