2021 IEEE Winter Conference on Applications of Computer Vision Workshops (WACVW)最新文献

筛选
英文 中文
Domain Adaptive Knowledge Distillation for Driving Scene Semantic Segmentation 基于领域自适应知识蒸馏的驾驶场景语义分割
2021 IEEE Winter Conference on Applications of Computer Vision Workshops (WACVW) Pub Date : 2020-11-03 DOI: 10.1109/WACVW52041.2021.00019
D. Kothandaraman, Athira M. Nambiar, Anurag Mittal
{"title":"Domain Adaptive Knowledge Distillation for Driving Scene Semantic Segmentation","authors":"D. Kothandaraman, Athira M. Nambiar, Anurag Mittal","doi":"10.1109/WACVW52041.2021.00019","DOIUrl":"https://doi.org/10.1109/WACVW52041.2021.00019","url":null,"abstract":"Practical autonomous driving systems face two crucial challenges: memory constraints and domain gap issues. In this paper, we present a novel approach to learn domain adaptive knowledge in models with limited memory, thus bestowing the model with the ability to deal with these issues in a comprehensive manner. We term this as “Domain Adaptive Knowledge Distillation ” and address the same in the context of unsupervised domain-adaptive semantic segmentation by proposing a multi-level distillation strategy to effectively distil knowledge at different levels. Further, we introduce a novel cross entropy loss that leverages pseudo labels from the teacher. These pseudo teacher labels play a multifaceted role towards: (i) knowledge distillation from the teacher network to the student network & (ii) serving as a proxy for the ground truth for target domain images, where the problem is completely unsupervised. We introduce four paradigms for distilling domain adaptive knowledge and carry out extensive experiments and ablation studies on real-to-real as well as synthetic-to-real scenarios. Our experiments demonstrate the profound success of our proposed method.","PeriodicalId":313062,"journal":{"name":"2021 IEEE Winter Conference on Applications of Computer Vision Workshops (WACVW)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114836047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Per-frame mAP Prediction for Continuous Performance Monitoring of Object Detection During Deployment 部署过程中目标检测连续性能监控的逐帧mAP预测
2021 IEEE Winter Conference on Applications of Computer Vision Workshops (WACVW) Pub Date : 2020-09-18 DOI: 10.1109/WACVW52041.2021.00021
Q. Rahman, N. Sunderhauf, Feras Dayoub
{"title":"Per-frame mAP Prediction for Continuous Performance Monitoring of Object Detection During Deployment","authors":"Q. Rahman, N. Sunderhauf, Feras Dayoub","doi":"10.1109/WACVW52041.2021.00021","DOIUrl":"https://doi.org/10.1109/WACVW52041.2021.00021","url":null,"abstract":"Performance monitoring of object detection is crucial for safety-critical applications such as autonomous vehicles that operate under varying and complex environmental conditions. Currently, object detectors are evaluated using summary metrics based on a single dataset that is assumed to be representative of all future deployment conditions. In practice, this assumption does not hold, and the performance fluctuates as a function of the deployment conditions. To address this issue, we propose an introspection approach to performance monitoring during deployment without the need for ground truth data. We do so by predicting when the per-frame mean average precision drops below a critical threshold using the detector’s internal features. We quantitatively evaluate and demonstrate our method’s ability to reduce risk by trading off making an incorrect decision by raising the alarm and absenting from detection.","PeriodicalId":313062,"journal":{"name":"2021 IEEE Winter Conference on Applications of Computer Vision Workshops (WACVW)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131469969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Interpretable security analysis of cancellable biometrics using constrained-optimized similarity-based attack 使用约束优化的基于相似性攻击的可取消生物特征的可解释安全性分析
2021 IEEE Winter Conference on Applications of Computer Vision Workshops (WACVW) Pub Date : 2020-06-23 DOI: 10.1109/WACVW52041.2021.00012
Hanrui Wang, Xingbo Dong, Zhe Jin, A. Teoh, M. Tistarelli
{"title":"Interpretable security analysis of cancellable biometrics using constrained-optimized similarity-based attack","authors":"Hanrui Wang, Xingbo Dong, Zhe Jin, A. Teoh, M. Tistarelli","doi":"10.1109/WACVW52041.2021.00012","DOIUrl":"https://doi.org/10.1109/WACVW52041.2021.00012","url":null,"abstract":"In cancellable biometrics (CB) schemes, template security is achieved by applying, mainly non-linear, transformations to the biometric template. The transformation is designed to preserve the template distance/similarity in the transformed domain. Despite its effectiveness, the security issues attributed to similarity preservation property of CB are underestimated. Dong et al. [BTAS’19], exploited the similarity preservation trait of CB and proposed a similarity-based attack with high successful attack rate. The similarity-based attack utilizes preimage that are generated from the protected biometric template for impersonation and perform cross matching. In this paper, we propose a constrained optimization similarity-based attack (CSA), which is improved upon Dong’s genetic algorithm enabled similarity-based attack (GASA). The CSA applies algorithm-specific equality or inequality relations as constraints, to optimize preimage generation. We interpret the effectiveness of CSA from the supervised learning perspective. We identify such constraints then conduct extensive experiments to demonstrate CSA against CB with LFW face dataset. The results suggest that CSA is effective to breach IoM hashing and BioHashing security, and outperforms GASA significantly. Inferring from the above results, we further remark that, other than IoM and BioHashing, CSA is critical to other CB schemes as far as the constraints can be formulated. Furthermore, we reveal the correlation of hash code size and the attack performance of CSA.","PeriodicalId":313062,"journal":{"name":"2021 IEEE Winter Conference on Applications of Computer Vision Workshops (WACVW)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133473796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信