Skip to main content

Showing 1–37 of 37 results for author: Ali, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.14976  [pdf, other

    cs.IT

    Impact of Network Geometry on Large Networks with Intelligent Reflecting Surfaces

    Authors: Konpal Shaukat Ali, Martin Haenggi, Arafat Al-Dweik, Marwa Chafii

    Abstract: In wireless networks assisted by intelligent reflecting surfaces (IRSs), jointly modeling the signal received over the direct and indirect (reflected) paths is a difficult problem. In this work, we show that the network geometry (locations of serving base station, IRS, and user) can be captured using the so-called triangle parameter $Δ$. We introduce a decomposition of the effect of the combined l… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

  2. arXiv:2405.00109  [pdf, other

    cs.IT

    Successive Interference Cancellation for ISAC in a Large Full-Duplex Cellular Network

    Authors: Konpal Shaukat Ali, Roberto Bomfin, Marwa Chafii

    Abstract: To reuse the scarce spectrum efficiently, a large full-duplex cellular network with integrated sensing and communication (ISAC) is studied. Monostatic detection at the base station (BS) is considered. At the BS, we receive two signals: the communication-mode uplink signal to be decoded and the radar-mode signal to be detected. After self-interference cancellation (SIC), inspired by NOMA, successiv… ▽ More

    Submitted 30 April, 2024; originally announced May 2024.

  3. arXiv:2404.02464  [pdf, other

    cs.SE cs.PL

    Creating a Trajectory for Code Writing: Algorithmic Reasoning Tasks

    Authors: Shruthi Ravikumar, Margaret Hamilton, Charles Thevathayan, Maria Spichkova, Kashif Ali, Gayan Wijesinghe

    Abstract: Many students in introductory programming courses fare poorly in the code writing tasks of the final summative assessment. Such tasks are designed to assess whether novices have developed the analytical skills to translate from the given problem domain to coding. In the past researchers have used instruments such as code-explain and found that the extent of cognitive depth reached in these tasks c… ▽ More

    Submitted 3 April, 2024; originally announced April 2024.

    Comments: Preprint. Accepted to the 19th International Conference on Evaluation of Novel Approaches to Software Engineering (ENASE 2024). Final version to be published by SCITEPRESS, http://www.scitepress.org

  4. arXiv:2403.03662  [pdf, other

    cs.CV

    Harnessing Meta-Learning for Improving Full-Frame Video Stabilization

    Authors: Muhammad Kashif Ali, Eun Woo Im, Dong** Kim, Tae Hyun Kim

    Abstract: Video stabilization is a longstanding computer vision problem, particularly pixel-level synthesis solutions for video stabilization which synthesize full frames add to the complexity of this task. These techniques aim to stabilize videos by synthesizing full frames while enhancing the stability of the considered video. This intensifies the complexity of the task due to the distinct mix of unique m… ▽ More

    Submitted 8 April, 2024; v1 submitted 6 March, 2024; originally announced March 2024.

    Comments: CVPR 2024, Code will be made availble on: http://github.com/MKashifAli/MetaVideoStab

  5. arXiv:2309.06205  [pdf, other

    cs.IT

    Meta Distribution of Partial-NOMA

    Authors: Konpal Shaukat Ali, Arafat Al-Dweik, Ekram Hossain, Marwa Chafii

    Abstract: This work studies the meta distribution (MD) in a two-user partial non-orthogonal multiple access (pNOMA) network. Compared to NOMA where users fully share a resource-element, pNOMA allows sharing only a fraction $α$ of the resource-element. The MD is computed via moment-matching using the first two moments where reduced integral expressions are derived. Accurate approximates are also proposed for… ▽ More

    Submitted 12 September, 2023; originally announced September 2023.

  6. arXiv:2308.14160  [pdf, other

    cs.CV cs.AI

    A Unified Transformer-based Network for multimodal Emotion Recognition

    Authors: Kamran Ali, Charles E. Hughes

    Abstract: The development of transformer-based models has resulted in significant advances in addressing various vision and NLP-based research challenges. However, the progress made in transformer-based methods has not been effectively applied to biosensing research. This paper presents a novel Unified Biosensor-Vision Multi-modal Transformer-based (UBVMT) method to classify emotions in an arousal-valence s… ▽ More

    Submitted 27 August, 2023; originally announced August 2023.

