Cargando…
Stabilizing deep tomographic reconstruction: Part B. Convergence analysis and adversarial attacks
Due to lack of the kernel awareness, some popular deep image reconstruction networks are unstable. To address this problem, here we introduce the bounded relative error norm (BREN) property, which is a special case of the Lipschitz continuity. Then, we perform a convergence study consisting of two p...
Autores principales: | , , , , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Elsevier
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9122974/ https://www.ncbi.nlm.nih.gov/pubmed/35607615 http://dx.doi.org/10.1016/j.patter.2022.100475 |
_version_ | 1784711462236717056 |
---|---|
author | Wu, Weiwen Hu, Dianlin Cong, Wenxiang Shan, Hongming Wang, Shaoyu Niu, Chuang Yan, Pingkun Yu, Hengyong Vardhanabhuti, Varut Wang, Ge |
author_facet | Wu, Weiwen Hu, Dianlin Cong, Wenxiang Shan, Hongming Wang, Shaoyu Niu, Chuang Yan, Pingkun Yu, Hengyong Vardhanabhuti, Varut Wang, Ge |
author_sort | Wu, Weiwen |
collection | PubMed |
description | Due to lack of the kernel awareness, some popular deep image reconstruction networks are unstable. To address this problem, here we introduce the bounded relative error norm (BREN) property, which is a special case of the Lipschitz continuity. Then, we perform a convergence study consisting of two parts: (1) a heuristic analysis on the convergence of the analytic compressed iterative deep (ACID) scheme (with the simplification that the CS module achieves a perfect sparsification), and (2) a mathematically denser analysis (with the two approximations: [1] A(T) is viewed as an inverse A(-)(1) in the perspective of an iterative reconstruction procedure and [2] a pseudo-inverse is used for a total variation operator H). Also, we present adversarial attack algorithms to perturb the selected reconstruction networks respectively and, more importantly, to attack the ACID workflow as a whole. Finally, we show the numerical convergence of the ACID iteration in terms of the Lipschitz constant and the local stability against noise. |
format | Online Article Text |
id | pubmed-9122974 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | Elsevier |
record_format | MEDLINE/PubMed |
spelling | pubmed-91229742022-05-22 Stabilizing deep tomographic reconstruction: Part B. Convergence analysis and adversarial attacks Wu, Weiwen Hu, Dianlin Cong, Wenxiang Shan, Hongming Wang, Shaoyu Niu, Chuang Yan, Pingkun Yu, Hengyong Vardhanabhuti, Varut Wang, Ge Patterns (N Y) Article Due to lack of the kernel awareness, some popular deep image reconstruction networks are unstable. To address this problem, here we introduce the bounded relative error norm (BREN) property, which is a special case of the Lipschitz continuity. Then, we perform a convergence study consisting of two parts: (1) a heuristic analysis on the convergence of the analytic compressed iterative deep (ACID) scheme (with the simplification that the CS module achieves a perfect sparsification), and (2) a mathematically denser analysis (with the two approximations: [1] A(T) is viewed as an inverse A(-)(1) in the perspective of an iterative reconstruction procedure and [2] a pseudo-inverse is used for a total variation operator H). Also, we present adversarial attack algorithms to perturb the selected reconstruction networks respectively and, more importantly, to attack the ACID workflow as a whole. Finally, we show the numerical convergence of the ACID iteration in terms of the Lipschitz constant and the local stability against noise. Elsevier 2022-04-06 /pmc/articles/PMC9122974/ /pubmed/35607615 http://dx.doi.org/10.1016/j.patter.2022.100475 Text en © 2022 The Authors https://creativecommons.org/licenses/by-nc-nd/4.0/This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/). |
spellingShingle | Article Wu, Weiwen Hu, Dianlin Cong, Wenxiang Shan, Hongming Wang, Shaoyu Niu, Chuang Yan, Pingkun Yu, Hengyong Vardhanabhuti, Varut Wang, Ge Stabilizing deep tomographic reconstruction: Part B. Convergence analysis and adversarial attacks |
title | Stabilizing deep tomographic reconstruction: Part B. Convergence analysis and adversarial attacks |
title_full | Stabilizing deep tomographic reconstruction: Part B. Convergence analysis and adversarial attacks |
title_fullStr | Stabilizing deep tomographic reconstruction: Part B. Convergence analysis and adversarial attacks |
title_full_unstemmed | Stabilizing deep tomographic reconstruction: Part B. Convergence analysis and adversarial attacks |
title_short | Stabilizing deep tomographic reconstruction: Part B. Convergence analysis and adversarial attacks |
title_sort | stabilizing deep tomographic reconstruction: part b. convergence analysis and adversarial attacks |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9122974/ https://www.ncbi.nlm.nih.gov/pubmed/35607615 http://dx.doi.org/10.1016/j.patter.2022.100475 |
work_keys_str_mv | AT wuweiwen stabilizingdeeptomographicreconstructionpartbconvergenceanalysisandadversarialattacks AT hudianlin stabilizingdeeptomographicreconstructionpartbconvergenceanalysisandadversarialattacks AT congwenxiang stabilizingdeeptomographicreconstructionpartbconvergenceanalysisandadversarialattacks AT shanhongming stabilizingdeeptomographicreconstructionpartbconvergenceanalysisandadversarialattacks AT wangshaoyu stabilizingdeeptomographicreconstructionpartbconvergenceanalysisandadversarialattacks AT niuchuang stabilizingdeeptomographicreconstructionpartbconvergenceanalysisandadversarialattacks AT yanpingkun stabilizingdeeptomographicreconstructionpartbconvergenceanalysisandadversarialattacks AT yuhengyong stabilizingdeeptomographicreconstructionpartbconvergenceanalysisandadversarialattacks AT vardhanabhutivarut stabilizingdeeptomographicreconstructionpartbconvergenceanalysisandadversarialattacks AT wangge stabilizingdeeptomographicreconstructionpartbconvergenceanalysisandadversarialattacks |