Alert button

"Image": models, code, and papers
Alert button

Conditional Image Generation and Manipulation for User-Specified Content

May 11, 2020
David Stap, Maurits Bleeker, Sarah Ibrahimi, Maartje ter Hoeve

Figure 1 for Conditional Image Generation and Manipulation for User-Specified Content
Figure 2 for Conditional Image Generation and Manipulation for User-Specified Content
Figure 3 for Conditional Image Generation and Manipulation for User-Specified Content
Figure 4 for Conditional Image Generation and Manipulation for User-Specified Content
Viaarxiv icon

Gated Texture CNN for Efficient and Configurable Image Denoising

Apr 20, 2020
Kaito Imai, Takamichi Miyata

Figure 1 for Gated Texture CNN for Efficient and Configurable Image Denoising
Figure 2 for Gated Texture CNN for Efficient and Configurable Image Denoising
Figure 3 for Gated Texture CNN for Efficient and Configurable Image Denoising
Figure 4 for Gated Texture CNN for Efficient and Configurable Image Denoising
Viaarxiv icon

Modeling dynamic target deformation in camera calibration

Oct 14, 2021
Annika Hagemann, Moritz Knorr, Christoph Stiller

Figure 1 for Modeling dynamic target deformation in camera calibration
Figure 2 for Modeling dynamic target deformation in camera calibration
Figure 3 for Modeling dynamic target deformation in camera calibration
Figure 4 for Modeling dynamic target deformation in camera calibration
Viaarxiv icon

Image Recognition using Region Creep

Sep 24, 2019
Kieran Greer

Figure 1 for Image Recognition using Region Creep
Figure 2 for Image Recognition using Region Creep
Figure 3 for Image Recognition using Region Creep
Figure 4 for Image Recognition using Region Creep
Viaarxiv icon

Deep learning and hand-crafted features for virus image classification

Dec 13, 2020
Loris Nanni, Eugenio De Luca, Marco Ludovico Facin, Gianluca Maguolo

Figure 1 for Deep learning and hand-crafted features for virus image classification
Figure 2 for Deep learning and hand-crafted features for virus image classification
Figure 3 for Deep learning and hand-crafted features for virus image classification
Figure 4 for Deep learning and hand-crafted features for virus image classification
Viaarxiv icon

IconQA: A New Benchmark for Abstract Diagram Understanding and Visual Language Reasoning

Nov 07, 2021
Pan Lu, Liang Qiu, Jiaqi Chen, Tony Xia, Yizhou Zhao, Wei Zhang, Zhou Yu, Xiaodan Liang, Song-Chun Zhu

Figure 1 for IconQA: A New Benchmark for Abstract Diagram Understanding and Visual Language Reasoning
Figure 2 for IconQA: A New Benchmark for Abstract Diagram Understanding and Visual Language Reasoning
Figure 3 for IconQA: A New Benchmark for Abstract Diagram Understanding and Visual Language Reasoning
Figure 4 for IconQA: A New Benchmark for Abstract Diagram Understanding and Visual Language Reasoning
Viaarxiv icon

Adaptive Subsampling for ROI-based Visual Tracking: Algorithms and FPGA Implementation

Jan 17, 2022
Odrika Iqbal, Victor Isaac Torres Muro, Sameeksha Katoch, Andreas Spanias, Suren Jayasuriya

Figure 1 for Adaptive Subsampling for ROI-based Visual Tracking: Algorithms and FPGA Implementation
Figure 2 for Adaptive Subsampling for ROI-based Visual Tracking: Algorithms and FPGA Implementation
Figure 3 for Adaptive Subsampling for ROI-based Visual Tracking: Algorithms and FPGA Implementation
Figure 4 for Adaptive Subsampling for ROI-based Visual Tracking: Algorithms and FPGA Implementation
Viaarxiv icon

NTIRE 2020 Challenge on Real Image Denoising: Dataset, Methods and Results

May 08, 2020
Abdelrahman Abdelhamed, Mahmoud Afifi, Radu Timofte, Michael S. Brown, Yue Cao, Zhilu Zhang, Wangmeng Zuo, Xiaoling Zhang, Jiye Liu, Wendong Chen, Changyuan Wen, Meng Liu, Shuailin Lv, Yunchao Zhang, Zhihong Pan, Baopu Li, Teng Xi, Yanwen Fan, Xiyu Yu, Gang Zhang, Jingtuo Liu, Junyu Han, Errui Ding, Songhyun Yu, Bumjun Park, Jechang Jeong, Shuai Liu, Ziyao Zong, Nan Nan, Chenghua Li, Zengli Yang, Long Bao, Shuangquan Wang, Dongwoon Bai, Jungwon Lee, Youngjung Kim, Kyeongha Rho, Changyeop Shin, Sungho Kim, Pengliang Tang, Yiyun Zhao, Yuqian Zhou, Yuchen Fan, Thomas Huang, Zhihao Li, Nisarg A. Shah, Wei Liu, Qiong Yan, Yuzhi Zhao, Marcin Możejko, Tomasz Latkowski, Lukasz Treszczotko, Michał Szafraniuk, Krzysztof Trojanowski, Yanhong Wu, Pablo Navarrete Michelini, Fengshuo Hu, Yunhua Lu, Sujin Kim, Wonjin Kim, Jaayeon Lee, Jang-Hwan Choi, Magauiya Zhussip, Azamat Khassenov, Jong Hyun Kim, Hwechul Cho, Priya Kansal, Sabari Nathan, Zhangyu Ye, Xiwen Lu, Yaqi Wu, Jiangxin Yang, Yanlong Cao, Siliang Tang, Yanpeng Cao, Matteo Maggioni, Ioannis Marras, Thomas Tanay, Gregory Slabaugh, Youliang Yan, Myungjoo Kang, Han-Soo Choi, Kyungmin Song, Shusong Xu, Xiaomu Lu, Tingniao Wang, Chunxia Lei, Bin Liu, Rajat Gupta, Vineet Kumar

Figure 1 for NTIRE 2020 Challenge on Real Image Denoising: Dataset, Methods and Results
Figure 2 for NTIRE 2020 Challenge on Real Image Denoising: Dataset, Methods and Results
Figure 3 for NTIRE 2020 Challenge on Real Image Denoising: Dataset, Methods and Results
Figure 4 for NTIRE 2020 Challenge on Real Image Denoising: Dataset, Methods and Results
Viaarxiv icon

Style-invariant Cardiac Image Segmentation with Test-time Augmentation

Sep 24, 2020
Xiaoqiong Huang, Zejian Chen, Xin Yang, Zhendong Liu, Yuxin Zou, Mingyuan Luo, Wufeng Xue, Dong Ni

Figure 1 for Style-invariant Cardiac Image Segmentation with Test-time Augmentation
Figure 2 for Style-invariant Cardiac Image Segmentation with Test-time Augmentation
Figure 3 for Style-invariant Cardiac Image Segmentation with Test-time Augmentation
Figure 4 for Style-invariant Cardiac Image Segmentation with Test-time Augmentation
Viaarxiv icon

Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World

Jan 21, 2022
Hua Ma, Yinshan Li, Yansong Gao, Alsharif Abuadbba, Zhi Zhang, Anmin Fu, Hyoungshick Kim, Said F. Al-Sarawi, Nepal Surya, Derek Abbott

Figure 1 for Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Figure 2 for Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Figure 3 for Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Figure 4 for Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Viaarxiv icon