1 code implementation • 17 Jul 2023 • Alvin Wan, Hanxiang Hao, Kaushik Patnaik, Yueyang Xu, Omer Hadad, David Güera, Zhile Ren, Qi Shan
However, for multi-branch segments of a model, channel removal can introduce inference-time memory copies.
1 code implementation • 21 Jul 2022 • Xiaoming Zhao, Fangchang Ma, David Güera, Zhile Ren, Alexander G. Schwing, Alex Colburn
What is really needed to make an existing 2D GAN 3D-aware?
no code implementations • 3 May 2022 • Emily R. Bartusiak, Sri Kalyan Yarlagadda, David Güera, Paolo Bestagini, Stefano Tubaro, Fengqing M. Zhu, Edward J. Delp
In this paper, we describe the use of a Conditional Generative Adversarial Network (cGAN) to identify the presence of such spliced forgeries within satellite images.
no code implementations • 25 Apr 2020 • Daniel Mas Montserrat, Hanxiang Hao, S. K. Yarlagadda, Sriram Baireddy, Ruiting Shao, János Horváth, Emily Bartusiak, Justin Yang, David Güera, Fengqing Zhu, Edward J. Delp
Altered and manipulated multimedia is increasingly present and widely distributed via social media platforms.
no code implementations • 24 Oct 2019 • Sri Kalyan Yarlagadda, Sriram Baireddy, David Güera, Carol J. Boushey, Deborah A. Kerr, Fengqing Zhu
The variation in the number of clusters and images captured by different individual makes this a very challenging problem.
no code implementations • 27 Jun 2019 • Hanxiang Hao, David Güera, Amy R. Reibman, Edward J. Delp
From TV news to Google StreetView, face obscuration has been used for privacy protection.
2 code implementations • 20 Jun 2019 • David Güera, Sriram Baireddy, Paolo Bestagini, Stefano Tubaro, Edward J. Delp
Manipulating video content is easier than ever.
no code implementations • 13 May 2019 • Hanxiang Hao, David Güera, János Horváth, Amy R. Reibman, Edward J. Delp
Face obscuration is needed by law enforcement and mass media outlets to guarantee privacy.
6 code implementations • CVPR 2019 • Javier Ribera, David Güera, Yuhao Chen, Edward J. Delp
In these networks, the training procedure usually requires providing bounding boxes or the maximum number of expected objects.
Ranked #1 on Object Localization on Mall
no code implementations • 6 May 2018 • David Güera, Yu Wang, Luca Bondi, Paolo Bestagini, Stefano Tubaro, Edward J. Delp
We examine in this paper the problem of identifying the camera model or type that was used to take an image and that can be spoofed.
no code implementations • 4 May 2018 • David Güera, Sri Kalyan Yarlagadda, Paolo Bestagini, Fengqing Zhu, Stefano Tubaro, Edward J. Delp
This refers to the problem of detecting which camera model has been used to acquire an image by only exploiting pixel information.
1 code implementation • 13 Feb 2018 • Sri Kalyan Yarlagadda, David Güera, Paolo Bestagini, Fengqing Maggie Zhu, Stefano Tubaro, Edward J. Delp
Specifically, we consider the scenario in which pixels within a region of a satellite image are replaced to add or remove an object from the scene.
1 code implementation • 3 Mar 2016 • Luca Bondi, Luca Baroffio, David Güera, Paolo Bestagini, Edward J. Delp, Stefano Tubaro
Detecting the camera model used to shoot a picture enables to solve a wide series of forensic problems, from copyright infringement to ownership attribution.