    Comments: 12 pages

  7. arXiv:2305.05860  [pdf, other

    math.AT cs.SI math.SP physics.soc-ph

    Topology and spectral interconnectivities of higher-order multilayer networks

    Authors: Elkaïoum M. Moutuou, Obaï B. K. Ali, Habib Benali

    Abstract: Multilayer networks have permeated all the sciences as a powerful mathematical abstraction for interdependent heterogenous complex systems such as multimodal brain connectomes, transportation, ecological systems, and scientific collaboration. But describing such systems through a purely graph-theoretic formalism presupposes that the interactions that define the underlying infrastructures and suppo… ▽ More

    Submitted 26 June, 2023; v1 submitted 9 May, 2023; originally announced May 2023.

  8. arXiv:2302.12994  [pdf

    cs.CR

    Secure End-to-End Communications with Lightweight Cryptographic Algorithm

    Authors: Augustine Ukpebor, James Addy, Kamal Ali, Ali Abu-El Humos

    Abstract: The field of lightweight cryptography has been gaining popularity as traditional cryptographic techniques are challenging to implement in resource-limited environments. This research paper presents an approach to utilizing the ESP32 microcontroller as a hardware platform to implement a lightweight cryptographic algorithm. Our approach employs KATAN32, the smallest block cipher of the KATAN family,… ▽ More

    Submitted 25 February, 2023; originally announced February 2023.

    Comments: 14 pages,7 figures, 2 tables, Conference - The 2021 World Congress in Computer Science, Computer Engineering, and Applied Computing (CSCE'21)

  9. arXiv:2211.09466  [pdf, other

    cs.IT eess.SP

    Integrated Sensing and Communication for Large Networks using Joint Detection and a Dynamic Transmission Strategy

    Authors: Konpal Shaukat Ali, Marwa Chafii

    Abstract: A large network employing integrated sensing and communication (ISAC) where a single transmit signal by the base station (BS) serves both the radar and communication modes is studied. We consider bistatic detection at a passive radar and monostatic detection at the transmitting BS. The radar-mode performance is significantly more vulnerable than the communication-mode due to the double path-loss i… ▽ More

    Submitted 23 May, 2023; v1 submitted 17 November, 2022; originally announced November 2022.

  10. arXiv:2206.03753  [pdf, other

    cs.CV

    Task Agnostic Restoration of Natural Video Dynamics

    Authors: Muhammad Kashif Ali, Dong** Kim, Tae Hyun Kim

    Abstract: In many video restoration/translation tasks, image processing operations are naïvely extended to the video domain by processing each frame independently, disregarding the temporal connection of the video frames. This disregard for the temporal connection often leads to severe temporal inconsistencies. State-Of-The-Art (SOTA) techniques that address these inconsistencies rely on the availability of… ▽ More

    Submitted 19 August, 2023; v1 submitted 8 June, 2022; originally announced June 2022.

  11. arXiv:2105.00852  [pdf

    cs.DC cs.RO

    Real-time Autonomous Robot for Object Tracking using Vision System

    Authors: Qazwan Abdullah, Nor Shahida Mohd Shah, Mahathir Mohamad, Muaammar Hadi Kuzman Ali, Nabil Farah, Adeb Salh, Maged Aboali, Mahmod Abd Hakim Mohamad, Abdu Saif

    Abstract: Researchers and robotic development groups have recently started paying special attention to autonomous mobile robot navigation in indoor environments using vision sensors. The required data is provided for robot navigation and object detection using a camera as a sensor. The aim of the project is to construct a mobile robot that has integrated vision system capability used by a webcam to locate,… ▽ More

    Submitted 26 April, 2021; originally announced May 2021.

    Journal ref: www.solidstatetechnology.us Solid State Technology Volume: 63 Issue: 6 Publication Year: 2020

  12. arXiv:2102.00119  [pdf, ps, other

    cs.IT

    Partial Non-Orthogonal Multiple Access (NOMA) in Downlink Poisson Networks

    Authors: Konpal Shaukat Ali, Ekram Hossain, Md. Jahangir Hossain

    Abstract: Non-orthogonal multiple access (NOMA) allows users sharing a resource-block to efficiently reuse spectrum and improve cell sum rate $\mathcal{R}_{\rm tot}$ at the expense of increased interference. Orthogonal multiple access (OMA), on the other hand, guarantees higher coverage. We introduce partial-NOMA in a large two-user downlink network to provide both throughput and reliability. The associated… ▽ More

    Submitted 29 January, 2021; originally announced February 2021.

