Despite the exciting performance, Transformer is criticized for its exce...
Referring expression comprehension (REC) aims to locate a certain object...
In this paper, we place the atomic action detection problem into a Long-...
In this paper, we are committed to establishing an unified and end-to-en...
The simultaneous recognition of multiple objects in one image remains a
...
While post-training quantization receives popularity mostly due to its
e...
The rapid development of facial manipulation techniques has aroused publ...
With various face presentation attacks arising under unseen scenarios, f...
We study the problem of weakly supervised grounded image captioning. Tha...
Localizing individuals in crowds is more in accordance with the practica...
The Deep Neural Networks are vulnerable toadversarial exam-ples(Figure 1...
In this work, we propose a high fidelity face swapping method, called
Hi...
Non-parametric face modeling aims to reconstruct 3D face only from image...
Demographic bias is a significant challenge in practical face recognitio...
Recent studies reveal that Convolutional Neural Networks (CNNs) are typi...
Inspired by biological evolution, we explain the rationality of Vision
T...
Face anti-spoofing approach based on domain generalization(DG) has drawn...
End-to-end paradigms significantly improve the accuracy of various
deep-...
Deep models have shown their vulnerability when processing adversarial
s...
Channel Pruning has been long adopted for compressing CNNs, which
signif...
While self-supervised representation learning (SSL) has received widespr...
Network pruning is an effective approach to reduce network complexity wi...
Existing online knowledge distillation approaches either adopt the stude...
Few-shot learning (FSL), which aims to recognise new classes by adapting...
Towards better unsupervised domain adaptation (UDA). Recently, researche...
Temporal action localization is an important yet challenging task in vid...
For action recognition learning, 2D CNN-based methods are efficient but ...
Weakly supervised object localization remains an open problem due to the...
Recently, image-to-image translation has made significant progress in
ac...
This paper reports methods and results in the DeeperForensics Challenge ...
Face authentication on mobile end has been widely applied in various
sce...
Popular network pruning algorithms reduce redundant information by optim...
Conventional semi-supervised learning (SSL) methods, e.g., MixMatch, ach...
Descriptive region features extracted by object detection networks have
...
Recent deep-learning based Super-Resolution (SR) methods have achieved
r...
Semi-supervised domain adaptation (SSDA) methods have demonstrated great...
Online image hashing has received increasing research attention recently...
Human motion prediction aims to predict future 3D skeletal sequences by
...
Generative Adversarial Networks (GANs) have been widely-used in image
tr...
Binary Neural Network (BNN) shows its predominance in reducing the compl...
Although Person Re-Identification has made impressive progress, difficul...
Face anti-spoofing is crucial to security of face recognition systems.
P...
Human pose estimation is the task of localizing body keypoints from stil...
Multiple Object Tracking (MOT) is an important task in computer vision. ...
Existing Multiple-Object Tracking (MOT) methods either follow the
tracki...
Greedy-NMS inherently raises a dilemma, where a lower NMS threshold will...
Motivated by the previous success of Two-Dimensional Convolutional Neura...
The latent code of the recent popular model StyleGAN has learned disenta...
Cartoon face detection is a more challenging task than human face detect...
Arbitrary style transfer is a significant topic with both research value...