Alert button

"Image": models, code, and papers
Alert button

Vision Meets Wireless Positioning: Effective Person Re-identification with Recurrent Context Propagation

Add code
Bookmark button
Alert button
Aug 10, 2020
Yiheng Liu, Wengang Zhou, Mao Xi, Sanjing Shen, Houqiang Li

Figure 1 for Vision Meets Wireless Positioning: Effective Person Re-identification with Recurrent Context Propagation
Figure 2 for Vision Meets Wireless Positioning: Effective Person Re-identification with Recurrent Context Propagation
Figure 3 for Vision Meets Wireless Positioning: Effective Person Re-identification with Recurrent Context Propagation
Figure 4 for Vision Meets Wireless Positioning: Effective Person Re-identification with Recurrent Context Propagation
Viaarxiv icon

Double Backpropagation for Training Autoencoders against Adversarial Attack

Mar 04, 2020
Chengjin Sun, Sizhe Chen, Xiaolin Huang

Figure 1 for Double Backpropagation for Training Autoencoders against Adversarial Attack
Figure 2 for Double Backpropagation for Training Autoencoders against Adversarial Attack
Figure 3 for Double Backpropagation for Training Autoencoders against Adversarial Attack
Figure 4 for Double Backpropagation for Training Autoencoders against Adversarial Attack
Viaarxiv icon

Gated Convolutional Networks with Hybrid Connectivity for Image Classification

Add code
Bookmark button
Alert button
Sep 08, 2019
Chuanguang Yang, Zhulin An, Hui Zhu, Xiaolong Hu, Kun Zhang, Kaiqiang Xu, Chao Li, Yongjun Xu

Figure 1 for Gated Convolutional Networks with Hybrid Connectivity for Image Classification
Figure 2 for Gated Convolutional Networks with Hybrid Connectivity for Image Classification
Figure 3 for Gated Convolutional Networks with Hybrid Connectivity for Image Classification
Figure 4 for Gated Convolutional Networks with Hybrid Connectivity for Image Classification
Viaarxiv icon

Type I Attack for Generative Models

Mar 04, 2020
Chengjin Sun, Sizhe Chen, Jia Cai, Xiaolin Huang

Figure 1 for Type I Attack for Generative Models
Figure 2 for Type I Attack for Generative Models
Figure 3 for Type I Attack for Generative Models
Figure 4 for Type I Attack for Generative Models
Viaarxiv icon

Effect of Input Noise Dimension in GANs

Apr 15, 2020
Manisha Padala, Debojit Das, Sujit Gujar

Figure 1 for Effect of Input Noise Dimension in GANs
Figure 2 for Effect of Input Noise Dimension in GANs
Figure 3 for Effect of Input Noise Dimension in GANs
Figure 4 for Effect of Input Noise Dimension in GANs
Viaarxiv icon

An implementation of an imitation game with ASD children to learn nursery rhymes

Apr 10, 2020
Sao Mai Nguyen, Nathalie Collot-Lavenne, Christophe Lohr, Sébastien Guillon, Patricio Tula, Alvaro Paez, Mouad Bouaida, Arthus Anin, Saad El Qacemi

Figure 1 for An implementation of an imitation game with ASD children to learn nursery rhymes
Viaarxiv icon

The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems

Jul 13, 2020
Hadi Abdullah, Kevin Warren, Vincent Bindschaedler, Nicolas Papernot, Patrick Traynor

Figure 1 for The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
Figure 2 for The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
Figure 3 for The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
Figure 4 for The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
Viaarxiv icon

Identify the cells' nuclei based on the deep learning neural network

Nov 22, 2019
Tianyang Zhang, Rui Ma

Figure 1 for Identify the cells' nuclei based on the deep learning neural network
Figure 2 for Identify the cells' nuclei based on the deep learning neural network
Figure 3 for Identify the cells' nuclei based on the deep learning neural network
Figure 4 for Identify the cells' nuclei based on the deep learning neural network
Viaarxiv icon

Image Segmentation and Restoration Using Parametric Contours With Free Endpoints

Apr 27, 2015
Heike Benninghoff, Harald Garcke

Figure 1 for Image Segmentation and Restoration Using Parametric Contours With Free Endpoints
Figure 2 for Image Segmentation and Restoration Using Parametric Contours With Free Endpoints
Figure 3 for Image Segmentation and Restoration Using Parametric Contours With Free Endpoints
Figure 4 for Image Segmentation and Restoration Using Parametric Contours With Free Endpoints
Viaarxiv icon

Black-Box Saliency Map Generation Using Bayesian Optimisation

Jan 30, 2020
Mamuku Mokuwe, Michael Burke, Anna Sergeevna Bosman

Figure 1 for Black-Box Saliency Map Generation Using Bayesian Optimisation
Figure 2 for Black-Box Saliency Map Generation Using Bayesian Optimisation
Figure 3 for Black-Box Saliency Map Generation Using Bayesian Optimisation
Figure 4 for Black-Box Saliency Map Generation Using Bayesian Optimisation
Viaarxiv icon