no code implementations • 2 Oct 2020 • John B. Sigman, Gregory P. Spell, Kevin J Liang, Lawrence Carin
The data sources described earlier make two "domains": a hand-collected data domain of images with threats, and a real-world domain of images assumed without threats.
no code implementations • 13 Dec 2019 • Kevin J Liang, John B. Sigman, Gregory P. Spell, Dan Strellis, William Chang, Felix Liu, Tejas Mehta, Lawrence Carin
We show performance of our models on held-out evaluation sets, analyze several design parameters, and demonstrate the potential of such systems for automated detection of threats that can be found in airports.