Cargando…

Stabilizing deep tomographic reconstruction: Part B. Convergence analysis and adversarial attacks

Due to lack of the kernel awareness, some popular deep image reconstruction networks are unstable. To address this problem, here we introduce the bounded relative error norm (BREN) property, which is a special case of the Lipschitz continuity. Then, we perform a convergence study consisting of two p...

Descripción completa

Detalles Bibliográficos
Autores principales: Wu, Weiwen, Hu, Dianlin, Cong, Wenxiang, Shan, Hongming, Wang, Shaoyu, Niu, Chuang, Yan, Pingkun, Yu, Hengyong, Vardhanabhuti, Varut, Wang, Ge
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Elsevier 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9122974/
https://www.ncbi.nlm.nih.gov/pubmed/35607615
http://dx.doi.org/10.1016/j.patter.2022.100475
_version_ 1784711462236717056
author Wu, Weiwen
Hu, Dianlin
Cong, Wenxiang
Shan, Hongming
Wang, Shaoyu
Niu, Chuang
Yan, Pingkun
Yu, Hengyong
Vardhanabhuti, Varut
Wang, Ge
author_facet Wu, Weiwen
Hu, Dianlin
Cong, Wenxiang
Shan, Hongming
Wang, Shaoyu
Niu, Chuang
Yan, Pingkun
Yu, Hengyong
Vardhanabhuti, Varut
Wang, Ge
author_sort Wu, Weiwen
collection PubMed
description Due to lack of the kernel awareness, some popular deep image reconstruction networks are unstable. To address this problem, here we introduce the bounded relative error norm (BREN) property, which is a special case of the Lipschitz continuity. Then, we perform a convergence study consisting of two parts: (1) a heuristic analysis on the convergence of the analytic compressed iterative deep (ACID) scheme (with the simplification that the CS module achieves a perfect sparsification), and (2) a mathematically denser analysis (with the two approximations: [1] A(T) is viewed as an inverse A(-)(1) in the perspective of an iterative reconstruction procedure and [2] a pseudo-inverse is used for a total variation operator H). Also, we present adversarial attack algorithms to perturb the selected reconstruction networks respectively and, more importantly, to attack the ACID workflow as a whole. Finally, we show the numerical convergence of the ACID iteration in terms of the Lipschitz constant and the local stability against noise.
format Online
Article
Text
id pubmed-9122974
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Elsevier
record_format MEDLINE/PubMed
spelling pubmed-91229742022-05-22 Stabilizing deep tomographic reconstruction: Part B. Convergence analysis and adversarial attacks Wu, Weiwen Hu, Dianlin Cong, Wenxiang Shan, Hongming Wang, Shaoyu Niu, Chuang Yan, Pingkun Yu, Hengyong Vardhanabhuti, Varut Wang, Ge Patterns (N Y) Article Due to lack of the kernel awareness, some popular deep image reconstruction networks are unstable. To address this problem, here we introduce the bounded relative error norm (BREN) property, which is a special case of the Lipschitz continuity. Then, we perform a convergence study consisting of two parts: (1) a heuristic analysis on the convergence of the analytic compressed iterative deep (ACID) scheme (with the simplification that the CS module achieves a perfect sparsification), and (2) a mathematically denser analysis (with the two approximations: [1] A(T) is viewed as an inverse A(-)(1) in the perspective of an iterative reconstruction procedure and [2] a pseudo-inverse is used for a total variation operator H). Also, we present adversarial attack algorithms to perturb the selected reconstruction networks respectively and, more importantly, to attack the ACID workflow as a whole. Finally, we show the numerical convergence of the ACID iteration in terms of the Lipschitz constant and the local stability against noise. Elsevier 2022-04-06 /pmc/articles/PMC9122974/ /pubmed/35607615 http://dx.doi.org/10.1016/j.patter.2022.100475 Text en © 2022 The Authors https://creativecommons.org/licenses/by-nc-nd/4.0/This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
spellingShingle Article
Wu, Weiwen
Hu, Dianlin
Cong, Wenxiang
Shan, Hongming
Wang, Shaoyu
Niu, Chuang
Yan, Pingkun
Yu, Hengyong
Vardhanabhuti, Varut
Wang, Ge
Stabilizing deep tomographic reconstruction: Part B. Convergence analysis and adversarial attacks
title Stabilizing deep tomographic reconstruction: Part B. Convergence analysis and adversarial attacks
title_full Stabilizing deep tomographic reconstruction: Part B. Convergence analysis and adversarial attacks
title_fullStr Stabilizing deep tomographic reconstruction: Part B. Convergence analysis and adversarial attacks
title_full_unstemmed Stabilizing deep tomographic reconstruction: Part B. Convergence analysis and adversarial attacks
title_short Stabilizing deep tomographic reconstruction: Part B. Convergence analysis and adversarial attacks
title_sort stabilizing deep tomographic reconstruction: part b. convergence analysis and adversarial attacks
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9122974/
https://www.ncbi.nlm.nih.gov/pubmed/35607615
http://dx.doi.org/10.1016/j.patter.2022.100475
work_keys_str_mv AT wuweiwen stabilizingdeeptomographicreconstructionpartbconvergenceanalysisandadversarialattacks
AT hudianlin stabilizingdeeptomographicreconstructionpartbconvergenceanalysisandadversarialattacks
AT congwenxiang stabilizingdeeptomographicreconstructionpartbconvergenceanalysisandadversarialattacks
AT shanhongming stabilizingdeeptomographicreconstructionpartbconvergenceanalysisandadversarialattacks
AT wangshaoyu stabilizingdeeptomographicreconstructionpartbconvergenceanalysisandadversarialattacks
AT niuchuang stabilizingdeeptomographicreconstructionpartbconvergenceanalysisandadversarialattacks
AT yanpingkun stabilizingdeeptomographicreconstructionpartbconvergenceanalysisandadversarialattacks
AT yuhengyong stabilizingdeeptomographicreconstructionpartbconvergenceanalysisandadversarialattacks
AT vardhanabhutivarut stabilizingdeeptomographicreconstructionpartbconvergenceanalysisandadversarialattacks
AT wangge stabilizingdeeptomographicreconstructionpartbconvergenceanalysisandadversarialattacks