-
Contour-guided Image Completion with Perceptual Grou**
Authors:
Morteza Rezanejad,
Sidharth Gupta,
Chandra Gummaluru,
Ryan Marten,
John Wilder,
Michael Gruninger,
Dirk B. Walther
Abstract:
Humans are excellent at perceiving illusory outlines. We are readily able to complete contours, shapes, scenes, and even unseen objects when provided with images that contain broken fragments of a connected appearance. In vision science, this ability is largely explained by perceptual grou**: a foundational set of processes in human vision that describes how separated elements can be grouped. In…
▽ More
Humans are excellent at perceiving illusory outlines. We are readily able to complete contours, shapes, scenes, and even unseen objects when provided with images that contain broken fragments of a connected appearance. In vision science, this ability is largely explained by perceptual grou**: a foundational set of processes in human vision that describes how separated elements can be grouped. In this paper, we revisit an algorithm called Stochastic Completion Fields (SCFs) that mechanizes a set of such processes -- good continuity, closure, and proximity -- through contour completion. This paper implements a modernized model of the SCF algorithm, and uses it in an image editing framework where we propose novel methods to complete fragmented contours. We show how the SCF algorithm plausibly mimics results in human perception. We use the SCF completed contours as guides for inpainting, and show that our guides improve the performance of state-of-the-art models. Additionally, we show that the SCF aids in finding edges in high-noise environments. Overall, our described algorithms resemble an important mechanism in the human visual system, and offer a novel framework that modern computer vision models can benefit from.
△ Less
Submitted 22 November, 2021;
originally announced November 2021.
-
Learning and Optimization of Blackbox Combinatorial Solvers in Neural Networks
Authors:
T. J. Wilder
Abstract:
The use of blackbox solvers inside neural networks is a relatively new area which aims to improve neural network performance by including proven, efficient solvers for complex problems. Existing work has created methods for learning networks with these solvers as components while treating them as a blackbox. This work attempts to improve upon existing techniques by optimizing not only over the pri…
▽ More
The use of blackbox solvers inside neural networks is a relatively new area which aims to improve neural network performance by including proven, efficient solvers for complex problems. Existing work has created methods for learning networks with these solvers as components while treating them as a blackbox. This work attempts to improve upon existing techniques by optimizing not only over the primary loss function, but also over the performance of the solver itself by using Time-cost Regularization. Additionally, we propose a method to learn blackbox parameters such as which blackbox solver to use or the heuristic function for a particular solver. We do this by introducing the idea of a hyper-blackbox which is a blackbox around one or more internal blackboxes.
△ Less
Submitted 6 June, 2020;
originally announced June 2020.
-
Adversarial VC-dimension and Sample Complexity of Neural Networks
Authors:
Zetong Qi,
T. J. Wilder
Abstract:
Adversarial attacks during the testing phase of neural networks pose a challenge for the deployment of neural networks in security critical settings. These attacks can be performed by adding noise that is imperceptible to humans on top of the original data. By doing so, an attacker can create an adversarial sample, which will cause neural networks to misclassify. In this paper, we seek to understa…
▽ More
Adversarial attacks during the testing phase of neural networks pose a challenge for the deployment of neural networks in security critical settings. These attacks can be performed by adding noise that is imperceptible to humans on top of the original data. By doing so, an attacker can create an adversarial sample, which will cause neural networks to misclassify. In this paper, we seek to understand the theoretical limits of what can be learned by neural networks in the presence of an adversary. We first defined the hypothesis space of a neural network, and showed the relationship between the growth number of the entire neural network and the growth number of each neuron. Combine that with the adversarial Vapnik-Chervonenkis(VC)-dimension of halfspace classifiers, we concluded the adversarial VC-dimension of the neural networks with sign activation functions.
△ Less
Submitted 18 December, 2019;
originally announced December 2019.
