AIMC Journal:
IEEE transactions on pattern analysis and machine intelligence

Showing 161 to 170 of 300 articles

Image Quality Assessment: Unifying Structure and Texture Similarity.

IEEE transactions on pattern analysis and machine intelligence
Objective measures of image quality generally operate by comparing pixels of a "degraded" image to those of the original. Relative to human observers, these measures are overly sensitive to resampling of texture regions (e.g., replacing one patch of ...

Convolutional Prototype Network for Open Set Recognition.

IEEE transactions on pattern analysis and machine intelligence
Despite the success of convolutional neural network (CNN) in conventional closed-set recognition (CSR), it still lacks robustness for dealing with unknowns (those out of known classes) in open environment. To improve the robustness of CNN in open-set...

Neural Shape Parsers for Constructive Solid Geometry.

IEEE transactions on pattern analysis and machine intelligence
Constructive solid geometry (CSG) is a geometric modeling technique that defines complex shapes by recursively applying boolean operations on primitives such as spheres and cylinders. We present CSGNet, a deep network architecture that takes as input...

Optimizing Latent Distributions for Non-Adversarial Generative Networks.

IEEE transactions on pattern analysis and machine intelligence
The generator in generative adversarial networks (GANs) is driven by a discriminator to produce high-quality images through an adversarial game. At the same time, the difficulty of reaching a stable generator has been increased. This paper focuses on...

DiCENet: Dimension-Wise Convolutions for Efficient Networks.

IEEE transactions on pattern analysis and machine intelligence
We introduce a novel and generic convolutional unit, DiCE unit, that is built using dimension-wise convolutions and dimension-wise fusion. The dimension-wise convolutions apply light-weight convolutional filtering across each dimension of the input t...

Universal Adversarial Attack on Attention and the Resulting Dataset DAmageNet.

IEEE transactions on pattern analysis and machine intelligence
Adversarial attacks on deep neural networks (DNNs) have been found for several years. However, the existing adversarial attacks have high success rates only when the information of the victim DNN is well-known or could be estimated by the structure s...

A Survey on Deep Learning Techniques for Stereo-Based Depth Estimation.

IEEE transactions on pattern analysis and machine intelligence
Estimating depth from RGB images is a long-standing ill-posed problem, which has been explored for decades by the computer vision, graphics, and machine learning communities. Among the existing techniques, stereo matching remains one of the most wide...

Depth Selection for Deep ReLU Nets in Feature Extraction and Generalization.

IEEE transactions on pattern analysis and machine intelligence
Deep learning is recognized to be capable of discovering deep features for representation learning and pattern recognition without requiring elegant feature engineering techniques by taking advantages of human ingenuity and prior knowledge. Thus it h...

A Hamiltonian Monte Carlo Method for Probabilistic Adversarial Attack and Learning.

IEEE transactions on pattern analysis and machine intelligence
Although deep convolutional neural networks (CNNs) have demonstrated remarkable performance on multiple computer vision tasks, researches on adversarial learning have shown that deep models are vulnerable to adversarial examples, which are crafted by...

Purely Attention Based Local Feature Integration for Video Classification.

IEEE transactions on pattern analysis and machine intelligence
Recently, substantial research effort has focused on how to apply CNNs or RNNs to better capture temporal patterns in videos, so as to improve the accuracy of video classification. In this paper, we investigate the potential of a purely attention bas...