Zobrazeno 1 - 10
of 404
pro vyhledávání: '"Subramanyam, A V"'
Autor:
Krishna, Madhava, Subramanyam, A V
SimMIM is a widely used method for pretraining vision transformers using masked image modeling. However, despite its success in fine-tuning performance, it has been shown to perform sub-optimally when used for linear probing. We propose an efficient
Externí odkaz:
http://arxiv.org/abs/2407.13873
Despite the rapid advancement in the field of image recognition, the processing of high-resolution imagery remains a computational challenge. However, this processing is pivotal for extracting detailed object insights in areas ranging from autonomous
Externí odkaz:
http://arxiv.org/abs/2405.07166
Autor:
Mishra, Rameshwar, Subramanyam, A V
Advancements in generative models have sparked significant interest in generating images while adhering to specific structural guidelines. Scene graph to image generation is one such task of generating images which are consistent with the given scene
Externí odkaz:
http://arxiv.org/abs/2401.14111
Autor:
Singh, Himanshu, Subramanyam, A V
Adversarial purification using generative models demonstrates strong adversarial defense performance. These methods are classifier and attack-agnostic, making them versatile but often computationally intensive. Recent strides in diffusion and score n
Externí odkaz:
http://arxiv.org/abs/2309.10348
Text-to-Image (T2I) ReID has attracted a lot of attention in the recent past. CUHK-PEDES, RSTPReid and ICFG-PEDES are the three available benchmarks to evaluate T2I ReID methods. RSTPReid and ICFG-PEDES comprise of identities from MSMT17 but due to l
Externí odkaz:
http://arxiv.org/abs/2305.04497
Autor:
Verma, Astha, Subramanyam, A V, Bangar, Siddhesh, Lal, Naman, Shah, Rajiv Ratn, Satoh, Shin'ichi
Certified defense methods against adversarial perturbations have been recently investigated in the black-box setting with a zeroth-order (ZO) perspective. However, these methods suffer from high model variance with low performance on high-dimensional
Externí odkaz:
http://arxiv.org/abs/2304.06430
Autor:
Subramanyam, A V
Adversarial attacks have been recently investigated in person re-identification. These attacks perform well under cross dataset or cross model setting. However, the challenges present in cross-dataset cross-model scenario does not allow these models
Externí odkaz:
http://arxiv.org/abs/2301.06286
Autor:
Subramanyam, A. V.
Optimal transport (OT) based distributional robust optimisation (DRO) has received some traction in the recent past. However, it is at a nascent stage but has a sound potential in robustifying the deep learning models. Interestingly, OT barycenters d
Externí odkaz:
http://arxiv.org/abs/2301.01495
We consider the problem of designing a circularly polarized Fabry-P'erot cavity (FPC) antenna for S-band sensing applications such as satellite navigation and communication. The spatial distribution of peripheral roughness of the unit cell of FPC's p
Externí odkaz:
http://arxiv.org/abs/2209.14550
Java is the backbone of widely used big data frameworks, such as Apache Spark, due to its productivity, portability from JVM-based execution, and support for a rich set of libraries. However, the performance of these applications can widely vary depe
Externí odkaz:
http://arxiv.org/abs/2009.06374