Alert button

"Image": models, code, and papers
Alert button

CalliGAN: Style and Structure-aware Chinese Calligraphy Character Generator

May 26, 2020
Shan-Jean Wu, Chih-Yuan Yang, Jane Yung-jen Hsu

Viaarxiv icon

3D Human Shape and Pose from a Single Low-Resolution Image with Self-Supervised Learning

Jul 27, 2020
Xiangyu Xu, Hao Chen, Francesc Moreno-Noguer, Laszlo A. Jeni, Fernando De la Torre

Figure 1 for 3D Human Shape and Pose from a Single Low-Resolution Image with Self-Supervised Learning
Figure 2 for 3D Human Shape and Pose from a Single Low-Resolution Image with Self-Supervised Learning
Figure 3 for 3D Human Shape and Pose from a Single Low-Resolution Image with Self-Supervised Learning
Figure 4 for 3D Human Shape and Pose from a Single Low-Resolution Image with Self-Supervised Learning
Viaarxiv icon

Deblurring by Realistic Blurring

Apr 04, 2020
Kaihao Zhang, Wenhan Luo, Yiran Zhong, Lin Ma, Bjorn Stenger, Wei Liu, Hongdong Li

Figure 1 for Deblurring by Realistic Blurring
Figure 2 for Deblurring by Realistic Blurring
Figure 3 for Deblurring by Realistic Blurring
Figure 4 for Deblurring by Realistic Blurring
Viaarxiv icon

Aerial Imagery Pixel-level Segmentation

Add code
Bookmark button
Alert button
Dec 03, 2020
Michael R. Heffels, Joaquin Vanschoren

Figure 1 for Aerial Imagery Pixel-level Segmentation
Figure 2 for Aerial Imagery Pixel-level Segmentation
Figure 3 for Aerial Imagery Pixel-level Segmentation
Figure 4 for Aerial Imagery Pixel-level Segmentation
Viaarxiv icon

Brain Extraction from Normal and Pathological Images: A Joint PCA/Image-Reconstruction Approach

Add code
Bookmark button
Alert button
Apr 30, 2018
Xu Han, Roland Kwitt, Stephen Aylward, Spyridon Bakas, Bjoern Menze, Alexander Asturias, Paul Vespa, John Van Horn, Marc Niethammer

Figure 1 for Brain Extraction from Normal and Pathological Images: A Joint PCA/Image-Reconstruction Approach
Figure 2 for Brain Extraction from Normal and Pathological Images: A Joint PCA/Image-Reconstruction Approach
Figure 3 for Brain Extraction from Normal and Pathological Images: A Joint PCA/Image-Reconstruction Approach
Figure 4 for Brain Extraction from Normal and Pathological Images: A Joint PCA/Image-Reconstruction Approach
Viaarxiv icon

Calipso: Physics-based Image and Video Editing through CAD Model Proxies

Aug 12, 2017
Nazim Haouchine, Frederick Roy, Hadrien Courtecuisse, Matthias Nießner, Stephane Cotin

Figure 1 for Calipso: Physics-based Image and Video Editing through CAD Model Proxies
Figure 2 for Calipso: Physics-based Image and Video Editing through CAD Model Proxies
Figure 3 for Calipso: Physics-based Image and Video Editing through CAD Model Proxies
Figure 4 for Calipso: Physics-based Image and Video Editing through CAD Model Proxies
Viaarxiv icon

Online Active Proposal Set Generation for Weakly Supervised Object Detection

Jan 20, 2021
Ruibing Jin, Guosheng Lin, Changyun Wen

Figure 1 for Online Active Proposal Set Generation for Weakly Supervised Object Detection
Figure 2 for Online Active Proposal Set Generation for Weakly Supervised Object Detection
Figure 3 for Online Active Proposal Set Generation for Weakly Supervised Object Detection
Figure 4 for Online Active Proposal Set Generation for Weakly Supervised Object Detection
Viaarxiv icon

Nighttime sky/cloud image segmentation

Add code
Bookmark button
Alert button
May 30, 2017
Soumyabrata Dev, Florian M. Savoy, Yee Hui Lee, Stefan Winkler

Figure 1 for Nighttime sky/cloud image segmentation
Figure 2 for Nighttime sky/cloud image segmentation
Figure 3 for Nighttime sky/cloud image segmentation
Figure 4 for Nighttime sky/cloud image segmentation
Viaarxiv icon

HyperFaceNet: A Hyperspectral Face Recognition Method Based on Deep Fusion

Aug 02, 2020
Zhicheng Cao, Xi Cen, Liaojun Pang

Figure 1 for HyperFaceNet: A Hyperspectral Face Recognition Method Based on Deep Fusion
Figure 2 for HyperFaceNet: A Hyperspectral Face Recognition Method Based on Deep Fusion
Figure 3 for HyperFaceNet: A Hyperspectral Face Recognition Method Based on Deep Fusion
Viaarxiv icon

Breaking certified defenses: Semantic adversarial examples with spoofed robustness certificates

Add code
Bookmark button
Alert button
Mar 19, 2020
Amin Ghiasi, Ali Shafahi, Tom Goldstein

Figure 1 for Breaking certified defenses: Semantic adversarial examples with spoofed robustness certificates
Figure 2 for Breaking certified defenses: Semantic adversarial examples with spoofed robustness certificates
Figure 3 for Breaking certified defenses: Semantic adversarial examples with spoofed robustness certificates
Figure 4 for Breaking certified defenses: Semantic adversarial examples with spoofed robustness certificates
Viaarxiv icon