no code implementations • 18 Jul 2023 • Seyed Mahdi Shariatzadeh, Mahmood Fathy, Reza Berangi, Mohammad Shahverdy
Recently, the expert-crafted neural architectures is increasing overtaken by the utilization of neural architecture search (NAS) and automatic generation (and tuning) of network structures which has a close relation to the Hyperparameter Optimization and Auto Machine Learning (AutoML).
no code implementations • 2 Mar 2021 • Bahram Mohammadi, Mahmood Fathy, Mohammad Sabokrou
AD strongly correlates with the important computer vision and image processing tasks such as image/video anomaly, irregularity and sudden event detection.
1 code implementation • 10 Mar 2020 • Maryam Asadi-Aghbolaghi, Reza Azad, Mahmood Fathy, Sergio Escalera
These blocks adaptively recalibrate the channel-wise feature responses by utilizing a self-gating mechanism of the global information embedding of the feature maps.
Ranked #9 on Lesion Segmentation on ISIC 2018
no code implementations • 12 Feb 2020 • Mohammad Sabokrou, Masoud Pourreza, Xiaobai Li, Mahmood Fathy, Guoying Zhao
In this paper, we propose a simple yet efficient approach to benefit the advantages of the Deep Neural Network (DNN) by simplifying HR estimation from a complex task to learning from very correlated representation to HR.
4 code implementations • In Proceedings of the IEEE/CVF international conference on computer vision workshops 2019 • Reza Azad, Maryam Asadi-Aghbolaghi, Mahmood Fathy, Sergio Escalera
To strengthen feature propagation and encourage feature reuse, we use densely connected convolutions in the last convolutional layer of the encoding path.
Ranked #1 on Lung Nodule Segmentation on Lung Nodule
no code implementations • 24 Jun 2018 • Mohammad Hajizadeh Saffar, Mohsen Fayyaz, Mohammad Sabokrou, Mahmood Fathy
To deal with these difficulties and modeling the signatures efficiently, we propose a method that a one-class classifier per each user is built on discriminative features.
no code implementations • 16 Jun 2018 • Mohammad Hajizadeh Saffar, Mohsen Fayyaz, Mohammad Sabokrou, Mahmood Fathy
This paper gives an overview on semantic segmentation consists of an explanation of this field, it's status and relation with other vision fundamental tasks, different datasets and common evaluation parameters that have been used by researchers.
2 code implementations • 24 May 2018 • Mohammad Sabokrou, Masoud Pourreza, Mohsen Fayyaz, Rahim Entezari, Mahmood Fathy, Jürgen Gall, Ehsan Adeli
Real-time detection of irregularities in visual data is very invaluable and useful in many prospective applications including surveillance, patient monitoring systems, etc.
5 code implementations • CVPR 2018 • Mohammad Sabokrou, Mohammad Khalooei, Mahmood Fathy, Ehsan Adeli
Our architecture is composed of two deep networks, each of which trained by competing with each other while collaborating to understand the underlying concept in the target class, and then classify the testing samples.
no code implementations • 3 Sep 2016 • Mohammad Sabokrou, Mohsen Fayyaz, Mahmood Fathy, Zahra Moayedd, Reinhard klette
The detection of abnormal behaviours in crowded scenes has to deal with many challenges.
1 code implementation • 21 Aug 2016 • Mohsen Fayyaz, Mohammad Hajizadeh Saffar, Mohammad Sabokrou, Mahmood Fathy, Reinhard klette, Fay Huang
Current work on convolutional neural networks(CNNs) has shown that CNNs provide advanced spatial features supporting a very good performance of solutions for both image and video analysis, especially for the semantic segmentation task.
no code implementations • 21 Nov 2015 • Mohammad Sabokrou, Mahmood Fathy, Mojtaba Hosseini, Reinhard klette
In this paper, we propose a method for real-time anomaly detection and localization in crowded scenes.
no code implementations • 21 Nov 2015 • Mohammad Sabokrou, Mahmood Fathy, Mojtaba Hosseini
We propose a fusion strategy to combine the two descriptors as the output of our system.
no code implementations • 15 Aug 2015 • Mohsen Fayyaz, Masoud Pourreza, Mohammad Hajizadeh Saffar, Mohammad Sabokrou, Mahmood Fathy
In this paper, we propose a method for user Finger Vein Authentication (FVA) as a biometric system.
no code implementations • 30 May 2015 • Mohammad Sabokrou, Mahmood Fathy, Mojtaba Hoseini
One important application of the Wireless Sensor Network(WSN) is target tracking, the aim of this application is converging to an event or object in an area.
no code implementations • 29 May 2015 • Mohsen Fayyaz, Mohammad Hajizadeh_Saffar, Mohammad Sabokrou, Mahmood Fathy
Biometrics systems have been used in a wide range of applications and have improved people authentication.