2 code implementations • 2 Feb 2024 • Antonio Emanuele Cinà, Francesco Villani, Maura Pintor, Lea Schönherr, Battista Biggio, Marcello Pelillo
Evaluating the adversarial robustness of deep networks to gradient-based attacks is challenging.
no code implementations • 1 Jul 2023 • Dario Lazzaro, Antonio Emanuele Cinà, Maura Pintor, Ambra Demontis, Battista Biggio, Fabio Roli, Marcello Pelillo
Deep learning models undergo a significant increase in the number of parameters they possess, leading to the execution of a larger number of operations during inference.
1 code implementation • 5 Jun 2023 • Ali Alagrami, Luca Palmieri, Sinem Aslan, Marcello Pelillo, Sebastiano Vascon
Results show that our solution performs well in reassembling different kinds of broken objects.
no code implementations • 26 Mar 2023 • Ben Vardi, Alessandro Torcinovich, Marina Khoroshiltseva, Marcello Pelillo, Ohad Ben-Shahar
We present a novel method for solving square jigsaw puzzles based on global optimization.
1 code implementation • 8 Sep 2022 • Hebatallah A. Mohamed, Sebastiano Vascon, Feliks Hibraj, Stuart James, Diego Pilutti, Alessio Del Bue, Marcello Pelillo
Knowledge Graphs (KGs) have proven to be a reliable way of structuring data.
no code implementations • 4 May 2022 • Antonio Emanuele Cinà, Kathrin Grosse, Ambra Demontis, Sebastiano Vascon, Werner Zellinger, Bernhard A. Moser, Alina Oprea, Battista Biggio, Marcello Pelillo, Fabio Roli
In this survey, we provide a comprehensive systematization of poisoning attacks and defenses in machine learning, reviewing more than 100 papers published in the field in the last 15 years.
1 code implementation • 12 Apr 2022 • Antonio Emanuele Cinà, Kathrin Grosse, Ambra Demontis, Battista Biggio, Fabio Roli, Marcello Pelillo
The recent success of machine learning (ML) has been fueled by the increasing availability of computing power and large amounts of data in many different applications.
no code implementations • 4 Apr 2022 • Ismail Elezi, Jenny Seidenschwarz, Laurin Wagner, Sebastiano Vascon, Alessandro Torcinovich, Marcello Pelillo, Laura Leal-Taixe
Deep metric learning has yielded impressive results in tasks such as clustering and image retrieval by leveraging neural networks to obtain highly discriminative feature embeddings, which can be used to group samples into different classes.
no code implementations • 28 Mar 2022 • Marina Khoroshiltseva, Arianna Traviglia, Marcello Pelillo, Sebastiano Vascon
This paper proposes JiGAN, a GAN-based method for solving Jigsaw puzzles with eroded or missing borders.
2 code implementations • 14 Mar 2022 • Antonio Emanuele Cinà, Ambra Demontis, Battista Biggio, Fabio Roli, Marcello Pelillo
Sponge examples are test-time inputs carefully optimized to increase energy consumption and latency of neural networks when deployed on hardware accelerators.
no code implementations • 12 Oct 2021 • Alessandro Betti, Marco Gori, Stefano Melacci, Marcello Pelillo, Fabio Roli
This paper sustains the position that the time has come for thinking of learning machines that conquer visual skills in a truly human-like context, where a few human-like object supervisions are given by vocal interactions and pointing aids only.
1 code implementation • 30 Aug 2021 • Gui-Song Xia, Jian Ding, Ming Qian, Nan Xue, Jiaming Han, Xiang Bai, Michael Ying Yang, Shengyang Li, Serge Belongie, Jiebo Luo, Mihai Datcu, Marcello Pelillo, Liangpei Zhang, Qiang Zhou, Chao-hui Yu, Kaixuan Hu, Yingjia Bu, Wenming Tan, Zhe Yang, Wei Li, Shang Liu, Jiaxuan Zhao, Tianzhi Ma, Zi-han Gao, Lingqi Wang, Yi Zuo, Licheng Jiao, Chang Meng, Hao Wang, Jiahao Wang, Yiming Hui, Zhuojun Dong, Jie Zhang, Qianyue Bao, Zixiao Zhang, Fang Liu
This report summarizes the results of Learning to Understand Aerial Images (LUAI) 2021 challenge held on ICCV 2021, which focuses on object detection and semantic segmentation in aerial images.
1 code implementation • 14 Jun 2021 • Antonio Emanuele Cinà, Kathrin Grosse, Sebastiano Vascon, Ambra Demontis, Battista Biggio, Fabio Roli, Marcello Pelillo
Backdoor attacks inject poisoning samples during training, with the goal of forcing a machine learning model to output an attacker-chosen class when presented a specific trigger at test time.
1 code implementation • 23 Mar 2021 • Antonio Emanuele Cinà, Sebastiano Vascon, Ambra Demontis, Battista Biggio, Fabio Roli, Marcello Pelillo
One of the most concerning threats for modern AI systems is data poisoning, where the attacker injects maliciously crafted training data to corrupt the system's behavior at test time.
