Picture for Nathan Inkawhich

Nathan Inkawhich

Self-Trained Proposal Networks for the Open World

Add code
Aug 23, 2022
Figure 1 for Self-Trained Proposal Networks for the Open World
Figure 2 for Self-Trained Proposal Networks for the Open World
Figure 3 for Self-Trained Proposal Networks for the Open World
Figure 4 for Self-Trained Proposal Networks for the Open World
Viaarxiv icon

NTIRE 2021 Multi-modal Aerial View Object Classification Challenge

Add code
Jul 02, 2021
Figure 1 for NTIRE 2021 Multi-modal Aerial View Object Classification Challenge
Figure 2 for NTIRE 2021 Multi-modal Aerial View Object Classification Challenge
Figure 3 for NTIRE 2021 Multi-modal Aerial View Object Classification Challenge
Figure 4 for NTIRE 2021 Multi-modal Aerial View Object Classification Challenge
Viaarxiv icon

Fine-grained Out-of-Distribution Detection with Mixup Outlier Exposure

Add code
Jun 07, 2021
Figure 1 for Fine-grained Out-of-Distribution Detection with Mixup Outlier Exposure
Figure 2 for Fine-grained Out-of-Distribution Detection with Mixup Outlier Exposure
Figure 3 for Fine-grained Out-of-Distribution Detection with Mixup Outlier Exposure
Figure 4 for Fine-grained Out-of-Distribution Detection with Mixup Outlier Exposure
Viaarxiv icon

Can Targeted Adversarial Examples Transfer When the Source and Target Models Have No Label Space Overlap?

Add code
Mar 17, 2021
Figure 1 for Can Targeted Adversarial Examples Transfer When the Source and Target Models Have No Label Space Overlap?
Figure 2 for Can Targeted Adversarial Examples Transfer When the Source and Target Models Have No Label Space Overlap?
Figure 3 for Can Targeted Adversarial Examples Transfer When the Source and Target Models Have No Label Space Overlap?
Figure 4 for Can Targeted Adversarial Examples Transfer When the Source and Target Models Have No Label Space Overlap?
Viaarxiv icon

The Untapped Potential of Off-the-Shelf Convolutional Neural Networks

Add code
Mar 17, 2021
Figure 1 for The Untapped Potential of Off-the-Shelf Convolutional Neural Networks
Figure 2 for The Untapped Potential of Off-the-Shelf Convolutional Neural Networks
Figure 3 for The Untapped Potential of Off-the-Shelf Convolutional Neural Networks
Figure 4 for The Untapped Potential of Off-the-Shelf Convolutional Neural Networks
Viaarxiv icon

DVERGE: Diversifying Vulnerabilities for Enhanced Robust Generation of Ensembles

Add code
Oct 18, 2020
Figure 1 for DVERGE: Diversifying Vulnerabilities for Enhanced Robust Generation of Ensembles
Figure 2 for DVERGE: Diversifying Vulnerabilities for Enhanced Robust Generation of Ensembles
Figure 3 for DVERGE: Diversifying Vulnerabilities for Enhanced Robust Generation of Ensembles
Figure 4 for DVERGE: Diversifying Vulnerabilities for Enhanced Robust Generation of Ensembles
Viaarxiv icon

Perturbing Across the Feature Hierarchy to Improve Standard and Strict Blackbox Attack Transferability

Add code
Apr 29, 2020
Figure 1 for Perturbing Across the Feature Hierarchy to Improve Standard and Strict Blackbox Attack Transferability
Figure 2 for Perturbing Across the Feature Hierarchy to Improve Standard and Strict Blackbox Attack Transferability
Figure 3 for Perturbing Across the Feature Hierarchy to Improve Standard and Strict Blackbox Attack Transferability
Figure 4 for Perturbing Across the Feature Hierarchy to Improve Standard and Strict Blackbox Attack Transferability
Viaarxiv icon

Transferable Perturbations of Deep Feature Distributions

Add code
Apr 27, 2020
Figure 1 for Transferable Perturbations of Deep Feature Distributions
Figure 2 for Transferable Perturbations of Deep Feature Distributions
Figure 3 for Transferable Perturbations of Deep Feature Distributions
Figure 4 for Transferable Perturbations of Deep Feature Distributions
Viaarxiv icon

Adversarial Attacks for Optical Flow-Based Action Recognition Classifiers

Add code
Nov 28, 2018
Figure 1 for Adversarial Attacks for Optical Flow-Based Action Recognition Classifiers
Figure 2 for Adversarial Attacks for Optical Flow-Based Action Recognition Classifiers
Figure 3 for Adversarial Attacks for Optical Flow-Based Action Recognition Classifiers
Figure 4 for Adversarial Attacks for Optical Flow-Based Action Recognition Classifiers
Viaarxiv icon