Alert button

"Information": models, code, and papers
Alert button

Feature Importance-aware Transferable Adversarial Attacks

Add code
Bookmark button
Alert button
Jul 29, 2021
Zhibo Wang, Hengchang Guo, Zhifei Zhang, Wenxin Liu, Zhan Qin, Kui Ren

Figure 1 for Feature Importance-aware Transferable Adversarial Attacks
Figure 2 for Feature Importance-aware Transferable Adversarial Attacks
Figure 3 for Feature Importance-aware Transferable Adversarial Attacks
Figure 4 for Feature Importance-aware Transferable Adversarial Attacks
Viaarxiv icon

An Intelligent Recommendation-cum-Reminder System

Aug 09, 2021
Rohan Saxena, Maheep Chaudhary, Chandresh Kumar Maurya, Shitala Prasad

Figure 1 for An Intelligent Recommendation-cum-Reminder System
Figure 2 for An Intelligent Recommendation-cum-Reminder System
Figure 3 for An Intelligent Recommendation-cum-Reminder System
Figure 4 for An Intelligent Recommendation-cum-Reminder System
Viaarxiv icon

Self adversarial attack as an augmentation method for immunohistochemical stainings

Mar 21, 2021
Jelica Vasiljević, Friedrich Feuerhake, Cédric Wemmert, Thomas Lampert

Figure 1 for Self adversarial attack as an augmentation method for immunohistochemical stainings
Figure 2 for Self adversarial attack as an augmentation method for immunohistochemical stainings
Figure 3 for Self adversarial attack as an augmentation method for immunohistochemical stainings
Figure 4 for Self adversarial attack as an augmentation method for immunohistochemical stainings
Viaarxiv icon

PPT Fusion: Pyramid Patch Transformerfor a Case Study in Image Fusion

Jul 29, 2021
Yu Fu, TianYang Xu, XiaoJun Wu, Josef Kittler

Figure 1 for PPT Fusion: Pyramid Patch Transformerfor a Case Study in Image Fusion
Figure 2 for PPT Fusion: Pyramid Patch Transformerfor a Case Study in Image Fusion
Figure 3 for PPT Fusion: Pyramid Patch Transformerfor a Case Study in Image Fusion
Figure 4 for PPT Fusion: Pyramid Patch Transformerfor a Case Study in Image Fusion
Viaarxiv icon

Model Uncertainty and Correctability for Directed Graphical Models

Jul 17, 2021
Panagiota Birmpa, Jinchao Feng, Markos A. Katsoulakis, Luc Rey-Bellet

Figure 1 for Model Uncertainty and Correctability for Directed Graphical Models
Figure 2 for Model Uncertainty and Correctability for Directed Graphical Models
Figure 3 for Model Uncertainty and Correctability for Directed Graphical Models
Figure 4 for Model Uncertainty and Correctability for Directed Graphical Models
Viaarxiv icon

Adaptive Event Detection for Representative Load Signature Extraction

Jul 23, 2021
Lei Yan, Wei Tian, Jiayu Han, Zuyi Li

Figure 1 for Adaptive Event Detection for Representative Load Signature Extraction
Figure 2 for Adaptive Event Detection for Representative Load Signature Extraction
Figure 3 for Adaptive Event Detection for Representative Load Signature Extraction
Figure 4 for Adaptive Event Detection for Representative Load Signature Extraction
Viaarxiv icon

Perception Framework through Real-Time Semantic Segmentation and Scene Recognition on a Wearable System for the Visually Impaired

Mar 06, 2021
Yingzhi Zhang, Haoye Chen, Kailun Yang, Jiaming Zhang, Rainer Stiefelhagen

Figure 1 for Perception Framework through Real-Time Semantic Segmentation and Scene Recognition on a Wearable System for the Visually Impaired
Figure 2 for Perception Framework through Real-Time Semantic Segmentation and Scene Recognition on a Wearable System for the Visually Impaired
Figure 3 for Perception Framework through Real-Time Semantic Segmentation and Scene Recognition on a Wearable System for the Visually Impaired
Figure 4 for Perception Framework through Real-Time Semantic Segmentation and Scene Recognition on a Wearable System for the Visually Impaired
Viaarxiv icon

Secure Dual-Functional Radar-Communication Transmission: Exploiting Interference for Resilience Against Target Eavesdropping

Jul 10, 2021
Nanchi Su, Fan Liu, Zhongxiang Wei, Ya-Feng Liu, Christos Masouros

Figure 1 for Secure Dual-Functional Radar-Communication Transmission: Exploiting Interference for Resilience Against Target Eavesdropping
Figure 2 for Secure Dual-Functional Radar-Communication Transmission: Exploiting Interference for Resilience Against Target Eavesdropping
Figure 3 for Secure Dual-Functional Radar-Communication Transmission: Exploiting Interference for Resilience Against Target Eavesdropping
Figure 4 for Secure Dual-Functional Radar-Communication Transmission: Exploiting Interference for Resilience Against Target Eavesdropping
Viaarxiv icon

LRG at TREC 2020: Document Ranking with XLNet-Based Models

Mar 06, 2021
Abheesht Sharma, Harshit Pandey

Figure 1 for LRG at TREC 2020: Document Ranking with XLNet-Based Models
Figure 2 for LRG at TREC 2020: Document Ranking with XLNet-Based Models
Figure 3 for LRG at TREC 2020: Document Ranking with XLNet-Based Models
Figure 4 for LRG at TREC 2020: Document Ranking with XLNet-Based Models
Viaarxiv icon

SmartHand: Towards Embedded Smart Hands for Prosthetic and Robotic Applications

Jul 23, 2021
Xiaying Wang, Fabian Geiger, Vlad Niculescu, Michele Magno, Luca Benini

Figure 1 for SmartHand: Towards Embedded Smart Hands for Prosthetic and Robotic Applications
Figure 2 for SmartHand: Towards Embedded Smart Hands for Prosthetic and Robotic Applications
Figure 3 for SmartHand: Towards Embedded Smart Hands for Prosthetic and Robotic Applications
Figure 4 for SmartHand: Towards Embedded Smart Hands for Prosthetic and Robotic Applications
Viaarxiv icon