no code implementations • 25 Jan 2024 • Rameshwar Mishra, A V Subramanyam
Existing methods approach this task by first predicting a scene layout and generating images from these layouts using adversarial training.
1 code implementation • 19 Sep 2023 • Himanshu Singh, A V Subramanyam
Adversarial purification using generative models demonstrates strong adversarial defense performance.
Ranked #1 on Adversarial Defense on CIFAR-10 (using extra training data)
1 code implementation • 8 May 2023 • A V Subramanyam, Niranjan Sundararajan, Vibhu Dubey, Brejesh lall
IIITD-20K comprises of 20, 000 unique identities captured in the wild and provides a rich dataset for text-to-image ReID.
no code implementations • 13 Apr 2023 • Astha Verma, Siddhesh Bangar, A V Subramanyam, Naman Lal, Rajiv Ratn Shah, Shin'ichi Satoh
However, these methods suffer from high model variance with low performance on high-dimensional datasets due to the ineffective design of the denoiser and are limited in their utilization of ZO techniques.
no code implementations • 16 Jan 2023 • A V Subramanyam
Adversarial attacks have been recently investigated in person re-identification.