Alert button
Picture for Mubarak Shah

Mubarak Shah

Alert button

Anomaly Detection in Video via Self-Supervised and Multi-Task Learning

Add code
Bookmark button
Alert button
Nov 15, 2020
Mariana-Iuliana Georgescu, Antonio Barbalau, Radu Tudor Ionescu, Fahad Shahbaz Khan, Marius Popescu, Mubarak Shah

Figure 1 for Anomaly Detection in Video via Self-Supervised and Multi-Task Learning
Figure 2 for Anomaly Detection in Video via Self-Supervised and Multi-Task Learning
Figure 3 for Anomaly Detection in Video via Self-Supervised and Multi-Task Learning
Figure 4 for Anomaly Detection in Video via Self-Supervised and Multi-Task Learning
Viaarxiv icon

MMFT-BERT: Multimodal Fusion Transformer with BERT Encodings for Visual Question Answering

Add code
Bookmark button
Alert button
Oct 27, 2020
Aisha Urooj Khan, Amir Mazaheri, Niels da Vitoria Lobo, Mubarak Shah

Figure 1 for MMFT-BERT: Multimodal Fusion Transformer with BERT Encodings for Visual Question Answering
Figure 2 for MMFT-BERT: Multimodal Fusion Transformer with BERT Encodings for Visual Question Answering
Figure 3 for MMFT-BERT: Multimodal Fusion Transformer with BERT Encodings for Visual Question Answering
Figure 4 for MMFT-BERT: Multimodal Fusion Transformer with BERT Encodings for Visual Question Answering
Viaarxiv icon

Meta-learning the Learning Trends Shared Across Tasks

Add code
Bookmark button
Alert button
Oct 19, 2020
Jathushan Rajasegaran, Salman Khan, Munawar Hayat, Fahad Shahbaz Khan, Mubarak Shah

Figure 1 for Meta-learning the Learning Trends Shared Across Tasks
Figure 2 for Meta-learning the Learning Trends Shared Across Tasks
Figure 3 for Meta-learning the Learning Trends Shared Across Tasks
Figure 4 for Meta-learning the Learning Trends Shared Across Tasks
Viaarxiv icon

Uncertainty Estimation and Sample Selection for Crowd Counting

Add code
Bookmark button
Alert button
Oct 04, 2020
Viresh Ranjan, Boyu Wang, Mubarak Shah, Minh Hoai

Figure 1 for Uncertainty Estimation and Sample Selection for Crowd Counting
Figure 2 for Uncertainty Estimation and Sample Selection for Crowd Counting
Figure 3 for Uncertainty Estimation and Sample Selection for Crowd Counting
Figure 4 for Uncertainty Estimation and Sample Selection for Crowd Counting
Viaarxiv icon

A Scene-Agnostic Framework with Adversarial Training for Abnormal Event Detection in Video

Add code
Bookmark button
Alert button
Aug 27, 2020
Mariana-Iuliana Georgescu, Radu Tudor Ionescu, Fahad Shahbaz Khan, Marius Popescu, Mubarak Shah

Figure 1 for A Scene-Agnostic Framework with Adversarial Training for Abnormal Event Detection in Video
Figure 2 for A Scene-Agnostic Framework with Adversarial Training for Abnormal Event Detection in Video
Figure 3 for A Scene-Agnostic Framework with Adversarial Training for Abnormal Event Detection in Video
Figure 4 for A Scene-Agnostic Framework with Adversarial Training for Abnormal Event Detection in Video
Viaarxiv icon

Simultaneous Detection and Tracking with Motion Modelling for Multiple Object Tracking

Add code
Bookmark button
Alert button
Aug 20, 2020
ShiJie Sun, Naveed Akhtar, XiangYu Song, HuanSheng Song, Ajmal Mian, Mubarak Shah

Figure 1 for Simultaneous Detection and Tracking with Motion Modelling for Multiple Object Tracking
Figure 2 for Simultaneous Detection and Tracking with Motion Modelling for Multiple Object Tracking
Figure 3 for Simultaneous Detection and Tracking with Motion Modelling for Multiple Object Tracking
Figure 4 for Simultaneous Detection and Tracking with Motion Modelling for Multiple Object Tracking
Viaarxiv icon

Deep Photo Cropper and Enhancer

Add code
Bookmark button
Alert button
Aug 03, 2020
Aaron Ott, Amir Mazaheri, Niels D. Lobo, Mubarak Shah

Figure 1 for Deep Photo Cropper and Enhancer
Figure 2 for Deep Photo Cropper and Enhancer
Figure 3 for Deep Photo Cropper and Enhancer
Viaarxiv icon

Cassandra: Detecting Trojaned Networks from Adversarial Perturbations

Add code
Bookmark button
Alert button
Jul 28, 2020
Xiaoyu Zhang, Ajmal Mian, Rohit Gupta, Nazanin Rahnavard, Mubarak Shah

Figure 1 for Cassandra: Detecting Trojaned Networks from Adversarial Perturbations
Figure 2 for Cassandra: Detecting Trojaned Networks from Adversarial Perturbations
Figure 3 for Cassandra: Detecting Trojaned Networks from Adversarial Perturbations
Figure 4 for Cassandra: Detecting Trojaned Networks from Adversarial Perturbations
Viaarxiv icon

Odyssey: Creation, Analysis and Detection of Trojan Models

Add code
Bookmark button
Alert button
Jul 16, 2020
Marzieh Edraki, Nazmul Karim, Nazanin Rahnavard, Ajmal Mian, Mubarak Shah

Figure 1 for Odyssey: Creation, Analysis and Detection of Trojan Models
Figure 2 for Odyssey: Creation, Analysis and Detection of Trojan Models
Figure 3 for Odyssey: Creation, Analysis and Detection of Trojan Models
Figure 4 for Odyssey: Creation, Analysis and Detection of Trojan Models
Viaarxiv icon