This paper introduces the first two pixel retrieval benchmarks. Pixel
re...
Auxiliary features such as geometric buffers (G-buffers) and path descri...
Deep neural networks are susceptible to adversarial attacks due to the
a...
Adversarial attacks with improved transferability - the ability of an
ad...
Unsupervised person re-identification (re-ID) aims at learning discrimin...