  13. arXiv:2012.05001  [pdf, other

    cs.CG physics.flu-dyn

    Dual perspective method for solving the point in a polygon problem

    Authors: Karim M. Ali, Amr Guaily

    Abstract: A novel method has been introduced to solve a point inclusion in a polygon problem. The method is applicable to convex as well as non-convex polygons which are not self-intersecting. The introduced method is independent of rounding off errors, which gives it a leverage over some methods prone to this problem. A brief summary of the methods used to solve this problem is presented and the introduced… ▽ More

    Submitted 9 December, 2020; originally announced December 2020.

    Comments: 5 pages, 4 figures, 1 table containing 6 images, 1 algorithm

  14. arXiv:2012.00817  [pdf, other

    cs.CR cs.GT

    Game-Theoretic Malware Detection

    Authors: Revan MacQueen, Natalie Bombardieri, James R. Wright, Karim Ali

    Abstract: Malware attacks are costly. To mitigate against such attacks, organizations deploy malware detection tools that help them detect and eventually resolve those threats. While running only the best available tool does not provide enough coverage of the potential attacks, running all available tools is prohibitively expensive in terms of financial cost and computing resources. Therefore, an organizati… ▽ More

    Submitted 7 January, 2022; v1 submitted 1 December, 2020; originally announced December 2020.

  15. arXiv:2011.09697  [pdf, other

    cs.CV

    Deep Motion Blind Video Stabilization

    Authors: Muhammad Kashif Ali, Sangjoon Yu, Tae Hyun Kim

    Abstract: Despite the advances in the field of generative models in computer vision, video stabilization still lacks a pure regressive deep-learning-based formulation. Deep video stabilization is generally formulated with the help of explicit motion estimation modules due to the lack of a dataset containing pairs of videos with similar perspective but different motion. Therefore, the deep learning approache… ▽ More

    Submitted 22 October, 2021; v1 submitted 19 November, 2020; originally announced November 2020.

  16. arXiv:2007.03874  [pdf, other

    eess.SP cs.CV cs.HC

    Fine-grained Vibration Based Sensing Using a Smartphone

    Authors: Kamran Ali, Alex X. Liu

    Abstract: Recognizing surfaces based on their vibration signatures is useful as it can enable tagging of different locations without requiring any additional hardware such as Near Field Communication (NFC) tags. However, previous vibration based surface recognition schemes either use custom hardware for creating and sensing vibration, which makes them difficult to adopt, or use inertial (IMU) sensors in com… ▽ More

    Submitted 27 August, 2020; v1 submitted 7 July, 2020; originally announced July 2020.

  17. arXiv:2007.03600  [pdf, other

    eess.SP cs.CV cs.HC cs.LG

    Monitoring Browsing Behavior of Customers in Retail Stores via RFID Imaging

    Authors: Kamran Ali, Alex X. Liu, Eugene Chai, Karthik Sundaresan

    Abstract: In this paper, we propose to use commercial off-the-shelf (COTS) monostatic RFID devices (i.e. which use a single antenna at a time for both transmitting and receiving RFID signals to and from the tags) to monitor browsing activity of customers in front of display items in places such as retail stores. To this end, we propose TagSee, a multi-person imaging system based on monostatic RFID imaging.… ▽ More

    Submitted 7 July, 2020; originally announced July 2020.

  18. arXiv:2005.00499  [pdf, other

    cs.CV

    An Efficient Integration of Disentangled Attended Expression and Identity FeaturesFor Facial Expression Transfer andSynthesis

    Authors: Kamran Ali, Charles E. Hughes

    Abstract: In this paper, we present an Attention-based Identity Preserving Generative Adversarial Network (AIP-GAN) to overcome the identity leakage problem from a source image to a generated face image, an issue that is encountered in a cross-subject facial expression transfer and synthesis process. Our key insight is that the identity preserving network should be able to disentangle and compose shape, app… ▽ More

    Submitted 1 May, 2020; originally announced May 2020.

