首页 > 最新文献

2021 IEEE Winter Conference on Applications of Computer Vision Workshops (WACVW)最新文献

英文 中文
Domain Adaptive Knowledge Distillation for Driving Scene Semantic Segmentation 基于领域自适应知识蒸馏的驾驶场景语义分割
Pub Date : 2020-11-03 DOI: 10.1109/WACVW52041.2021.00019
D. Kothandaraman, Athira M. Nambiar, Anurag Mittal
Practical autonomous driving systems face two crucial challenges: memory constraints and domain gap issues. In this paper, we present a novel approach to learn domain adaptive knowledge in models with limited memory, thus bestowing the model with the ability to deal with these issues in a comprehensive manner. We term this as “Domain Adaptive Knowledge Distillation ” and address the same in the context of unsupervised domain-adaptive semantic segmentation by proposing a multi-level distillation strategy to effectively distil knowledge at different levels. Further, we introduce a novel cross entropy loss that leverages pseudo labels from the teacher. These pseudo teacher labels play a multifaceted role towards: (i) knowledge distillation from the teacher network to the student network & (ii) serving as a proxy for the ground truth for target domain images, where the problem is completely unsupervised. We introduce four paradigms for distilling domain adaptive knowledge and carry out extensive experiments and ablation studies on real-to-real as well as synthetic-to-real scenarios. Our experiments demonstrate the profound success of our proposed method.
实际的自动驾驶系统面临着两个关键的挑战:内存约束和域间隙问题。在本文中,我们提出了一种在有限记忆模型中学习领域自适应知识的新方法,从而赋予模型全面处理这些问题的能力。我们将其称为“领域自适应知识蒸馏”,并通过提出一种多级蒸馏策略来有效地提取不同层次的知识,从而在无监督领域自适应语义分割的背景下解决相同的问题。此外,我们引入了一种新的交叉熵损失,它利用了来自教师的伪标签。这些伪教师标签在以下方面发挥着多方面的作用:(i)从教师网络到学生网络的知识蒸馏;(ii)作为目标域图像的基础真理的代理,其中问题完全没有监督。我们介绍了四种提取领域自适应知识的范式,并对真实到真实以及合成到真实的场景进行了广泛的实验和研究。我们的实验证明了我们所提出的方法的巨大成功。
{"title":"Domain Adaptive Knowledge Distillation for Driving Scene Semantic Segmentation","authors":"D. Kothandaraman, Athira M. Nambiar, Anurag Mittal","doi":"10.1109/WACVW52041.2021.00019","DOIUrl":"https://doi.org/10.1109/WACVW52041.2021.00019","url":null,"abstract":"Practical autonomous driving systems face two crucial challenges: memory constraints and domain gap issues. In this paper, we present a novel approach to learn domain adaptive knowledge in models with limited memory, thus bestowing the model with the ability to deal with these issues in a comprehensive manner. We term this as “Domain Adaptive Knowledge Distillation ” and address the same in the context of unsupervised domain-adaptive semantic segmentation by proposing a multi-level distillation strategy to effectively distil knowledge at different levels. Further, we introduce a novel cross entropy loss that leverages pseudo labels from the teacher. These pseudo teacher labels play a multifaceted role towards: (i) knowledge distillation from the teacher network to the student network & (ii) serving as a proxy for the ground truth for target domain images, where the problem is completely unsupervised. We introduce four paradigms for distilling domain adaptive knowledge and carry out extensive experiments and ablation studies on real-to-real as well as synthetic-to-real scenarios. Our experiments demonstrate the profound success of our proposed method.","PeriodicalId":313062,"journal":{"name":"2021 IEEE Winter Conference on Applications of Computer Vision Workshops (WACVW)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114836047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Per-frame mAP Prediction for Continuous Performance Monitoring of Object Detection During Deployment 部署过程中目标检测连续性能监控的逐帧mAP预测
Pub Date : 2020-09-18 DOI: 10.1109/WACVW52041.2021.00021
Q. Rahman, N. Sunderhauf, Feras Dayoub
Performance monitoring of object detection is crucial for safety-critical applications such as autonomous vehicles that operate under varying and complex environmental conditions. Currently, object detectors are evaluated using summary metrics based on a single dataset that is assumed to be representative of all future deployment conditions. In practice, this assumption does not hold, and the performance fluctuates as a function of the deployment conditions. To address this issue, we propose an introspection approach to performance monitoring during deployment without the need for ground truth data. We do so by predicting when the per-frame mean average precision drops below a critical threshold using the detector’s internal features. We quantitatively evaluate and demonstrate our method’s ability to reduce risk by trading off making an incorrect decision by raising the alarm and absenting from detection.
