Picture for Marcello Pelillo

Marcello Pelillo

Re-assembling the past: The RePAIR dataset and benchmark for real world 2D and 3D puzzle solving

Add code
Oct 31, 2024
Viaarxiv icon

Nash Meets Wertheimer: Using Good Continuation in Jigsaw Puzzles

Add code
Oct 22, 2024
Viaarxiv icon

Boosting CNN-based Handwriting Recognition Systems with Learnable Relaxation Labeling

Add code
Sep 09, 2024
Viaarxiv icon

Understanding XAI Through the Philosopher's Lens: A Historical Perspective

Add code
Jul 26, 2024
Viaarxiv icon

$σ$-zero: Gradient-based Optimization of $\ell_0$-norm Adversarial Examples

Add code
Feb 02, 2024
Viaarxiv icon

Minimizing Energy Consumption of Deep Learning Models by Energy-Aware Training

Add code
Jul 01, 2023
Figure 1 for Minimizing Energy Consumption of Deep Learning Models by Energy-Aware Training
Figure 2 for Minimizing Energy Consumption of Deep Learning Models by Energy-Aware Training
Figure 3 for Minimizing Energy Consumption of Deep Learning Models by Energy-Aware Training
Figure 4 for Minimizing Energy Consumption of Deep Learning Models by Energy-Aware Training
Viaarxiv icon

Reassembling Broken Objects using Breaking Curves

Add code
Jun 05, 2023
Viaarxiv icon

Multi-Phase Relaxation Labeling for Square Jigsaw Puzzle Solving

Add code
Mar 26, 2023
Viaarxiv icon

Geolocation of Cultural Heritage using Multi-View Knowledge Graph Embedding

Add code
Sep 08, 2022
Figure 1 for Geolocation of Cultural Heritage using Multi-View Knowledge Graph Embedding
Figure 2 for Geolocation of Cultural Heritage using Multi-View Knowledge Graph Embedding
Figure 3 for Geolocation of Cultural Heritage using Multi-View Knowledge Graph Embedding
Figure 4 for Geolocation of Cultural Heritage using Multi-View Knowledge Graph Embedding
Viaarxiv icon

Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning

Add code
May 04, 2022
Figure 1 for Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning
Figure 2 for Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning
Figure 3 for Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning
Figure 4 for Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning
Viaarxiv icon