关注
Thomas TANAY
Thomas TANAY
Huawei Technologies Ltd
在 huawei.com 的电子邮件经过验证
标题
引用次数
引用次数
年份
A boundary tilting persepective on the phenomenon of adversarial examples
T Tanay, L Griffin
arXiv preprint arXiv:1608.07690, 2016
3062016
AI-enabled future crime
M Caldwell, JTA Andrews, T Tanay, LD Griffin
Crime Science 9 (1), 1-13, 2020
1542020
Transfer representation-learning for anomaly detection
J Andrews, T Tanay, EJ Morton, LD Griffin
JMLR, 2016
1462016
Batch normalization is a cause of adversarial vulnerability
A Galloway, A Golubeva, T Tanay, M Moussa, GW Taylor
arXiv preprint arXiv:1905.02161, 2019
942019
Ntire 2020 challenge on real image denoising: Dataset, methods and results
A Abdelhamed, M Afifi, R Timofte, MS Brown
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2020
842020
NTIRE 2021 challenge on quality enhancement of compressed video: Methods and results
R Yang
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021
412021
Adversarial training versus weight decay
A Galloway, T Tanay, GW Taylor
arXiv preprint arXiv:1804.03308, 2018
182018
Flexhdr: Modeling alignment and exposure uncertainties for flexible hdr imaging
S Catley-Chandar, T Tanay, L Vandroux, A Leonardis, G Slabaugh, ...
IEEE Transactions on Image Processing 31, 5923-5935, 2022
162022
Built-in vulnerabilities to imperceptible adversarial perturbations
T Tanay, JTA Andrews, LD Griffin
arXiv preprint arXiv:1806.07409, 2018
112018
AI-Enabled Future Crime. Crime Science. 9 (1), 14
M Caldwell, JTA Andrews, T Tanay, LD Griffin
92020
Diagnosing and preventing instabilities in recurrent video processing
T Tanay, A Sootla, M Maggioni, PK Dokania, P Torr, A Leonardis, ...
IEEE Transactions on Pattern Analysis and Machine Intelligence 45 (2), 1594-1605, 2022
82022
A new angle on L2 regularization
T Tanay, LD Griffin
arXiv preprint arXiv:1806.11186, 2018
82018
Multiple-identity image attacks against face-based identity verification
JTA Andrews, T Tanay, LD Griffin
arXiv preprint arXiv:1906.08507, 2019
72019
Stochastic diffusion search applied to trees: a swarm intelligence heuristic performing monte-carlo tree search
T Tanay, J Bishop, S Nasuto, EB Roesch, M Spencer
Proceedings of the AISB, 2013
62013
Exploration of the functional properties of interaction: computer models and pointers for theory
EB Roesch, M Spencer, SJ Nasuto, T Tanay, JM Bishop
Constructivist Foundations 9 (1), 26-33, 2013
52013
A boundary tilting persepective on the phenomenon of adversarial examples (2016)
T Tanay, L Griffin
arXiv preprint arXiv:1608.07690, 0
5
Vschh 2023: A benchmark for the view synthesis challenge of human heads
Y Jang, J Zheng, J Song, H Dhamo, E Pérez-Pellitero, T Tanay, ...
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2023
42023
Tunable convolutions with parametric multi-loss optimization
M Maggioni, T Tanay, F Babiloni, S McDonagh, A Leonardis
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023
42023
Abstract platforms of computation
MC Spencer, EB Roesch, SJ Nasuto, T Tanay, JM Bishop
42013
Factorized dynamic fully-connected layers for neural networks
F Babiloni, T Tanay, J Deng, M Maggioni, S Zafeiriou
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2023
22023
系统目前无法执行此操作,请稍后再试。
文章 1–20