Alert button

"Image": models, code, and papers
Alert button

Image Captioning through Image Transformer

Add code
Bookmark button
Alert button
Apr 29, 2020
Sen He, Wentong Liao, Hamed R. Tavakoli, Michael Yang, Bodo Rosenhahn, Nicolas Pugeault

Figure 1 for Image Captioning through Image Transformer
Figure 2 for Image Captioning through Image Transformer
Figure 3 for Image Captioning through Image Transformer
Figure 4 for Image Captioning through Image Transformer
Viaarxiv icon

Source-Free Domain Adaptive Fundus Image Segmentation with Denoised Pseudo-Labeling

Add code
Bookmark button
Alert button
Sep 19, 2021
Cheng Chen, Quande Liu, Yueming Jin, Qi Dou, Pheng-Ann Heng

Figure 1 for Source-Free Domain Adaptive Fundus Image Segmentation with Denoised Pseudo-Labeling
Figure 2 for Source-Free Domain Adaptive Fundus Image Segmentation with Denoised Pseudo-Labeling
Figure 3 for Source-Free Domain Adaptive Fundus Image Segmentation with Denoised Pseudo-Labeling
Figure 4 for Source-Free Domain Adaptive Fundus Image Segmentation with Denoised Pseudo-Labeling
Viaarxiv icon

Transparency strategy-based data augmentation for BI-RADS classification of mammograms

Mar 20, 2022
Sam B. Tran, Huyen T. X. Nguyen, Hieu H. Pham, Ha Q. Nguyen

Figure 1 for Transparency strategy-based data augmentation for BI-RADS classification of mammograms
Figure 2 for Transparency strategy-based data augmentation for BI-RADS classification of mammograms
Figure 3 for Transparency strategy-based data augmentation for BI-RADS classification of mammograms
Figure 4 for Transparency strategy-based data augmentation for BI-RADS classification of mammograms
Viaarxiv icon

AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems

Jun 07, 2022
Guangke Chen, Zhe Zhao, Fu Song, Sen Chen, Lingling Fan, Yang Liu

Figure 1 for AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems
Figure 2 for AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems
Figure 3 for AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems
Figure 4 for AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems
Viaarxiv icon

Image Translation via Fine-grained Knowledge Transfer

Add code
Bookmark button
Alert button
Dec 21, 2020
Xuanhong Chen, Ziang Liu, Ting Qiu, Bingbing Ni, Naiyuan Liu, Xiwei Hu, Yuhan Li

Figure 1 for Image Translation via Fine-grained Knowledge Transfer
Figure 2 for Image Translation via Fine-grained Knowledge Transfer
Figure 3 for Image Translation via Fine-grained Knowledge Transfer
Figure 4 for Image Translation via Fine-grained Knowledge Transfer
Viaarxiv icon

Learning image quality assessment by reinforcing task amenable data selection

Feb 15, 2021
Shaheer U. Saeed, Yunguan Fu, Zachary M. C. Baum, Qianye Yang, Mirabela Rusu, Richard E. Fan, Geoffrey A. Sonn, Dean C. Barratt, Yipeng Hu

Figure 1 for Learning image quality assessment by reinforcing task amenable data selection
Figure 2 for Learning image quality assessment by reinforcing task amenable data selection
Figure 3 for Learning image quality assessment by reinforcing task amenable data selection
Figure 4 for Learning image quality assessment by reinforcing task amenable data selection
Viaarxiv icon

Diverse Single Image Generation with Controllable Global Structure through Self-Attention

Feb 15, 2021
Sutharsan Mahendren, Chamira Edussooriya, Ranga Rodrigo

Figure 1 for Diverse Single Image Generation with Controllable Global Structure through Self-Attention
Figure 2 for Diverse Single Image Generation with Controllable Global Structure through Self-Attention
Figure 3 for Diverse Single Image Generation with Controllable Global Structure through Self-Attention
Figure 4 for Diverse Single Image Generation with Controllable Global Structure through Self-Attention
Viaarxiv icon

GPU Acceleration for Synthetic Aperture Sonar Image Reconstruction

Jan 14, 2021
Isaac D. Gerg, Daniel C. Brown, Stephen G. Wagner, Daniel Cook, Brian N. O'Donnell, Thomas Benson, Thomas C. Montgomery

Figure 1 for GPU Acceleration for Synthetic Aperture Sonar Image Reconstruction
Figure 2 for GPU Acceleration for Synthetic Aperture Sonar Image Reconstruction
Figure 3 for GPU Acceleration for Synthetic Aperture Sonar Image Reconstruction
Figure 4 for GPU Acceleration for Synthetic Aperture Sonar Image Reconstruction
Viaarxiv icon

Contributor-Aware Defenses Against Adversarial Backdoor Attacks

May 28, 2022
Glenn Dawson, Muhammad Umer, Robi Polikar

Figure 1 for Contributor-Aware Defenses Against Adversarial Backdoor Attacks
Figure 2 for Contributor-Aware Defenses Against Adversarial Backdoor Attacks
Figure 3 for Contributor-Aware Defenses Against Adversarial Backdoor Attacks
Figure 4 for Contributor-Aware Defenses Against Adversarial Backdoor Attacks
Viaarxiv icon

FisheyeHDK: Hyperbolic Deformable Kernel Learning for Ultra-Wide Field-of-View Image Recognition

Add code
Bookmark button
Alert button
Mar 14, 2022
Ola Ahmad, Freddy Lecue

Figure 1 for FisheyeHDK: Hyperbolic Deformable Kernel Learning for Ultra-Wide Field-of-View Image Recognition
Figure 2 for FisheyeHDK: Hyperbolic Deformable Kernel Learning for Ultra-Wide Field-of-View Image Recognition
Figure 3 for FisheyeHDK: Hyperbolic Deformable Kernel Learning for Ultra-Wide Field-of-View Image Recognition
Figure 4 for FisheyeHDK: Hyperbolic Deformable Kernel Learning for Ultra-Wide Field-of-View Image Recognition
Viaarxiv icon