Alert button
Picture for Thomas Tanay

Thomas Tanay

Alert button

NTIRE 2020 Challenge on Real Image Denoising: Dataset, Methods and Results

Add code
Bookmark button
Alert button
May 08, 2020
Abdelrahman Abdelhamed, Mahmoud Afifi, Radu Timofte, Michael S. Brown, Yue Cao, Zhilu Zhang, Wangmeng Zuo, Xiaoling Zhang, Jiye Liu, Wendong Chen, Changyuan Wen, Meng Liu, Shuailin Lv, Yunchao Zhang, Zhihong Pan, Baopu Li, Teng Xi, Yanwen Fan, Xiyu Yu, Gang Zhang, Jingtuo Liu, Junyu Han, Errui Ding, Songhyun Yu, Bumjun Park, Jechang Jeong, Shuai Liu, Ziyao Zong, Nan Nan, Chenghua Li, Zengli Yang, Long Bao, Shuangquan Wang, Dongwoon Bai, Jungwon Lee, Youngjung Kim, Kyeongha Rho, Changyeop Shin, Sungho Kim, Pengliang Tang, Yiyun Zhao, Yuqian Zhou, Yuchen Fan, Thomas Huang, Zhihao Li, Nisarg A. Shah, Wei Liu, Qiong Yan, Yuzhi Zhao, Marcin Możejko, Tomasz Latkowski, Lukasz Treszczotko, Michał Szafraniuk, Krzysztof Trojanowski, Yanhong Wu, Pablo Navarrete Michelini, Fengshuo Hu, Yunhua Lu, Sujin Kim, Wonjin Kim, Jaayeon Lee, Jang-Hwan Choi, Magauiya Zhussip, Azamat Khassenov, Jong Hyun Kim, Hwechul Cho, Priya Kansal, Sabari Nathan, Zhangyu Ye, Xiwen Lu, Yaqi Wu, Jiangxin Yang, Yanlong Cao, Siliang Tang, Yanpeng Cao, Matteo Maggioni, Ioannis Marras, Thomas Tanay, Gregory Slabaugh, Youliang Yan, Myungjoo Kang, Han-Soo Choi, Kyungmin Song, Shusong Xu, Xiaomu Lu, Tingniao Wang, Chunxia Lei, Bin Liu, Rajat Gupta, Vineet Kumar

Figure 1 for NTIRE 2020 Challenge on Real Image Denoising: Dataset, Methods and Results
Figure 2 for NTIRE 2020 Challenge on Real Image Denoising: Dataset, Methods and Results
Figure 3 for NTIRE 2020 Challenge on Real Image Denoising: Dataset, Methods and Results
Figure 4 for NTIRE 2020 Challenge on Real Image Denoising: Dataset, Methods and Results
Viaarxiv icon

Multiple-Identity Image Attacks Against Face-based Identity Verification

Add code
Bookmark button
Alert button
Jun 20, 2019
Jerone T. A. Andrews, Thomas Tanay, Lewis D. Griffin

Figure 1 for Multiple-Identity Image Attacks Against Face-based Identity Verification
Figure 2 for Multiple-Identity Image Attacks Against Face-based Identity Verification
Figure 3 for Multiple-Identity Image Attacks Against Face-based Identity Verification
Figure 4 for Multiple-Identity Image Attacks Against Face-based Identity Verification
Viaarxiv icon

Batch Normalization is a Cause of Adversarial Vulnerability

Add code
Bookmark button
Alert button
May 29, 2019
Angus Galloway, Anna Golubeva, Thomas Tanay, Medhat Moussa, Graham W. Taylor

Figure 1 for Batch Normalization is a Cause of Adversarial Vulnerability
Figure 2 for Batch Normalization is a Cause of Adversarial Vulnerability
Figure 3 for Batch Normalization is a Cause of Adversarial Vulnerability
Figure 4 for Batch Normalization is a Cause of Adversarial Vulnerability
Viaarxiv icon

Adversarial Training Versus Weight Decay

Add code
Bookmark button
Alert button
Jul 23, 2018
Angus Galloway, Thomas Tanay, Graham W. Taylor

Figure 1 for Adversarial Training Versus Weight Decay
Figure 2 for Adversarial Training Versus Weight Decay
Figure 3 for Adversarial Training Versus Weight Decay
Figure 4 for Adversarial Training Versus Weight Decay
Viaarxiv icon

A New Angle on L2 Regularization

Add code
Bookmark button
Alert button
Jun 28, 2018
Thomas Tanay, Lewis D Griffin

Viaarxiv icon

Built-in Vulnerabilities to Imperceptible Adversarial Perturbations

Add code
Bookmark button
Alert button
Jun 19, 2018
Thomas Tanay, Jerone T. A. Andrews, Lewis D. Griffin

Figure 1 for Built-in Vulnerabilities to Imperceptible Adversarial Perturbations
Figure 2 for Built-in Vulnerabilities to Imperceptible Adversarial Perturbations
Figure 3 for Built-in Vulnerabilities to Imperceptible Adversarial Perturbations
Figure 4 for Built-in Vulnerabilities to Imperceptible Adversarial Perturbations
Viaarxiv icon

A Boundary Tilting Persepective on the Phenomenon of Adversarial Examples

Add code
Bookmark button
Alert button
Aug 27, 2016
Thomas Tanay, Lewis Griffin

Figure 1 for A Boundary Tilting Persepective on the Phenomenon of Adversarial Examples
Figure 2 for A Boundary Tilting Persepective on the Phenomenon of Adversarial Examples
Figure 3 for A Boundary Tilting Persepective on the Phenomenon of Adversarial Examples
Figure 4 for A Boundary Tilting Persepective on the Phenomenon of Adversarial Examples
Viaarxiv icon