Picture for Walter Scheirer

Walter Scheirer

Backdooring Convolutional Neural Networks via Targeted Weight Perturbations

Add code
Dec 07, 2018
Figure 1 for Backdooring Convolutional Neural Networks via Targeted Weight Perturbations
Figure 2 for Backdooring Convolutional Neural Networks via Targeted Weight Perturbations
Figure 3 for Backdooring Convolutional Neural Networks via Targeted Weight Perturbations
Figure 4 for Backdooring Convolutional Neural Networks via Targeted Weight Perturbations
Viaarxiv icon

The Limits and Potentials of Deep Learning for Robotics

Add code
Apr 18, 2018
Figure 1 for The Limits and Potentials of Deep Learning for Robotics
Figure 2 for The Limits and Potentials of Deep Learning for Robotics
Figure 3 for The Limits and Potentials of Deep Learning for Robotics
Figure 4 for The Limits and Potentials of Deep Learning for Robotics
Viaarxiv icon

To Frontalize or Not To Frontalize: Do We Really Need Elaborate Pre-processing To Improve Face Recognition?

Add code
Mar 27, 2018
Figure 1 for To Frontalize or Not To Frontalize: Do We Really Need Elaborate Pre-processing To Improve Face Recognition?
Figure 2 for To Frontalize or Not To Frontalize: Do We Really Need Elaborate Pre-processing To Improve Face Recognition?
Figure 3 for To Frontalize or Not To Frontalize: Do We Really Need Elaborate Pre-processing To Improve Face Recognition?
Figure 4 for To Frontalize or Not To Frontalize: Do We Really Need Elaborate Pre-processing To Improve Face Recognition?
Viaarxiv icon

SHADHO: Massively Scalable Hardware-Aware Distributed Hyperparameter Optimization

Add code
Jan 22, 2018
Figure 1 for SHADHO: Massively Scalable Hardware-Aware Distributed Hyperparameter Optimization
Figure 2 for SHADHO: Massively Scalable Hardware-Aware Distributed Hyperparameter Optimization
Figure 3 for SHADHO: Massively Scalable Hardware-Aware Distributed Hyperparameter Optimization
Figure 4 for SHADHO: Massively Scalable Hardware-Aware Distributed Hyperparameter Optimization
Viaarxiv icon

Using Human Brain Activity to Guide Machine Learning

Add code
Sep 19, 2017
Figure 1 for Using Human Brain Activity to Guide Machine Learning
Figure 2 for Using Human Brain Activity to Guide Machine Learning
Figure 3 for Using Human Brain Activity to Guide Machine Learning
Viaarxiv icon

Deja vu: Scalable Place Recognition Using Mutually Supportive Feature Frequencies

Add code
Jul 20, 2017
Figure 1 for Deja vu: Scalable Place Recognition Using Mutually Supportive Feature Frequencies
Figure 2 for Deja vu: Scalable Place Recognition Using Mutually Supportive Feature Frequencies
Figure 3 for Deja vu: Scalable Place Recognition Using Mutually Supportive Feature Frequencies
Figure 4 for Deja vu: Scalable Place Recognition Using Mutually Supportive Feature Frequencies
Viaarxiv icon

Provenance Filtering for Multimedia Phylogeny

Add code
Jun 01, 2017
Figure 1 for Provenance Filtering for Multimedia Phylogeny
Figure 2 for Provenance Filtering for Multimedia Phylogeny
Figure 3 for Provenance Filtering for Multimedia Phylogeny
Figure 4 for Provenance Filtering for Multimedia Phylogeny
Viaarxiv icon

U-Phylogeny: Undirected Provenance Graph Construction in the Wild

Add code
May 31, 2017
Figure 1 for U-Phylogeny: Undirected Provenance Graph Construction in the Wild
Figure 2 for U-Phylogeny: Undirected Provenance Graph Construction in the Wild
Figure 3 for U-Phylogeny: Undirected Provenance Graph Construction in the Wild
Viaarxiv icon

Predicting First Impressions with Deep Learning

Add code
May 10, 2017
Figure 1 for Predicting First Impressions with Deep Learning
Figure 2 for Predicting First Impressions with Deep Learning
Figure 3 for Predicting First Impressions with Deep Learning
Figure 4 for Predicting First Impressions with Deep Learning
Viaarxiv icon

Spotting the Difference: Context Retrieval and Analysis for Improved Forgery Detection and Localization

Add code
May 01, 2017
Figure 1 for Spotting the Difference: Context Retrieval and Analysis for Improved Forgery Detection and Localization
Figure 2 for Spotting the Difference: Context Retrieval and Analysis for Improved Forgery Detection and Localization
Figure 3 for Spotting the Difference: Context Retrieval and Analysis for Improved Forgery Detection and Localization
Figure 4 for Spotting the Difference: Context Retrieval and Analysis for Improved Forgery Detection and Localization
Viaarxiv icon