Alert button

"Image": models, code, and papers
Alert button

A Novel Color Edge Detection Algorithm Based on Quaternion Hardy Filter

Jul 17, 2018
Wen-shan Bi, Kit Ian Kou

Figure 1 for A Novel Color Edge Detection Algorithm Based on Quaternion Hardy Filter
Figure 2 for A Novel Color Edge Detection Algorithm Based on Quaternion Hardy Filter
Figure 3 for A Novel Color Edge Detection Algorithm Based on Quaternion Hardy Filter
Figure 4 for A Novel Color Edge Detection Algorithm Based on Quaternion Hardy Filter
Viaarxiv icon

End-to-End Denoising of Dark Burst Images Using Recurrent Fully Convolutional Networks

Add code
Bookmark button
Alert button
Apr 16, 2019
Di Zhao, Lan Ma, Songnan Li, Dahai Yu

Figure 1 for End-to-End Denoising of Dark Burst Images Using Recurrent Fully Convolutional Networks
Figure 2 for End-to-End Denoising of Dark Burst Images Using Recurrent Fully Convolutional Networks
Figure 3 for End-to-End Denoising of Dark Burst Images Using Recurrent Fully Convolutional Networks
Figure 4 for End-to-End Denoising of Dark Burst Images Using Recurrent Fully Convolutional Networks
Viaarxiv icon

Counterfactual Visual Explanations

Apr 16, 2019
Yash Goyal, Ziyan Wu, Jan Ernst, Dhruv Batra, Devi Parikh, Stefan Lee

Figure 1 for Counterfactual Visual Explanations
Figure 2 for Counterfactual Visual Explanations
Figure 3 for Counterfactual Visual Explanations
Figure 4 for Counterfactual Visual Explanations
Viaarxiv icon

Wireless Software Synchronization of Multiple Distributed Cameras

Dec 21, 2018
Sameer Ansari, Neal Wadhwa, Rahul Garg, Jiawen Chen

Figure 1 for Wireless Software Synchronization of Multiple Distributed Cameras
Figure 2 for Wireless Software Synchronization of Multiple Distributed Cameras
Figure 3 for Wireless Software Synchronization of Multiple Distributed Cameras
Figure 4 for Wireless Software Synchronization of Multiple Distributed Cameras
Viaarxiv icon

DeepFont: Identify Your Font from An Image

Add code
Bookmark button
Alert button
Jul 12, 2015
Zhangyang Wang, Jianchao Yang, Hailin Jin, Eli Shechtman, Aseem Agarwala, Jonathan Brandt, Thomas S. Huang

Figure 1 for DeepFont: Identify Your Font from An Image
Figure 2 for DeepFont: Identify Your Font from An Image
Figure 3 for DeepFont: Identify Your Font from An Image
Figure 4 for DeepFont: Identify Your Font from An Image
Viaarxiv icon

deepCR: Cosmic Ray Rejection with Deep Learning

Add code
Bookmark button
Alert button
Jul 22, 2019
Keming Zhang, Joshua S. Bloom

Figure 1 for deepCR: Cosmic Ray Rejection with Deep Learning
Figure 2 for deepCR: Cosmic Ray Rejection with Deep Learning
Figure 3 for deepCR: Cosmic Ray Rejection with Deep Learning
Figure 4 for deepCR: Cosmic Ray Rejection with Deep Learning
Viaarxiv icon

Transformed Subspace Clustering

Dec 10, 2019
Jyoti Maggu, Angshul Majumdar, Emilie Chouzenoux

Figure 1 for Transformed Subspace Clustering
Figure 2 for Transformed Subspace Clustering
Figure 3 for Transformed Subspace Clustering
Figure 4 for Transformed Subspace Clustering
Viaarxiv icon

Analysis of Video Feature Learning in Two-Stream CNNs on the Example of Zebrafish Swim Bout Classification

Add code
Bookmark button
Alert button
Dec 20, 2019
Bennet Breier, Arno Onken

Figure 1 for Analysis of Video Feature Learning in Two-Stream CNNs on the Example of Zebrafish Swim Bout Classification
Figure 2 for Analysis of Video Feature Learning in Two-Stream CNNs on the Example of Zebrafish Swim Bout Classification
Figure 3 for Analysis of Video Feature Learning in Two-Stream CNNs on the Example of Zebrafish Swim Bout Classification
Figure 4 for Analysis of Video Feature Learning in Two-Stream CNNs on the Example of Zebrafish Swim Bout Classification
Viaarxiv icon

Transfer Learning with Edge Attention for Prostate MRI Segmentation

Dec 20, 2019
Xiangxiang Qin

Figure 1 for Transfer Learning with Edge Attention for Prostate MRI Segmentation
Figure 2 for Transfer Learning with Edge Attention for Prostate MRI Segmentation
Figure 3 for Transfer Learning with Edge Attention for Prostate MRI Segmentation
Viaarxiv icon

WITCHcraft: Efficient PGD attacks with random step size

Nov 18, 2019
Ping-Yeh Chiang, Jonas Geiping, Micah Goldblum, Tom Goldstein, Renkun Ni, Steven Reich, Ali Shafahi

Figure 1 for WITCHcraft: Efficient PGD attacks with random step size
Figure 2 for WITCHcraft: Efficient PGD attacks with random step size
Figure 3 for WITCHcraft: Efficient PGD attacks with random step size
Figure 4 for WITCHcraft: Efficient PGD attacks with random step size
Viaarxiv icon