no code implementations • 24 Dec 2023 • Rohit Lal, Saketh Bachu, Yash Garg, Arindam Dutta, Calvin-Khang Ta, Dripta S. Raychaudhuri, Hannah Dela Cruz, M. Salman Asif, Amit K. Roy-Chowdhury
This challenge arises because these models struggle to generalize beyond their training datasets, and the variety of occlusions is hard to capture in the training data.
no code implementations • 5 Dec 2023 • Rohit Kundu, Sudipta Paul, Rohit Lal, Amit K. Roy-Chowdhury
Specifically, we propose an approach to enable the Segment Anything Model (SAM) with semantic recognition capability to generate pixel-level annotations for images without any manual supervision.
1 code implementation • 9 Nov 2023 • Arindam Dutta, Rohit Lal, Dripta S. Raychaudhuri, Calvin Khang Ta, Amit K. Roy-Chowdhury
Human silhouette extraction is a fundamental task in computer vision with applications in various downstream tasks.
no code implementations • ICCV 2023 • Dripta S. Raychaudhuri, Calvin-Khang Ta, Arindam Dutta, Rohit Lal, Amit K. Roy-Chowdhury
To address this limitation, we focus on the task of source-free domain adaptation for pose estimation, where a source model must adapt to a new target domain using only unlabeled target data.
no code implementations • 2 Feb 2023 • Rohit Lal, Arihant Gaur, Aadhithya Iyer, Muhammed Abdullah Shaikh, Ritik Agrawal
Single-Source Single-Target Domain Adaptation (1S1T) aims to bridge the gap between a labelled source domain and an unlabelled target domain.
1 code implementation • 7 Nov 2022 • Vikash Kumar, Rohit Lal, Himanshu Patil, Anirban Chakraborty
The main motive of this work is to solve for Single and Multi target Domain Adaptation (SMTDA) for the source-free paradigm, which enforces a constraint where the labeled source data is not available during target adaptation due to various privacy-related restrictions on data sharing.
no code implementations • 8 Aug 2022 • Rohit Lal, Bharath Kumar Bolla, Sabeesh Ethiraj
Our work sheds light on the fact that custom networks with efficient architectures and faster inference times can be built without the need of relying on pre-trained architectures.
no code implementations • 5 May 2022 • Gaurav Kumar Nayak, Ruchit Rawal, Rohit Lal, Himanshu Patil, Anirban Chakraborty
We, therefore, propose a holistic approach for quantifying adversarial vulnerability of a sample by combining these different perspectives, i. e., degree of model's reliance on high-frequency features and the (conventional) sample-distance to the decision boundary.