


default search action
17th ECCV 2022: Tel Aviv, Israel - Volume 5
- Shai Avidan, Gabriel J. Brostow

, Moustapha Cissé, Giovanni Maria Farinella
, Tal Hassner
:
Computer Vision - ECCV 2022 - 17th European Conference, Tel Aviv, Israel, October 23-27, 2022, Proceedings, Part V. Lecture Notes in Computer Science 13665, Springer 2022, ISBN 978-3-031-20064-9 - Zheng Yuan

, Jie Zhang
, Shiguang Shan
:
Adaptive Image Transformations for Transfer-Based Adversarial Attack. 1-17 - Xiaoming Zhao, Fangchang Ma, David Güera, Zhile Ren, Alexander G. Schwing, Alex Colburn

:
Generative Multiplane Images: Making a 2D GAN 3D-Aware. 18-35 - Yulong Cao, Chaowei Xiao, Anima Anandkumar, Danfei Xu, Marco Pavone

:
AdvDO: Realistic Adversarial Attacks for Trajectory Prediction. 36-52 - Qiying Yu, Jieming Lou, Xianyuan Zhan

, Qizhang Li, Wangmeng Zuo, Yang Liu, Jingjing Liu:
Adversarial Contrastive Learning via Asymmetric InfoNCE. 53-69 - Shuo Yang

, Chang Xu
:
One Size Does NOT Fit All: Data-Adaptive Adversarial Training. 70-85 - Hanbin Hong, Binghui Wang, Yuan Hong

:
UniCR: Universally Approximated Certified Robustness via Randomized Smoothing. 86-103 - Jiawang Bai, Kuofeng Gao, Dihong Gong, Shu-Tao Xia, Zhifeng Li, Wei Liu:

Hardly Perceptible Trojan Attack Against Neural Networks with Bit Flips. 104-121 - Yaguan Qian

, Shenghui Huang
, Bin Wang, Xiang Ling, Xiaohui Guan, Zhaoquan Gu, Shaoning Zeng, Wujie Zhou, Haijiang Wang:
Robust Network Architecture Search via Feature Distortion Restraining. 122-138 - Zhuowen Yuan

, Fan Wu, Yunhui Long, Chaowei Xiao, Bo Li:
SecretGen: Privacy Recovery on Pre-trained Models via Distribution Discrimination. 139-155 - Xiaosen Wang, Zeliang Zhang

, Kangheng Tong, Dihong Gong, Kun He, Zhifeng Li, Wei Liu:
Triangle Attack: A Query-Efficient Decision-Based Adversarial Attack. 156-174 - Runkai Zheng

, Rongjun Tang
, Jianze Li
, Li Liu
:
Data-Free Backdoor Removal Based on Channel Lipschitzness. 175-191 - Yixu Wang, Jie Li, Hong Liu, Yan Wang, Yongjian Wu, Feiyue Huang, Rongrong Ji:

Black-Box Dissector: Towards Erasing-Based Hard-Label Model Stealing Attack. 192-208 - Xuwang Yin

, Shiying Li
, Gustavo K. Rohde
:
Learning Energy-Based Models with Adversarial Training. 209-226 - Ganlin Liu, Xiaowei Huang, Xinping Yi:

Adversarial Label Poisoning Attack on Graph Neural Networks via Label Propagation. 227-243 - Ali Dabouei, Fariborz Taherkhani, Sobhan Soleymani, Nasser M. Nasrabadi:

Revisiting Outer Optimization in Adversarial Training. 244-261 - Nasim Shafiee, Ehsan Elhamifar:

Zero-Shot Attribute Attacks on Fine-Grained Recognition Models. 262-282 - Kien Do

, Haripriya Harikumar
, Hung Le, Dung Nguyen, Truyen Tran, Santu Rana
, Dang Nguyen, Willy Susilo
, Svetha Venkatesh:
Towards Effective and Robust Neural Trojan Defenses via Input Filtering. 283-300 - Sravanti Addepalli

, Samyak Jain
, Gaurang Sriramanan
, R. Venkatesh Babu
:
Scaling Adversarial Training to Large Perturbation Bounds. 301-316 - Hoang Tran

, Dan Lu
, Guannan Zhang
:
Exploiting the Local Parabolic Landscapes of Adversarial Losses to Accelerate Black-Box Adversarial Attack. 317-334 - Qianyu Zhou

, Ke-Yue Zhang
, Taiping Yao
, Ran Yi
, Kekai Sheng
, Shouhong Ding
, Lizhuang Ma
:
Generative Domain Adaptation for Face Anti-Spoofing. 335-356 - Huanzhang Dou, Pengyi Zhang, Wei Su, Yunlong Yu

, Xi Li
:
MetaGait: Learning to Learn an Omni Sample Adaptive Representation for Gait Recognition. 357-374 - Junhao Liang