    Comments: 10 Pages, excluding references

  19. arXiv:2004.01275  [pdf, other

    eess.AS cs.LG cs.SD q-bio.QM stat.ML

    AI4COVID-19: AI Enabled Preliminary Diagnosis for COVID-19 from Cough Samples via an App

    Authors: Ali Imran, Iryna Posokhova, Haneya N. Qureshi, Usama Masood, Muhammad Sajid Riaz, Kamran Ali, Charles N. John, MD Iftikhar Hussain, Muhammad Nabeel

    Abstract: Background: The inability to test at scale has become humanity's Achille's heel in the ongoing war against the COVID-19 pandemic. A scalable screening tool would be a game changer. Building on the prior work on cough-based diagnosis of respiratory diseases, we propose, develop and test an Artificial Intelligence (AI)-powered screening solution for COVID-19 infection that is deployable via a smartp… ▽ More

    Submitted 27 September, 2020; v1 submitted 2 April, 2020; originally announced April 2020.

    Comments: Accepted in Informatics in Medicine Unlocked 2020

    Journal ref: Informatics in Medicine Unlocked, vol. 20, p. 100378, 2020

  20. arXiv:1912.01456  [pdf, other

    cs.CV

    Facial Expression Representation Learning by Synthesizing Expression Images

    Authors: Kamran Ali, Charles E. Hughes

    Abstract: Representations used for Facial Expression Recognition (FER) usually contain expression information along with identity features. In this paper, we propose a novel Disentangled Expression learning-Generative Adversarial Network (DE-GAN) which combines the concept of disentangled representation learning with residue learning to explicitly disentangle facial expression representation from identity i… ▽ More

    Submitted 30 November, 2019; originally announced December 2019.

    Comments: 7 pages, 3 figures. arXiv admin note: substantial text overlap with arXiv:1909.13135

  21. arXiv:1911.07050  [pdf, other

    cs.CV

    All-In-One: Facial Expression Transfer, Editing and Recognition Using A Single Network

    Authors: Kamran Ali, Charles E. Hughes

    Abstract: In this paper, we present a unified architecture known as Transfer-Editing and Recognition Generative Adversarial Network (TER-GAN) which can be used: 1. to transfer facial expressions from one identity to another identity, known as Facial Expression Transfer (FET), 2. to transform the expression of a given image to a target expression, while preserving the identity of the image, known as Facial E… ▽ More

    Submitted 16 November, 2019; originally announced November 2019.

    Comments: 10 pages, 5 figures

  22. arXiv:1911.06348  [pdf, other

    cs.SE

    On the Time-Based Conclusion Stability of Cross-Project Defect Prediction Models

    Authors: Abdul Ali Bangash, Hareem Sahar, Abram Hindle, Karim Ali

    Abstract: Researchers in empirical software engineering often make claims based on observable data such as defect reports. Unfortunately, in many cases, these claims are generalized beyond the data sets that have been evaluated. Will the researcher's conclusions hold a year from now for the same software projects? Perhaps not. Recent studies show that in the area of Software Analytics, conclusions over diff… ▽ More

    Submitted 7 August, 2020; v1 submitted 14 November, 2019; originally announced November 2019.

    Comments: Accepted for publication in Empirical Software Engineering 2020

  23. arXiv:1910.05595  [pdf, other

    cs.CV

    Facial Expression Recognition Using Human to Animated-Character Expression Translation

    Authors: Kamran Ali, Ilkin Isler, Charles Hughes

    Abstract: Facial expression recognition is a challenging task due to two major problems: the presence of inter-subject variations in facial expression recognition dataset and impure expressions posed by human subjects. In this paper we present a novel Human-to-Animation conditional Generative Adversarial Network (HA-GAN) to overcome these two problems by using many (human faces) to one (animated face) mappi… ▽ More

    Submitted 12 October, 2019; originally announced October 2019.

    Comments: 8 Pages

  24. arXiv:1909.13135  [pdf, other

    cs.CV

    Facial Expression Recognition Using Disentangled Adversarial Learning

    Authors: Kamran Ali, Charles E. Hughes

    Abstract: The representation used for Facial Expression Recognition (FER) usually contain expression information along with other variations such as identity and illumination. In this paper, we propose a novel Disentangled Expression learning-Generative Adversarial Network (DE-GAN) to explicitly disentangle facial expression representation from identity information. In this learning by reconstruction method… ▽ More

    Submitted 28 September, 2019; originally announced September 2019.

