Picture for Rajeev Ranjan

Rajeev Ranjan

University of Maryland

Data Pruning via Separability, Integrity, and Model Uncertainty-Aware Importance Sampling

Add code
Sep 20, 2024
Figure 1 for Data Pruning via Separability, Integrity, and Model Uncertainty-Aware Importance Sampling
Figure 2 for Data Pruning via Separability, Integrity, and Model Uncertainty-Aware Importance Sampling
Figure 3 for Data Pruning via Separability, Integrity, and Model Uncertainty-Aware Importance Sampling
Figure 4 for Data Pruning via Separability, Integrity, and Model Uncertainty-Aware Importance Sampling
Viaarxiv icon

Minutiae-Guided Fingerprint Embeddings via Vision Transformers

Add code
Oct 26, 2022
Viaarxiv icon

Deep Convolutional Neural Networks in the Face of Caricature: Identity and Image Revealed

Add code
Dec 28, 2018
Figure 1 for Deep Convolutional Neural Networks in the Face of Caricature: Identity and Image Revealed
Figure 2 for Deep Convolutional Neural Networks in the Face of Caricature: Identity and Image Revealed
Figure 3 for Deep Convolutional Neural Networks in the Face of Caricature: Identity and Image Revealed
Figure 4 for Deep Convolutional Neural Networks in the Face of Caricature: Identity and Image Revealed
Viaarxiv icon

An Automatic System for Unconstrained Video-Based Face Recognition

Add code
Dec 10, 2018
Figure 1 for An Automatic System for Unconstrained Video-Based Face Recognition
Figure 2 for An Automatic System for Unconstrained Video-Based Face Recognition
Figure 3 for An Automatic System for Unconstrained Video-Based Face Recognition
Figure 4 for An Automatic System for Unconstrained Video-Based Face Recognition
Viaarxiv icon

A Proposal-Based Solution to Spatio-Temporal Action Detection in Untrimmed Videos

Add code
Nov 23, 2018
Figure 1 for A Proposal-Based Solution to Spatio-Temporal Action Detection in Untrimmed Videos
Figure 2 for A Proposal-Based Solution to Spatio-Temporal Action Detection in Untrimmed Videos
Figure 3 for A Proposal-Based Solution to Spatio-Temporal Action Detection in Untrimmed Videos
Figure 4 for A Proposal-Based Solution to Spatio-Temporal Action Detection in Untrimmed Videos
Viaarxiv icon

A Fast and Accurate System for Face Detection, Identification, and Verification

Add code
Sep 20, 2018
Figure 1 for A Fast and Accurate System for Face Detection, Identification, and Verification
Figure 2 for A Fast and Accurate System for Face Detection, Identification, and Verification
Figure 3 for A Fast and Accurate System for Face Detection, Identification, and Verification
Figure 4 for A Fast and Accurate System for Face Detection, Identification, and Verification
Viaarxiv icon

Locate, Segment and Match: A Pipeline for Object Matching and Registration

Add code
May 01, 2018
Figure 1 for Locate, Segment and Match: A Pipeline for Object Matching and Registration
Figure 2 for Locate, Segment and Match: A Pipeline for Object Matching and Registration
Figure 3 for Locate, Segment and Match: A Pipeline for Object Matching and Registration
Figure 4 for Locate, Segment and Match: A Pipeline for Object Matching and Registration
Viaarxiv icon

Light-weight Head Pose Invariant Gaze Tracking

Add code
Apr 23, 2018
Figure 1 for Light-weight Head Pose Invariant Gaze Tracking
Figure 2 for Light-weight Head Pose Invariant Gaze Tracking
Figure 3 for Light-weight Head Pose Invariant Gaze Tracking
Figure 4 for Light-weight Head Pose Invariant Gaze Tracking
Viaarxiv icon

Crystal Loss and Quality Pooling for Unconstrained Face Verification and Recognition

Add code
Apr 03, 2018
Figure 1 for Crystal Loss and Quality Pooling for Unconstrained Face Verification and Recognition
Figure 2 for Crystal Loss and Quality Pooling for Unconstrained Face Verification and Recognition
Figure 3 for Crystal Loss and Quality Pooling for Unconstrained Face Verification and Recognition
Figure 4 for Crystal Loss and Quality Pooling for Unconstrained Face Verification and Recognition
Viaarxiv icon

Improving Network Robustness against Adversarial Attacks with Compact Convolution

Add code
Mar 22, 2018
Figure 1 for Improving Network Robustness against Adversarial Attacks with Compact Convolution
Figure 2 for Improving Network Robustness against Adversarial Attacks with Compact Convolution
Figure 3 for Improving Network Robustness against Adversarial Attacks with Compact Convolution
Figure 4 for Improving Network Robustness against Adversarial Attacks with Compact Convolution
Viaarxiv icon