Alert button
Picture for Amit K. Roy-Chowdhury

Amit K. Roy-Chowdhury

Alert button

GAMA: Generative Adversarial Multi-Object Scene Attacks

Add code
Bookmark button
Alert button
Sep 20, 2022
Abhishek Aich, Calvin Khang-Ta, Akash Gupta, Chengyu Song, Srikanth V. Krishnamurthy, M. Salman Asif, Amit K. Roy-Chowdhury

Figure 1 for GAMA: Generative Adversarial Multi-Object Scene Attacks
Figure 2 for GAMA: Generative Adversarial Multi-Object Scene Attacks
Figure 3 for GAMA: Generative Adversarial Multi-Object Scene Attacks
Figure 4 for GAMA: Generative Adversarial Multi-Object Scene Attacks
Viaarxiv icon

Cross-Modal Knowledge Transfer Without Task-Relevant Source Data

Add code
Bookmark button
Alert button
Sep 08, 2022
Sk Miraj Ahmed, Suhas Lohit, Kuan-Chuan Peng, Michael J. Jones, Amit K. Roy-Chowdhury

Figure 1 for Cross-Modal Knowledge Transfer Without Task-Relevant Source Data
Figure 2 for Cross-Modal Knowledge Transfer Without Task-Relevant Source Data
Figure 3 for Cross-Modal Knowledge Transfer Without Task-Relevant Source Data
Figure 4 for Cross-Modal Knowledge Transfer Without Task-Relevant Source Data
Viaarxiv icon

Poisson2Sparse: Self-Supervised Poisson Denoising From a Single Image

Add code
Bookmark button
Alert button
Jun 04, 2022
Calvin-Khang Ta, Abhishek Aich, Akash Gupta, Amit K. Roy-Chowdhury

Figure 1 for Poisson2Sparse: Self-Supervised Poisson Denoising From a Single Image
Figure 2 for Poisson2Sparse: Self-Supervised Poisson Denoising From a Single Image
Figure 3 for Poisson2Sparse: Self-Supervised Poisson Denoising From a Single Image
Figure 4 for Poisson2Sparse: Self-Supervised Poisson Denoising From a Single Image
Viaarxiv icon

A-ACT: Action Anticipation through Cycle Transformations

Add code
Bookmark button
Alert button
Apr 02, 2022
Akash Gupta, Jingen Liu, Liefeng Bo, Amit K. Roy-Chowdhury, Tao Mei

Figure 1 for A-ACT: Action Anticipation through Cycle Transformations
Figure 2 for A-ACT: Action Anticipation through Cycle Transformations
Figure 3 for A-ACT: Action Anticipation through Cycle Transformations
Figure 4 for A-ACT: Action Anticipation through Cycle Transformations
Viaarxiv icon

Zero-Query Transfer Attacks on Context-Aware Object Detectors

Add code
Bookmark button
Alert button
Mar 29, 2022
Zikui Cai, Shantanu Rane, Alejandro E. Brito, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury, M. Salman Asif

Figure 1 for Zero-Query Transfer Attacks on Context-Aware Object Detectors
Figure 2 for Zero-Query Transfer Attacks on Context-Aware Object Detectors
Figure 3 for Zero-Query Transfer Attacks on Context-Aware Object Detectors
Figure 4 for Zero-Query Transfer Attacks on Context-Aware Object Detectors
Viaarxiv icon

Controllable Dynamic Multi-Task Architectures

Add code
Bookmark button
Alert button
Mar 28, 2022
Dripta S. Raychaudhuri, Yumin Suh, Samuel Schulter, Xiang Yu, Masoud Faraki, Amit K. Roy-Chowdhury, Manmohan Chandraker

Figure 1 for Controllable Dynamic Multi-Task Architectures
Figure 2 for Controllable Dynamic Multi-Task Architectures
Figure 3 for Controllable Dynamic Multi-Task Architectures
Figure 4 for Controllable Dynamic Multi-Task Architectures
Viaarxiv icon

Context-Aware Transfer Attacks for Object Detection

Add code
Bookmark button
Alert button
Dec 06, 2021
Zikui Cai, Xinxin Xie, Shasha Li, Mingjun Yin, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury, M. Salman Asif

Figure 1 for Context-Aware Transfer Attacks for Object Detection
Figure 2 for Context-Aware Transfer Attacks for Object Detection
Figure 3 for Context-Aware Transfer Attacks for Object Detection
Figure 4 for Context-Aware Transfer Attacks for Object Detection
Viaarxiv icon

ADC: Adversarial attacks against object Detection that evade Context consistency checks

Add code
Bookmark button
Alert button
Oct 24, 2021
Mingjun Yin, Shasha Li, Chengyu Song, M. Salman Asif, Amit K. Roy-Chowdhury, Srikanth V. Krishnamurthy

Figure 1 for ADC: Adversarial attacks against object Detection that evade Context consistency checks
Figure 2 for ADC: Adversarial attacks against object Detection that evade Context consistency checks
Figure 3 for ADC: Adversarial attacks against object Detection that evade Context consistency checks
Figure 4 for ADC: Adversarial attacks against object Detection that evade Context consistency checks
Viaarxiv icon

Adversarial Attacks on Black Box Video Classifiers: Leveraging the Power of Geometric Transformations

Add code
Bookmark button
Alert button
Oct 05, 2021
Shasha Li, Abhishek Aich, Shitong Zhu, M. Salman Asif, Chengyu Song, Amit K. Roy-Chowdhury, Srikanth Krishnamurthy

Figure 1 for Adversarial Attacks on Black Box Video Classifiers: Leveraging the Power of Geometric Transformations
Figure 2 for Adversarial Attacks on Black Box Video Classifiers: Leveraging the Power of Geometric Transformations
Figure 3 for Adversarial Attacks on Black Box Video Classifiers: Leveraging the Power of Geometric Transformations
Figure 4 for Adversarial Attacks on Black Box Video Classifiers: Leveraging the Power of Geometric Transformations
Viaarxiv icon

Multi-Expert Adversarial Attack Detection in Person Re-identification Using Context Inconsistency

Add code
Bookmark button
Alert button
Aug 23, 2021
Xueping Wang, Shasha Li, Min Liu, Yaonan Wang, Amit K. Roy-Chowdhury

Figure 1 for Multi-Expert Adversarial Attack Detection in Person Re-identification Using Context Inconsistency
Figure 2 for Multi-Expert Adversarial Attack Detection in Person Re-identification Using Context Inconsistency
Figure 3 for Multi-Expert Adversarial Attack Detection in Person Re-identification Using Context Inconsistency
Figure 4 for Multi-Expert Adversarial Attack Detection in Person Re-identification Using Context Inconsistency
Viaarxiv icon