  25. arXiv:1905.02337  [pdf, other

    cs.NI eess.SP

    On Clustering and Channel Disparity in Non-Orthogonal Multiple Access (NOMA)

    Authors: Konpal Shaukat Ali, Mohamed-Slim Alouini, Ekram Hossain, Md. Jahangir Hossain

    Abstract: Non-orthogonal multiple access (NOMA) allows multiple users to share a time-frequency resource block by using different power levels. An important challenge associated with NOMA is the selection of users that share a resource block. This is referred to as clustering, which generally exploits the channel disparity (i.e. distinctness) among the users. We discuss clustering and the related resource a… ▽ More

    Submitted 6 May, 2019; originally announced May 2019.

  26. arXiv:1903.01221  [pdf

    cs.SE

    A Reliabel and an efficient web testing system

    Authors: Kamran Ali, Xia Xiaoling

    Abstract: To improve the reliability and efficiency of Web Software, the Testing Team should be creative and innovative. The experience and intuition of Tester also matters a lot and most often the destructive nature of Tester brings reliable software to the user. Actually, Testing is the responsibility of everybody who is involved in the Project.

    Submitted 8 February, 2019; originally announced March 2019.

    Comments: ERA Indexed

    Journal ref: Published IJSEA 2019

  27. arXiv:1902.04207  [pdf

    cs.CV

    Brain MRI Segmentation using Rule-Based Hybrid Approach

    Authors: Mustansar Fiaz, Kamran Ali, Abdul Rehman, M. Junaid Gul, Soon Ki Jung

    Abstract: Medical image segmentation being a substantial component of image processing plays a significant role to analyze gross anatomy, to locate an infirmity and to plan the surgical procedures. Segmentation of brain Magnetic Resonance Imaging (MRI) is of considerable importance for the accurate diagnosis. However, precise and accurate segmentation of brain MRI is a challenging task. Here, we present an… ▽ More

    Submitted 11 February, 2019; originally announced February 2019.

    Comments: 8 figures

  28. arXiv:1811.02443  [pdf, ps, other

    cs.IT

    Meta Distribution of Downlink Non-Orthogonal Multiple Access (NOMA) in Poisson Networks

    Authors: Konpal Shaukat Ali, Hesham ElSawy, Mohamed-Slim Alouini

    Abstract: We study the meta distribution (MD) of the coverage probability (CP) in downlink non-orthogonal-multiple-access (NOMA) networks. Two schemes are assessed based on the location of the NOMA users: 1) anywhere in the network, 2) cell-center users only. The moments of the MD for both schemes are derived and the MD is approximated via the beta distribution. Closed-form moments are derived for the first… ▽ More

    Submitted 6 November, 2018; originally announced November 2018.

  29. arXiv:1803.07866  [pdf, ps, other

    cs.IT

    Downlink Non-Orthogonal Multiple Access (NOMA) in Poisson Networks

    Authors: Konpal Shaukat Ali, Martin Haenggi, Hesham ElSawy, Anas Chaaban, Mohamed-Slim Alouini

    Abstract: A network model is considered where Poisson distributed base stations transmit to $N$ power-domain non-orthogonal multiple access (NOMA) users (UEs) each {that employ successive interference cancellation (SIC) for decoding}. We propose three models for the clustering of NOMA UEs and consider two different ordering techniques for the NOMA UEs: mean signal power-based and instantaneous signal-to-int… ▽ More

    Submitted 15 October, 2018; v1 submitted 21 March, 2018; originally announced March 2018.

  30. arXiv:1801.04894  [pdf, other

    cs.SE

    Debugging Static Analysis

    Authors: Lisa Nguyen Quang Do, Stefan Krüger, Patrick Hill, Karim Ali, Eric Bodden

    Abstract: To detect and fix bugs and security vulnerabilities, software companies use static analysis as part of the development process. However, static analysis code itself is also prone to bugs. To ensure a consistent level of precision, as analyzed programs grow more complex, a static analysis has to handle more code constructs, frameworks, and libraries that the programs use. While more complex analyse… ▽ More

    Submitted 15 January, 2018; originally announced January 2018.

  31. arXiv:1712.03327  [pdf, other

    cs.CR

    The Insecurity of Home Digital Voice Assistants -- Amazon Alexa as a Case Study

    Authors: Xinyu Lei, Guan-Hua Tu, Alex X. Liu, Kamran Ali, Chi-Yu Li, Tian Xie

    Abstract: Home Digital Voice Assistants (HDVAs) are getting popular in recent years. Users can control smart devices and get living assistance through those HDVAs (e.g., Amazon Alexa, Google Home) using voice. In this work, we study the insecurity of HDVA service by using Amazon Alexa as a case study. We disclose three security vulnerabilities which root in the insecure access control of Alexa services. We… ▽ More

    Submitted 12 November, 2019; v1 submitted 8 December, 2017; originally announced December 2017.

