
Efficient Inference and Exploration for Reinforcement Learning
Despite an ever growing literature on reinforcement learning algorithms ...
read it

AdapNet: Adaptability Decomposing EncoderDecoder Network for Weakly Supervised Action Recognition and Localization
The point process is a solid framework to model sequential data, such as...
read it

Learning Poseinvariant 3D Object Reconstruction from Singleview Images
Learning to reconstruct 3D shapes using 2D images is an active research ...
read it

Learning to Align Images using Weak Geometric Supervision
Image alignment tasks require accurate pixel correspondences, which are ...
read it

Temporal Sparse Adversarial Attack on Gait Recognition
Gait recognition has a broad application in social security due to its a...
read it

What Is the Best Practice for CNNs Applied to Visual Instance Retrieval?
Previous work has shown that feature maps of deep convolutional neural n...
read it

4D Crop Monitoring: SpatioTemporal Reconstruction for Agriculture
Autonomous crop monitoring at high spatial and temporal resolution is a ...
read it

Ensemble Reversible Data Hiding
The conventional reversible data hiding (RDH) algorithms often consider ...
read it

SSGAN: Secure Steganography Based on Generative Adversarial Networks
In this paper, a novel strategy of Secure Steganograpy based on Generati...
read it

DeepFirearm: Learning Discriminative Feature Representation for Finegrained Firearm Retrieval
There are great demands for automatically regulating inappropriate appea...
read it

Deep Steganalysis: EndtoEnd Learning with Supervisory Information beyond Class Labels
Recently, deep learning has shown its power in steganalysis. However, th...
read it

STEAP: simultaneous trajectory estimation and planning
We present a unified probabilistic framework for simultaneous trajectory...
read it

A Graphtheoretic Model to Steganography on Social Networks
Steganography aims to conceal the very fact that the communication takes...
read it

Reversible Embedding to Covers Full of Boundaries
In reversible data embedding, to avoid overflow and underflow problem, b...
read it

The Cut and Dominating Set Problem in A Steganographer Network
A steganographer network corresponds to a graphic structure that the inv...
read it

On the generalization of GAN image forensics
Recently the GAN generated face images are more and more realistic with ...
read it

miniSAM: A Flexible Factor Graph Nonlinear Least Squares Optimization Framework
Many problems in computer vision and robotics can be phrased as nonline...
read it

Statistical Inference for Model Parameters in Stochastic Gradient Descent via Batch Means
Statistical inference of true model parameters based on stochastic gradi...
read it

A New Ensemble Method for Concessively Targeted Multimodel Attack
It is well known that deep learning models are vulnerable to adversarial...
read it

Replica Exchange for NonConvex Optimization
Gradient descent (GD) is known to converge quickly for convex objective ...
read it
Jing Dong
is this you? claim profile