Alert button

"photo": models, code, and papers
Alert button

Beyond Photo Realism for Domain Adaptation from Synthetic Data

Sep 04, 2019
Kristofer Schlachter, Connor DeFanti, Sebastian Herscher, Ken Perlin, Jonathan Tompson

Figure 1 for Beyond Photo Realism for Domain Adaptation from Synthetic Data
Figure 2 for Beyond Photo Realism for Domain Adaptation from Synthetic Data
Figure 3 for Beyond Photo Realism for Domain Adaptation from Synthetic Data
Figure 4 for Beyond Photo Realism for Domain Adaptation from Synthetic Data
Viaarxiv icon

Photo-Sketching: Inferring Contour Drawings from Images

Add code
Bookmark button
Alert button
Jan 02, 2019
Mengtian Li, Zhe Lin, Radomir Mech, Ersin Yumer, Deva Ramanan

Figure 1 for Photo-Sketching: Inferring Contour Drawings from Images
Figure 2 for Photo-Sketching: Inferring Contour Drawings from Images
Figure 3 for Photo-Sketching: Inferring Contour Drawings from Images
Figure 4 for Photo-Sketching: Inferring Contour Drawings from Images
Viaarxiv icon

Normalized Avatar Synthesis Using StyleGAN and Perceptual Refinement

Add code
Bookmark button
Alert button
Jun 21, 2021
Huiwen Luo, Koki Nagano, Han-Wei Kung, Mclean Goldwhite, Qingguo Xu, Zejian Wang, Lingyu Wei, Liwen Hu, Hao Li

Figure 1 for Normalized Avatar Synthesis Using StyleGAN and Perceptual Refinement
Figure 2 for Normalized Avatar Synthesis Using StyleGAN and Perceptual Refinement
Figure 3 for Normalized Avatar Synthesis Using StyleGAN and Perceptual Refinement
Figure 4 for Normalized Avatar Synthesis Using StyleGAN and Perceptual Refinement
Viaarxiv icon

An Image Forensic Technique Based on JPEG Ghosts

Jun 19, 2021
Divakar Singh

Figure 1 for An Image Forensic Technique Based on JPEG Ghosts
Figure 2 for An Image Forensic Technique Based on JPEG Ghosts
Figure 3 for An Image Forensic Technique Based on JPEG Ghosts
Figure 4 for An Image Forensic Technique Based on JPEG Ghosts
Viaarxiv icon

Preventing Personal Data Theft in Images with Adversarial ML

Add code
Bookmark button
Alert button
Oct 20, 2020
Thomas Cilloni, Wei Wang, Charles Walter, Charles Fleming

Figure 1 for Preventing Personal Data Theft in Images with Adversarial ML
Figure 2 for Preventing Personal Data Theft in Images with Adversarial ML
Figure 3 for Preventing Personal Data Theft in Images with Adversarial ML
Figure 4 for Preventing Personal Data Theft in Images with Adversarial ML
Viaarxiv icon

Automatic Image Stylization Using Deep Fully Convolutional Networks

Nov 27, 2018
Feida Zhu, Yizhou Yu

Figure 1 for Automatic Image Stylization Using Deep Fully Convolutional Networks
Figure 2 for Automatic Image Stylization Using Deep Fully Convolutional Networks
Figure 3 for Automatic Image Stylization Using Deep Fully Convolutional Networks
Figure 4 for Automatic Image Stylization Using Deep Fully Convolutional Networks
Viaarxiv icon

MUSE: Illustrating Textual Attributes by Portrait Generation

Add code
Bookmark button
Alert button
Nov 09, 2020
Xiaodan Hu, Pengfei Yu, Kevin Knight, Heng Ji, Bo Li, Honghui Shi

Figure 1 for MUSE: Illustrating Textual Attributes by Portrait Generation
Figure 2 for MUSE: Illustrating Textual Attributes by Portrait Generation
Figure 3 for MUSE: Illustrating Textual Attributes by Portrait Generation
Figure 4 for MUSE: Illustrating Textual Attributes by Portrait Generation
Viaarxiv icon

Compressive lensless endoscopy with partial speckle scanning

Apr 22, 2021
Stéphanie Guérit, Siddharth Sivankutty, John Aldo Lee, Hervé Rigneault, Laurent Jacques

Figure 1 for Compressive lensless endoscopy with partial speckle scanning
Figure 2 for Compressive lensless endoscopy with partial speckle scanning
Figure 3 for Compressive lensless endoscopy with partial speckle scanning
Figure 4 for Compressive lensless endoscopy with partial speckle scanning
Viaarxiv icon

AVA: Adversarial Vignetting Attack against Visual Recognition

May 12, 2021
Binyu Tian, Felix Juefei-Xu, Qing Guo, Xiaofei Xie, Xiaohong Li, Yang Liu

Figure 1 for AVA: Adversarial Vignetting Attack against Visual Recognition
Figure 2 for AVA: Adversarial Vignetting Attack against Visual Recognition
Figure 3 for AVA: Adversarial Vignetting Attack against Visual Recognition
Figure 4 for AVA: Adversarial Vignetting Attack against Visual Recognition
Viaarxiv icon

Room-Across-Room: Multilingual Vision-and-Language Navigation with Dense Spatiotemporal Grounding

Add code
Bookmark button
Alert button
Oct 15, 2020
Alexander Ku, Peter Anderson, Roma Patel, Eugene Ie, Jason Baldridge

Figure 1 for Room-Across-Room: Multilingual Vision-and-Language Navigation with Dense Spatiotemporal Grounding
Figure 2 for Room-Across-Room: Multilingual Vision-and-Language Navigation with Dense Spatiotemporal Grounding
Figure 3 for Room-Across-Room: Multilingual Vision-and-Language Navigation with Dense Spatiotemporal Grounding
Figure 4 for Room-Across-Room: Multilingual Vision-and-Language Navigation with Dense Spatiotemporal Grounding
Viaarxiv icon