  32. arXiv:1710.00564  [pdf, ps, other

    cs.SE

    CrySL: Validating Correct Usage of Cryptographic APIs

    Authors: Stefan Krüger, Johannes Späth, Karim Ali, Eric Bodden, Mira Mezini

    Abstract: Various studies have empirically shown that the majority of Java and Android apps misuse cryptographic libraries, causing devastating breaches of data security. Therefore, it is crucial to detect such misuses early in the development process. The fact that insecure usages are not the exception but the norm precludes approaches based on property inference and anomaly detection. In this paper, we… ▽ More

    Submitted 2 October, 2017; originally announced October 2017.

    Comments: 11 pages

  33. arXiv:1608.06574  [pdf, other

    cs.NI

    Towards Designing PLC Networks for Ubiquitous Connectivity in Enterprises

    Authors: Kamran Ali, Ioannis Pefkianakis, Alex X. Liu, Kyu-Han Kim

    Abstract: Powerline communication (PLC) provides inexpensive, secure and high speed network connectivity, by leveraging the existing power distribution networks inside the buildings. While PLC technology has the potential to improve connectivity and is considered a key enabler for sensing, control, and automation applications in enterprises, it has been mainly deployed for improving connectivity in homes. D… ▽ More

    Submitted 30 August, 2016; v1 submitted 23 August, 2016; originally announced August 2016.

    Comments: PLCs, Powerline Communications, Spectrum Sharing, Effect of Breakers, Enterprises, IoTs, Large Scale Indoor PLC Networks

  34. Modeling Cellular Networks with Full Duplex D2D Communication: A Stochastic Geometry Approach

    Authors: Konpal Shaukat Ali, Hesham ElSawy, Mohamed-Slim Alouini

    Abstract: Full-duplex (FD) communication is optimistically promoted to double the spectral efficiency if sufficient self-interference cancellation (SIC) is achieved. However, this is not true when deploying FD-communication in a large-scale setup due to the induced mutual interference. Therefore, a large-scale study is necessary to draw legitimate conclusions about gains associated with FD-communication. Th… ▽ More

    Submitted 22 August, 2016; originally announced August 2016.

  35. arXiv:1504.02485  [pdf, other

    cs.CV

    What Do Deep CNNs Learn About Objects?

    Authors: Xingchao Peng, Baochen Sun, Karim Ali, Kate Saenko

    Abstract: Deep convolutional neural networks learn extremely powerful image representations, yet most of that power is hidden in the millions of deep-layer parameters. What exactly do these parameters represent? Recent work has started to analyse CNN representations, finding that, e.g., they are invariant to some 2D transformations Fischer et al. (2014), but are confused by particular types of image noise N… ▽ More

    Submitted 9 April, 2015; originally announced April 2015.

    Comments: 2 pages workshop paper. arXiv admin note: substantial text overlap with arXiv:1412.7122

  36. arXiv:1504.01954  [pdf

    cs.CV

    Image Subset Selection Using Gabor Filters and Neural Networks

    Authors: Heider K. Ali, Anthony Whitehead

    Abstract: An automatic method for the selection of subsets of images, both modern and historic, out of a set of landmark large images collected from the Internet is presented in this paper. This selection depends on the extraction of dominant features using Gabor filtering. Features are selected carefully from a preliminary image set and fed into a neural network as a training data. The method collects a la… ▽ More

    Submitted 8 April, 2015; originally announced April 2015.

    Comments: 14 pages

  37. arXiv:1412.7122  [pdf, other

    cs.CV cs.LG cs.NE

    Learning Deep Object Detectors from 3D Models

    Authors: Xingchao Peng, Baochen Sun, Karim Ali, Kate Saenko

    Abstract: Crowdsourced 3D CAD models are becoming easily accessible online, and can potentially generate an infinite number of training images for almost any object category.We show that augmenting the training data of contemporary Deep Convolutional Neural Net (DCNN) models with such synthetic data can be effective, especially when real training data is limited or not well matched to the target domain. Mos… ▽ More

    Submitted 11 October, 2015; v1 submitted 22 December, 2014; originally announced December 2014.