物体检测的性能监控对于安全关键型应用至关重要,例如在变化和复杂的环境条件下运行的自动驾驶汽车。目前,对象检测器使用基于单个数据集的汇总指标进行评估,该数据集被认为代表了所有未来的部署条件。在实践中,这种假设并不成立,性能会随着部署条件的变化而波动。为了解决这个问题,我们提出了一种内省方法来在部署期间进行性能监控,而不需要地面真实数据。我们通过使用检测器的内部特征来预测何时每帧平均精度降至临界阈值以下。我们定量地评估并演示了我们的方法通过提高警报和缺席检测来权衡做出错误决策来降低风险的能力。
{"title":"Per-frame mAP Prediction for Continuous Performance Monitoring of Object Detection During Deployment","authors":"Q. Rahman, N. Sunderhauf, Feras Dayoub","doi":"10.1109/WACVW52041.2021.00021","DOIUrl":"https://doi.org/10.1109/WACVW52041.2021.00021","url":null,"abstract":"Performance monitoring of object detection is crucial for safety-critical applications such as autonomous vehicles that operate under varying and complex environmental conditions. Currently, object detectors are evaluated using summary metrics based on a single dataset that is assumed to be representative of all future deployment conditions. In practice, this assumption does not hold, and the performance fluctuates as a function of the deployment conditions. To address this issue, we propose an introspection approach to performance monitoring during deployment without the need for ground truth data. We do so by predicting when the per-frame mean average precision drops below a critical threshold using the detector’s internal features. We quantitatively evaluate and demonstrate our method’s ability to reduce risk by trading off making an incorrect decision by raising the alarm and absenting from detection.","PeriodicalId":313062,"journal":{"name":"2021 IEEE Winter Conference on Applications of Computer Vision Workshops (WACVW)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131469969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Interpretable security analysis of cancellable biometrics using constrained-optimized similarity-based attack 使用约束优化的基于相似性攻击的可取消生物特征的可解释安全性分析
Pub Date : 2020-06-23 DOI: 10.1109/WACVW52041.2021.00012
Hanrui Wang, Xingbo Dong, Zhe Jin, A. Teoh, M. Tistarelli
In cancellable biometrics (CB) schemes, template security is achieved by applying, mainly non-linear, transformations to the biometric template. The transformation is designed to preserve the template distance/similarity in the transformed domain. Despite its effectiveness, the security issues attributed to similarity preservation property of CB are underestimated. Dong et al. [BTAS’19], exploited the similarity preservation trait of CB and proposed a similarity-based attack with high successful attack rate. The similarity-based attack utilizes preimage that are generated from the protected biometric template for impersonation and perform cross matching. In this paper, we propose a constrained optimization similarity-based attack (CSA), which is improved upon Dong’s genetic algorithm enabled similarity-based attack (GASA). The CSA applies algorithm-specific equality or inequality relations as constraints, to optimize preimage generation. We interpret the effectiveness of CSA from the supervised learning perspective. We identify such constraints then conduct extensive experiments to demonstrate CSA against CB with LFW face dataset. The results suggest that CSA is effective to breach IoM hashing and BioHashing security, and outperforms GASA significantly. Inferring from the above results, we further remark that, other than IoM and BioHashing, CSA is critical to other CB schemes as far as the constraints can be formulated. Furthermore, we reveal the correlation of hash code size and the attack performance of CSA.
在可取消生物识别(CB)方案中,模板安全性主要是通过对生物识别模板进行非线性转换来实现的。该转换被设计为在转换域中保持模板距离/相似性。尽管它很有效,但由于相似度保持特性所带来的安全问题被低估了。Dong等[BTAS ' 19]利用了CB的相似度保持特性,提出了一种基于相似度的攻击,攻击成功率高。基于相似性的攻击利用从受保护的生物识别模板生成的预映像进行模拟并执行交叉匹配。在本文中,我们提出了一种基于约束优化的基于相似度攻击(CSA),它是在Dong的遗传算法支持的基于相似度攻击(GASA)的基础上改进的。CSA应用算法特定的等式或不等式关系作为约束,以优化预图像生成。我们从监督学习的角度来解释CSA的有效性。我们确定了这些约束,然后进行了广泛的实验,用LFW人脸数据集证明了CSA对CB的影响。结果表明,CSA能够有效地攻破iohashing和BioHashing的安全性,并且显著优于gaa。从上述结果推断,我们进一步指出,除了IoM和BioHashing之外,只要约束可以制定,CSA对其他CB方案至关重要。此外,我们还揭示了哈希码大小与CSA攻击性能的相关性。
{"title":"Interpretable security analysis of cancellable biometrics using constrained-optimized similarity-based attack","authors":"Hanrui Wang, Xingbo Dong, Zhe Jin, A. Teoh, M. Tistarelli","doi":"10.1109/WACVW52041.2021.00012","DOIUrl":"https://doi.org/10.1109/WACVW52041.2021.00012","url":null,"abstract":"In cancellable biometrics (CB) schemes, template security is achieved by applying, mainly non-linear, transformations to the biometric template. The transformation is designed to preserve the template distance/similarity in the transformed domain. Despite its effectiveness, the security issues attributed to similarity preservation property of CB are underestimated. Dong et al. [BTAS’19], exploited the similarity preservation trait of CB and proposed a similarity-based attack with high successful attack rate. The similarity-based attack utilizes preimage that are generated from the protected biometric template for impersonation and perform cross matching. In this paper, we propose a constrained optimization similarity-based attack (CSA), which is improved upon Dong’s genetic algorithm enabled similarity-based attack (GASA). The CSA applies algorithm-specific equality or inequality relations as constraints, to optimize preimage generation. We interpret the effectiveness of CSA from the supervised learning perspective. We identify such constraints then conduct extensive experiments to demonstrate CSA against CB with LFW face dataset. The results suggest that CSA is effective to breach IoM hashing and BioHashing security, and outperforms GASA significantly. Inferring from the above results, we further remark that, other than IoM and BioHashing, CSA is critical to other CB schemes as far as the constraints can be formulated. Furthermore, we reveal the correlation of hash code size and the attack performance of CSA.","PeriodicalId":313062,"journal":{"name":"2021 IEEE Winter Conference on Applications of Computer Vision Workshops (WACVW)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133473796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2021 IEEE Winter Conference on Applications of Computer Vision Workshops (WACVW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1