Results 111 to 120 of about 39,099 (266)

Research on The Security of Face Recognition Systems Based on Digital and Physical Counterattacks [PDF]

open access: yesITM Web of Conferences
Adversarial attacks have become an important direction in the research of their security by generating adversarial samples or physically interfering to deceive face recognition systems. This study compares the two methods of digital and physical attacks,
Ma Tengyan
doaj   +1 more source

Barnes Hospital Bulletin [PDF]

open access: yes, 1980
https://digitalcommons.wustl.edu/bjc_barnes_bulletin/1175/thumbnail ...

core   +1 more source

Out-of-Sample Extension for Dimensionality Reduction of Noisy Time Series

open access: yes, 2017
This paper proposes an out-of-sample extension framework for a global manifold learning algorithm (Isomap) that uses temporal information in out-of-sample points in order to make the embedding more robust to noise and artifacts. Given a set of noise-free
Dadkhahi, Hamid   +2 more
core   +1 more source

Properties of minimal charts and their applications IV: Loops [PDF]

open access: yes, 2016
We investigate minimal charts with loops, a simple closed curve consisting of edges of label $m$ containing exactly one white vertex. We shall show that there does not exist any loop in a minimal chart with exactly seven white vertices in this paper ...
Nagase, Teruo, Shima, Akiko
core  

A Style-Based Generator Architecture for Generative Adversarial Networks

open access: yes, 2019
We propose an alternative generator architecture for generative adversarial networks, borrowing from style transfer literature. The new architecture leads to an automatically learned, unsupervised separation of high-level attributes (e.g., pose and ...
Aila, Timo, Karras, Tero, Laine, Samuli
core   +1 more source

Autoencoding beyond pixels using a learned similarity metric [PDF]

open access: yes, 2016
We present an autoencoder that leverages learned representations to better measure similarities in data space. By combining a variational autoencoder with a generative adversarial network we can use learned feature representations in the GAN ...
Larochelle, Hugo   +3 more
core   +1 more source

A novel method to evaluate interproximal accessibility of caregivers' tooth brushing by using "invisibility" eyeglasses [PDF]

open access: diamond, 2018
Hayato Ohshima   +5 more
openalex   +1 more source

School Leader Update, May 2009 [PDF]

open access: yes, 2009
Monthly newsletter produced by Iowa Department of ...

core  

Straylight As The Result Of Refractive Correction

open access: yesClinical Ophthalmology, 2019
Zoraida S Gaurisankar,1 Gwyneth A van Rijn,1 Gregorius PM Luyten,1 Thomas JTP van den Berg2 1Department of Ophthalmology, Leiden University Medical Center, Leiden, the Netherlands; 2Institute for Neuroscience, Royal Netherlands Academy of Arts and ...
Gaurisankar ZS   +3 more
doaj  

Refractory Errors; Myopia V/S Hypermetropia And Eye Correction Techniques Used Among Adult Population Visiting A Tertiary Care Health Facility

open access: yesJournal of Rawalpindi Medical College, 2018
Background: Uncorrected refractory errors are one of the major causes of avoidable disabilities all over the world. Eye correction is a commonly used treatment technique for most of the refractive errors.
Ayla Amin   +5 more
doaj  

Home - About - Disclaimer - Privacy