{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T18:51:07Z","timestamp":1776106267600,"version":"3.50.1"},"reference-count":103,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&#x0026;D Program of China","award":["2020YFA0713900"],"award-info":[{"award-number":["2020YFA0713900"]}]},{"name":"China NSFC","award":["62076196"],"award-info":[{"award-number":["62076196"]}]},{"name":"China NSFC","award":["12226004"],"award-info":[{"award-number":["12226004"]}]},{"name":"China NSFC","award":["62272375"],"award-info":[{"award-number":["62272375"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Pattern Anal. Mach. Intell."],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1109\/tpami.2024.3365745","type":"journal-article","created":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T23:43:31Z","timestamp":1707867811000},"page":"7011-7026","source":"Crossref","is-referenced-by-count":17,"title":["Deep Variational Network Toward Blind Image Restoration"],"prefix":"10.1109","volume":"46","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9178-671X","authenticated-orcid":false,"given":"Zongsheng","family":"Yue","sequence":"first","affiliation":[{"name":"Department of Computer Science, The University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7603-6497","authenticated-orcid":false,"given":"Hongwei","family":"Yong","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9956-0064","authenticated-orcid":false,"given":"Qian","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Mathematics and Statistics, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2078-4215","authenticated-orcid":false,"given":"Lei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1294-8283","authenticated-orcid":false,"given":"Deyu","family":"Meng","sequence":"additional","affiliation":[{"name":"School of Mathematics and Statistics and Ministry of Education Key Lab of Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8560-9007","authenticated-orcid":false,"given":"Kwan-Yee K.","family":"Wong","sequence":"additional","affiliation":[{"name":"Department of Computer Science, The University of Hong Kong, Hong Kong, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2001.937555"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/0167-2789(92)90242-F"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.38"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2007.901238"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2007.911828"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2012.2235847"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01237-3_2"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2012.2221729"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.366"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.125"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.169"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.175"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2604816"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/rs10101631"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2019.2917328"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10593-2_13"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2017.2662206"},{"key":"ref18","first-page":"2802","article-title":"Image restoration using very deep convolutional encoder-decoder networks with symmetric skip connections","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Mao"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01234-2_18"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2018.2839891"},{"key":"ref21","article-title":"Residual non-local attention networks for image restoration","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Zhang"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00181"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00325"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58607-2_3"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01458"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00406"},{"key":"ref27","first-page":"1688","article-title":"Variational denoising network: Toward blind noise modeling and removal","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Yue"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1996.559512"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-008-0197-6"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206811"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2012.2208981"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.519"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3123266.3123370"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.52"},{"key":"ref35","first-page":"769","article-title":"Natural image denoising with convolutional networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Jain"},{"key":"ref36","first-page":"341","article-title":"Image denoising and inpainting with deep neural networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Xie"},{"key":"ref37","first-page":"1493","article-title":"Adaptive multi-column deep neural networks with application to robust image denoising","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Agostinelli"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2012.6247952"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.486"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.207"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.19"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1809.00219"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00262"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00170"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01251"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00475"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.5555\/2969033.2969125"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00333"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/cvprw.2019.00261"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.300"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2018.2875569"},{"key":"ref52","first-page":"5546","article-title":"Plug-and-play methods provably converge with properly trained denoisers","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Ryu"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00177"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3088914"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58520-4_19"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00328"},{"key":"ref57","first-page":"5632","article-title":"Unfolding the alternating optimization for blind super resolution","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Zhengxiong"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2021.3136623"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00069"},{"key":"ref60","first-page":"9446","article-title":"Deep image prior","volume-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit.","author":"Ulyanov"},{"key":"ref61","first-page":"11026","article-title":"\u201cdouble-dip","volume-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit.","author":"Gandelsman"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00340"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01046"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00217"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00182"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2017.2732350"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.67"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00344"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01044"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-7566-5"},{"key":"ref71","article-title":"Auto-encoding variational bayes","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Kingma"},{"key":"ref72","first-page":"2235","article-title":"Pathwise derivatives beyond the reparameterization trick","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Jankowiak"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00196"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01454"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref77","article-title":"Adam: A method for stochastic optimization","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Kingma"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.5555\/3454287.3455008"},{"key":"ref79","article-title":"SGDR: Stochastic gradient descent with warm restarts","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Loshchilov"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2010.161"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2016.2631888"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1117\/1.3600632"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.294"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00354"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58577-8_11"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00277"},{"key":"ref89","article-title":"Learning to generate realistic noisy images via pixel-level noise-aware adversarial training","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Cai"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58610-2_12"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27413-8_47"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.150"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.149"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00329"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00068"},{"key":"ref96","article-title":"Blind super-resolution kernel estimation using an internal-GAN","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Bell-Kligler"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.355"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2001.937655"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-4020-z"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2016.12.009"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-11021-5_21"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW54120.2021.00217"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.352"}],"container-title":["IEEE Transactions on Pattern Analysis and Machine Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/34\/10704791\/10433564.pdf?arnumber=10433564","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,7]],"date-time":"2024-10-07T17:44:28Z","timestamp":1728323068000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10433564\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11]]},"references-count":103,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tpami.2024.3365745","relation":{},"ISSN":["0162-8828","2160-9292","1939-3539"],"issn-type":[{"value":"0162-8828","type":"print"},{"value":"2160-9292","type":"electronic"},{"value":"1939-3539","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11]]}}}