2 code implementations • 24 Feb 2021 • Jian Ding, Nan Xue, Gui-Song Xia, Xiang Bai, Wen Yang, Micheal Ying Yang, Serge Belongie, Jiebo Luo, Mihai Datcu, Marcello Pelillo, Liangpei Zhang
In this paper, we present a large-scale Dataset of Object deTection in Aerial images (DOTA) and comprehensive baselines for ODAI.
1 code implementation • 20 Dec 2020 • Sebastiano Vascon, Sinem Aslan, Gianluca Bigaglia, Lorenzo Giudice, Marcello Pelillo
Verb Sense Disambiguation is a well-known task in NLP, the aim is to find the correct sense of a verb in a sentence.
1 code implementation • 15 Oct 2020 • Sebastiano Vascon, Samuel Rota Bulò, Vittorio Murino, Marcello Pelillo
This package provides an implementation of the original DS clustering algorithm since no code has been officially released yet, together with a still growing collection of methods and variants related to it.
1 code implementation • 12 Oct 2020 • Kunping Yang, Gui-Song Xia, Zicheng Liu, Bo Du, Wen Yang, Marcello Pelillo, Liangpei Zhang
Given two multi-temporal aerial images, semantic change detection aims to locate the land-cover variations and identify their change types with pixel-wise boundaries.
1 code implementation • 9 Sep 2020 • Antonio Emanuele Cinà, Alessandro Torcinovich, Marcello Pelillo
In an attempt to fill this gap, in this work, we propose a black-box adversarial attack for crafting adversarial samples to test the robustness of clustering algorithms.
no code implementations • 23 Mar 2020 • Feliks Hibraj, Marcello Pelillo, Saverio Salzo, Massimiliano Pontil
Second, we use a Nystrom-type subsampling approach, which allows for a training phase with a smaller number of data points, so to reduce the computational cost.
2 code implementations • ECCV 2020 • Ismail Elezi, Sebastiano Vascon, Alessandro Torcinovich, Marcello Pelillo, Laura Leal-Taixe
Deep metric learning has yielded impressive results in tasks such as clustering and image retrieval by leveraging neural networks to obtain highly discriminative feature embeddings, which can be used to group samples into different classes.
Ranked #20 on Metric Learning on CUB-200-2011 (using extra training data)
no code implementations • 20 Sep 2019 • Sinem Aslan, Marcello Pelillo
The availability of large-scale data sets is an essential pre-requisite for deep learning based semantic segmentation schemes.
1 code implementation • 4 Jun 2019 • Chu Wang, Marcello Pelillo, Kaleem Siddiqi
We improve upon these methods by introducing a view clustering and pooling layer based on dominant sets.
no code implementations • 6 May 2019 • Sebastiano Vascon, Sinem Aslan, Alessandro Torcinovich, Twan van Laarhoven, Elena Marchiori, Marcello Pelillo
Unsupervised domain adaptation (UDA) amounts to assigning class labels to the unlabeled instances of a dataset from a target domain, using labeled instances of a dataset from a related source domain.
1 code implementation • ICCV 2019 • Leulseged Tesfaye Alemu, Marcello Pelillo, Mubarak Shah
By optimizing the constrained clustering in an end-to-end manner, we naturally leverage the contextual knowledge of a set of images corresponding to the given person-images.
Ranked #2 on Person Re-Identification on CUHK03 (Rank-5 metric)
1 code implementation • 16 Jan 2019 • Fu-Dong Wang, Gui-Song Xia, Nan Xue, Yi-Peng Zhang, Marcello Pelillo
In this paper, we present a functional representation for graph matching (FRGM) that aims to provide more geometric insights on the problem and reduce the space and time complexities of corresponding algorithms.
no code implementations • 25 Nov 2018 • Battista Biggio, Ignazio Pillai, Samuel Rota Bulò, Davide Ariu, Marcello Pelillo, Fabio Roli
In this work we propose a general framework that allows one to identify potential attacks against clustering algorithms, and to evaluate their impact, by making specific assumptions on the adversary's goal, knowledge of the attacked system, and capabilities of manipulating the input data.
1 code implementation • 12 Oct 2018 • Ismail Elezi, Lukas Tuggener, Marcello Pelillo, Thilo Stadelmann
This paper gives an overview of our current Optical Music Recognition (OMR) research.
no code implementations • 2 Oct 2018 • Sebastiano Vascon, Ylenia Parin, Eis Annavini, Mattia D'Andola, Davide Zoccolan, Marcello Pelillo
For most animal species, quick and reliable identification of visual objects is critical for survival.
no code implementations • 2 Oct 2018 • Sinem Aslan, Sebastiano Vascon, Marcello Pelillo
Experiments are conducted on the only publicly available dataset which is composed of 180 images of 60 types of Roman coins.
no code implementations • 15 Aug 2018 • Leulseged Tesfaye Alemu, Marcello Pelillo
In this paper, we propose a computationally efficient approach to fuse several hand-crafted and deep features, based on the probabilistic distribution of a given membership score of a constrained cluster in an unsupervised manner.
no code implementations • 12 Jun 2018 • Tewodros Mulugeta Dagnew, Dalia Coppi, Marcello Pelillo, Rita Cucchiara
Semi-supervised learning is a popular class of techniques to learn from labeled and unlabeled data.
no code implementations • 26 May 2018 • Ismail Elezi, Alessandro Torcinovich, Sebastiano Vascon, Marcello Pelillo
Motivated by the observation that in virtually all application domains it is easy to obtain unlabeled data, in this paper we take a different perspective and propose a \emph{label augmentation} approach.
