A Simple but Effective Method for Balancing Detection and Re-Identification in Multi-Object Tracking
Abstract: In recent years, joint detection and embedding (JDE) has become the research focus in multi-object tracking (MOT) due to its fast inference speed. JDE models are designed and widely utilized ...
Abstract: Adversarial examples (AEs) are typical model evasion attacks and security threats in deep neural networks (DNNs). One of the countermeasures is adversarial training (AT), and it trains DNNs ...
So many productivity methods ask you to prioritize your daily tasks by considering how much time or effort they'll require, then tackling the resource-heavy ones first. For some people, that's a solid ...
This is a simple cpp static analysis framework developed during a software engineering lab course of Nanjing University. The project is personal and distributed under GNU general public license. The ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results