, Chao Fan
, Saihui Hou
, Chuanfu Shen
, Yongzhen Huang
, Shiqi Yu
:
GaitEdge: Beyond Plain End-to-End Gait Recognition for Better Practicality. 375-390 - Wanyi Zhuang, Qi Chu, Zhentao Tan, Qiankun Liu, Haojie Yuan, Changtao Miao, Zixiang Luo, Nenghai Yu:

UIA-ViT: Unsupervised Inconsistency-Aware Method Based on Vision Transformer for Face Forgery Detection. 391-407 - Wentian Zhang, Haozhe Liu, Feng Liu

, Raghavendra Ramachandra, Christoph Busch:
Effective Presentation Attack Detection Driven by Face Related Task. 408-423 - Haoyu Ma, Zhe Wang, Yifei Chen, Deying Kong, Liangjian Chen, Xingwei Liu, Xiangyi Yan, Hao Tang, Xiaohui Xie:

PPT: Token-Pruned Pose Transformer for Monocular and Multi-view Human Pose Estimation. 424-442 - Jiaxi Jiang

, Paul Streli
, Huajian Qiu
, Andreas Fender
, Larissa Laich
, Patrick Snape
, Christian Holz
:
AvatarPoser: Articulated Full-Body Pose Tracking from Sparse Motion Sensing. 443-460 - Wenkang Shan, Zhenhua Liu, Xinfeng Zhang, Shanshe Wang, Siwei Ma, Wen Gao:

P-STMO: Pre-trained Spatial Temporal Many-to-One Model for 3D Human Pose Estimation. 461-478 - Jiefeng Li, Siyuan Bian, Chao Xu, Gang Liu, Gang Yu, Cewu Lu:

D &D: Learning Human Dynamics from Dynamic Camera. 479-496 - Qihao Liu, Yi Zhang, Song Bai, Alan L. Yuille:

Explicit Occlusion Reasoning for Multi-person 3D Human Pose Estimation. 497-517 - Xiaohan Zhang, Bharat Lal Bhatnagar, Sebastian Starke, Vladimir Guzov, Gerard Pons-Moll:

COUCH: Towards Controllable Human-Chair Interactions. 518-535 - Deying Kong, Linguang Zhang, Liangjian Chen, Haoyu Ma, Xiangyi Yan, Shanlin Sun, Xingwei Liu, Kun Han, Xiaohui Xie:

Identity-Aware Hand Mesh Estimation and Personalization from RGB Images. 536-553 - Cunlin Wu, Yang Xiao, Boshen Zhang, Mingyang Zhang, Zhiguo Cao, Joey Tianyi Zhou:

C3P: Cross-Domain Pose Prior Propagation for Weakly Supervised 3D Human Pose Estimation. 554-571 - Garvita Tiwari, Dimitrije Antic, Jan Eric Lenssen, Nikolaos Sarafianos, Tony Tung, Gerard Pons-Moll:

Pose-NDF: Modeling Human Pose Manifolds with Neural Distance Fields. 572-589 - Zhihao Li, Jianzhuang Liu, Zhensong Zhang, Songcen Xu, Youliang Yan:

CLIFF: Carrying Location Information in Full Frames into Human Pose and Shape Estimation. 590-606 - Ailing Zeng, Xuan Ju, Lei Yang, Ruiyuan Gao, Xizhou Zhu

, Bo Dai, Qiang Xu:
DeciWatch: A Simple Baseline for 10˟ Efficient 2D and 3D Pose Estimation. 607-624 - Ailing Zeng, Lei Yang, Xuan Ju, Jiefeng Li, Jianyi Wang

, Qiang Xu:
SmoothNet: A Plug-and-Play Network for Refining Human Poses in Videos. 625-642 - Wentao Jiang

, Sheng Jin
, Wentao Liu
, Chen Qian
, Ping Luo
, Si Liu:
PoseTrans: A Simple yet Effective Pose Transformation Augmentation for Human Pose Estimation. 643-659 - Junuk Cha

, Muhammad Saqlain
, GeonU Kim, Mingyu Shin, Seungryul Baek
:
Multi-Person 3D Pose and Shape Estimation via Inverse Kinematics and Refinement. 660-677 - Xiaoning Sun

, Qiongjie Cui, Huaijiang Sun, Bin Li, Weiqing Li, Jianfeng Lu:
Overlooked Poses Actually Make Sense: Distilling Privileged Knowledge for Human Motion Prediction. 678-694 - Zhuo Chen

, Xu Zhao
, Xiaoyue Wan
:
Structural Triangulation: A Closed-Form Solution to Constrained 3D Human Pose Estimation. 695-711 - Sheng Ye, Yu-Hui Wen, Yanan Sun, Ying He

, Ziyang Zhang, Yaoyuan Wang, Weihua He, Yong-Jin Liu:
Audio-Driven Stylized Gesture Generation with Flow-Based Model. 712-728 - Zhehan Kan, Shuoshuo Chen, Zeng Li, Zhihai He:

Self-Constrained Inference Optimization on Structural Groups for Human Pose Estimation. 729-745

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