1 code implementation • 21 May 2018 • Feliks Hibraj, Sebastiano Vascon, Thilo Stadelmann, Marcello Pelillo
We report on a comprehensive set of experiments on the TIMIT dataset against standard clustering techniques and specific speaker clustering methods.
Sound Audio and Speech Processing
2 code implementations • 27 Mar 2018 • Lukas Tuggener, Ismail Elezi, Jürgen Schmidhuber, Marcello Pelillo, Thilo Stadelmann
We present the DeepScores dataset with the goal of advancing the state-of-the-art in small objects recognition, and by placing the question of object recognition in the context of scene understanding.
6 code implementations • CVPR 2018 • Gui-Song Xia, Xiang Bai, Jian Ding, Zhen Zhu, Serge Belongie, Jiebo Luo, Mihai Datcu, Marcello Pelillo, Liangpei Zhang
The fully annotated DOTA images contains $188, 282$ instances, each of which is labeled by an arbitrary (8 d. o. f.)
Ranked #52 on Object Detection In Aerial Images on DOTA (using extra training data)
no code implementations • 15 Jul 2017 • Eyasu Zemene, Leulseged Tesfaye Alemu, Marcello Pelillo
In particular, we shall focus on interactive segmentation and co-segmentation (in both the unsupervised and the interactive versions).
no code implementations • 19 Jun 2017 • Yonatan Tariku Tesfaye, Eyasu Zemene, Andrea Prati, Marcello Pelillo, Mubarak Shah
In this paper, a unified three-layer hierarchical approach for solving tracking problems in multiple non-overlapping cameras is proposed.
no code implementations • 21 Mar 2017 • Marco Fiorucci, Alessandro Torcinovich, Manuel Curado, Francisco Escolano, Marcello Pelillo
In this paper we analyze the practical implications of Szemer\'edi's regularity lemma in the preservation of metric information contained in large graphs.
no code implementations • 4 Feb 2017 • Eyasu Zemene, Yonatan Tariku, Haroon Idrees, Andrea Prati, Marcello Pelillo, Mubarak Shah
We cast the geo-localization as a clustering problem on local image features.
no code implementations • 21 Sep 2016 • Marcello Pelillo, Ismail Elezi, Marco Fiorucci
Introduced in the mid-1970's as an intermediate step in proving a long-standing conjecture on arithmetic progressions, Szemer\'edi's regularity lemma has emerged over time as a fundamental tool in different branches of graph theory, combinatorics and theoretical computer science.
no code implementations • 15 Sep 2016 • Rocco Tripodi, Sebastiano Vascon, Marcello Pelillo
These interactions allow the players to choose a cluster which is coherent with the clusters chosen by similar players, a property which is not guaranteed by NMF, since it produces a soft clustering of the data.
no code implementations • 3 Sep 2016 • Samuel Rota Bulò, Battista Biggio, Ignazio Pillai, Marcello Pelillo, Fabio Roli
In spam and malware detection, attackers exploit randomization to obfuscate malicious data and increase their chances of evading detection at test time; e. g., malware code is typically obfuscated using random strings or byte sequences to hide known exploits.
no code implementations • 1 Aug 2016 • Eyasu Zemene, Marcello Pelillo
We propose a new approach to interactive image segmentation based on some properties of a family of quadratic optimization problems related to dominant sets, a well-known graph-theoretic notion of a cluster which generalizes the concept of a maximal clique to edge-weighted graphs.
no code implementations • 8 Jul 2016 • Rocco Tripodi, Marcello Pelillo
Each document to be clustered is represented as a player and each cluster as a strategy.
no code implementations • CL 2017 • Rocco Tripodi, Marcello Pelillo
This paper presents a new model for word sense disambiguation formulated in terms of evolutionary game theory, where each word to be disambiguated is represented as a node on a graph whose edges represent word relations and senses are represented as classes.
no code implementations • NeurIPS 2012 • Peter Kontschieder, Samuel R. Bulò, Antonio Criminisi, Pushmeet Kohli, Marcello Pelillo, Horst Bischof
In this paper we introduce Context-Sensitive Decision Forests - A new perspective to exploit contextual information in the popular decision forest framework for the object detection problem.
no code implementations • NeurIPS 2009 • Samuel R. Bulò, Marcello Pelillo
In contrast to the classical approach, we attempt to provide a meaningful formalization of the very notion of a cluster and we show that game theory offers an attractive and unexplored perspective that serves well our purpose.