Alert button

"Image": models, code, and papers
Alert button

Dispersed Pixel Perturbation-based Imperceptible Backdoor Trigger for Image Classifier Models

Aug 19, 2022
Yulong Wang, Minghui Zhao, Shenghong Li, Xin Yuan, Wei Ni

Figure 1 for Dispersed Pixel Perturbation-based Imperceptible Backdoor Trigger for Image Classifier Models
Figure 2 for Dispersed Pixel Perturbation-based Imperceptible Backdoor Trigger for Image Classifier Models
Figure 3 for Dispersed Pixel Perturbation-based Imperceptible Backdoor Trigger for Image Classifier Models
Figure 4 for Dispersed Pixel Perturbation-based Imperceptible Backdoor Trigger for Image Classifier Models
Viaarxiv icon

Bayesian posterior approximation with stochastic ensembles

Add code
Bookmark button
Alert button
Dec 15, 2022
Oleksandr Balabanov, Bernhard Mehlig, Hampus Linander

Figure 1 for Bayesian posterior approximation with stochastic ensembles
Figure 2 for Bayesian posterior approximation with stochastic ensembles
Figure 3 for Bayesian posterior approximation with stochastic ensembles
Figure 4 for Bayesian posterior approximation with stochastic ensembles
Viaarxiv icon

A Survey on Leveraging Pre-trained Generative Adversarial Networks for Image Editing and Restoration

Add code
Bookmark button
Alert button
Jul 21, 2022
Ming Liu, Yuxiang Wei, Xiaohe Wu, Wangmeng Zuo, Lei Zhang

Figure 1 for A Survey on Leveraging Pre-trained Generative Adversarial Networks for Image Editing and Restoration
Figure 2 for A Survey on Leveraging Pre-trained Generative Adversarial Networks for Image Editing and Restoration
Figure 3 for A Survey on Leveraging Pre-trained Generative Adversarial Networks for Image Editing and Restoration
Figure 4 for A Survey on Leveraging Pre-trained Generative Adversarial Networks for Image Editing and Restoration
Viaarxiv icon

Cross-Domain Ensemble Distillation for Domain Generalization

Add code
Bookmark button
Alert button
Nov 25, 2022
Kyungmoon Lee, Sungyeon Kim, Suha Kwak

Viaarxiv icon

ShadowNeuS: Neural SDF Reconstruction by Shadow Ray Supervision

Add code
Bookmark button
Alert button
Nov 25, 2022
Jingwang Ling, Zhibo Wang, Feng Xu

Figure 1 for ShadowNeuS: Neural SDF Reconstruction by Shadow Ray Supervision
Figure 2 for ShadowNeuS: Neural SDF Reconstruction by Shadow Ray Supervision
Figure 3 for ShadowNeuS: Neural SDF Reconstruction by Shadow Ray Supervision
Figure 4 for ShadowNeuS: Neural SDF Reconstruction by Shadow Ray Supervision
Viaarxiv icon

Attention-Aware Anime Line Drawing Colorization

Dec 21, 2022
Yu Cao, Hao Tian, P. Y. Mok

Figure 1 for Attention-Aware Anime Line Drawing Colorization
Figure 2 for Attention-Aware Anime Line Drawing Colorization
Figure 3 for Attention-Aware Anime Line Drawing Colorization
Figure 4 for Attention-Aware Anime Line Drawing Colorization
Viaarxiv icon

Continual Learning Approaches for Anomaly Detection

Add code
Bookmark button
Alert button
Dec 21, 2022
Davide Dalle Pezze, Eugenia Anello, Chiara Masiero, Gian Antonio Susto

Figure 1 for Continual Learning Approaches for Anomaly Detection
Figure 2 for Continual Learning Approaches for Anomaly Detection
Figure 3 for Continual Learning Approaches for Anomaly Detection
Figure 4 for Continual Learning Approaches for Anomaly Detection
Viaarxiv icon

LWSIS: LiDAR-guided Weakly Supervised Instance Segmentation for Autonomous Driving

Add code
Bookmark button
Alert button
Dec 07, 2022
Xiang Li, Junbo Yin, Botian Shi, Yikang Li, Ruigang Yang, Jianbin Shen

Figure 1 for LWSIS: LiDAR-guided Weakly Supervised Instance Segmentation for Autonomous Driving
Figure 2 for LWSIS: LiDAR-guided Weakly Supervised Instance Segmentation for Autonomous Driving
Figure 3 for LWSIS: LiDAR-guided Weakly Supervised Instance Segmentation for Autonomous Driving
Figure 4 for LWSIS: LiDAR-guided Weakly Supervised Instance Segmentation for Autonomous Driving
Viaarxiv icon

Multi-scale Feature Imitation for Unsupervised Anomaly Localization

Dec 13, 2022
Chao Hu, Shengxin Lai

Figure 1 for Multi-scale Feature Imitation for Unsupervised Anomaly Localization
Figure 2 for Multi-scale Feature Imitation for Unsupervised Anomaly Localization
Figure 3 for Multi-scale Feature Imitation for Unsupervised Anomaly Localization
Figure 4 for Multi-scale Feature Imitation for Unsupervised Anomaly Localization
Viaarxiv icon

Selective Amnesia: On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned Machine Learning Models

Dec 09, 2022
Rui Zhu, Di Tang, Siyuan Tang, XiaoFeng Wang, Haixu Tang

Figure 1 for Selective Amnesia: On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned Machine Learning Models
Figure 2 for Selective Amnesia: On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned Machine Learning Models
Figure 3 for Selective Amnesia: On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned Machine Learning Models
Figure 4 for Selective Amnesia: On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned Machine Learning Models
Viaarxiv icon