-
Scene Categorization from Contours: Medial Axis Based Salience Measures
Authors:
Morteza Rezanejad,
Gabriel Downs,
John Wilder,
Dirk B. Walther,
Allan Jepson,
Sven Dickinson,
Kaleem Siddiqi
Abstract:
The computer vision community has witnessed recent advances in scene categorization from images, with the state-of-the art systems now achieving impressive recognition rates on challenging benchmarks such as the Places365 dataset. Such systems have been trained on photographs which include color, texture and shading cues. The geometry of shapes and surfaces, as conveyed by scene contours, is not e…
▽ More
The computer vision community has witnessed recent advances in scene categorization from images, with the state-of-the art systems now achieving impressive recognition rates on challenging benchmarks such as the Places365 dataset. Such systems have been trained on photographs which include color, texture and shading cues. The geometry of shapes and surfaces, as conveyed by scene contours, is not explicitly considered for this task. Remarkably, humans can accurately recognize natural scenes from line drawings, which consist solely of contour-based shape cues. Here we report the first computer vision study on scene categorization of line drawings derived from popular databases including an artist scene database, MIT67, and Places365. Specifically, we use off-the-shelf pre-trained CNNs to perform scene classification given only contour information as input and find performance levels well above chance. We also show that medial-axis based contour salience methods can be used to select more informative subsets of contour pixels and that the variation in CNN classification performance on various choices for these subsets is qualitatively similar to that observed in human performance. Moreover, when the salience measures are used to weight the contours, as opposed to pruning them, we find that these weights boost our CNN performance above that for unweighted contour input. That is, the medial axis based salience weights appear to add useful information that is not available when CNNs are trained to use contours alone.
△ Less
Submitted 26 November, 2018;
originally announced November 2018.
-
Polyelectrolyte Networks: Elasticity, Swelling, and the Violation of the Flory - Rehner Hypothesis
Authors:
T. A. Vilgis,
J. Wilder
Abstract:
This paper discusses the elastic behavior of polyelectrolyte networks. The deformation behavior of single polyelectrolyte chains is discussed. It is shown that a strong coupling between interactions and chain elasticity exists. The theory of the complete crosslinked networks shows that the Flory - Rehner - Hypothesis (FRH) does not hold. The modulus contains contributions from the classical rubb…
▽ More
This paper discusses the elastic behavior of polyelectrolyte networks. The deformation behavior of single polyelectrolyte chains is discussed. It is shown that a strong coupling between interactions and chain elasticity exists. The theory of the complete crosslinked networks shows that the Flory - Rehner - Hypothesis (FRH) does not hold. The modulus contains contributions from the classical rubber elasticity and from the electrostatic interactions. The equilibrium degree of swelling is estimated by the assumption of a $c^{*}$-network.
△ Less
Submitted 23 December, 1997;
originally announced December 1997.
-
Elasticity in strongly interacting soft solids: polyelectrolyte network
Authors:
J. Wilder,
T. A. Vilgis
Abstract:
This paper discusses the elastic behavior of a very long crosslinked polyelectrolyte chain (Debye-Hückel chain), which is weakly charged. Therefore the response of the crosslinked chain (network) on an external constant force $f$ acting on the ends of the chain is considered. A selfconsistent variational computation of an effective field theory is employed. It is shown, that the modulus of the p…
▽ More
This paper discusses the elastic behavior of a very long crosslinked polyelectrolyte chain (Debye-Hückel chain), which is weakly charged. Therefore the response of the crosslinked chain (network) on an external constant force $f$ acting on the ends of the chain is considered. A selfconsistent variational computation of an effective field theory is employed. It is shown, that the modulus of the polyelectrolyte network has two parts: the first term represents the usual entropy elasticity of connected flexible chains and the second term takes into account the electrostatic interaction of the monomers. It is proportional to the squared crosslink density and the Debye - screening parameter.
△ Less
Submitted 7 January, 1998; v1 submitted 21 November, 1997;
originally announced November 1997.
-
On the elasticity of a single polyelectrolyte chain
Authors:
P. Haronska,
J. Wilder,
T. A. Vilgis
Abstract:
This paper discusses the elastic behavior of a single polyelectrolyte chain. A simple scaling analysis as in self avoiding walk chains are not possible, because three interplaying relevant length scales are involved, i.e., the Debye screening length and the Pincus blob size. Therefore a selfconsistent computation of an effective variational propagator is employed. It is shown that the elastic fo…
▽ More
This paper discusses the elastic behavior of a single polyelectrolyte chain. A simple scaling analysis as in self avoiding walk chains are not possible, because three interplaying relevant length scales are involved, i.e., the Debye screening length and the Pincus blob size. Therefore a selfconsistent computation of an effective variational propagator is employed. It is shown that the elastic force f is proportional to the end to end distance R for small f. For larger forces we find a new regime, characterized by deformations larger than a computed electrostatic "blob size". These results are supported by simulations and intuitive physical arguments.
△ Less
Submitted 23 July, 1997;
originally announced July 1997.