Person Re-identification with transfer learning on CUHK01 dataset.
☆14Mar 31, 2023Updated 2 years ago
Alternatives and similar repositories for Person-Re-ID-with-light-weight-network
Users that are interested in Person-Re-ID-with-light-weight-network are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pix2Pix-based Stain-to-Stain Translation: A Solution for Robust Stain Normalization in Histopathology Images Analysis☆35Jan 10, 2020Updated 6 years ago
- [ESWA 2023] Pytorch Implementation for 'Orientation and Context Entangled Network for Retinal Vessel Segmentation' Expert Systems with A…☆13May 13, 2023Updated 2 years ago
- Code for RELAX, a framework for explaining representations.☆12Jan 7, 2024Updated 2 years ago
- This is the winning solution of the Endocv-2021 grand challange.☆16Jun 27, 2021Updated 4 years ago
- My thesis project for person re-identification☆14Dec 8, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- [IROS 2021] ADD: A Fine-grained Dynamic Inference Architecture for Semantic Image Segmentation☆10May 3, 2022Updated 3 years ago
- ☆10Sep 2, 2023Updated 2 years ago
- ☆31Oct 25, 2021Updated 4 years ago
- This project focuses on detecting a specific form of image forgery known as a copy-move attack, in which a portion of an image is copied …☆11Jun 27, 2022Updated 3 years ago
- Accepted at ICCV '23☆15Oct 4, 2023Updated 2 years ago
- A tool for generating ReID datasets in GTA V.☆13Jan 15, 2021Updated 5 years ago
- ☆14Apr 17, 2024Updated last year
- In this paper, we propose a system wherein we explore on-board re-identification of persons using cameras mounted on Unmanned Aerial Vehi…☆15Mar 25, 2022Updated 4 years ago
- Extracted images from the .mat file of CUHK03 data set for person Re-Identification☆17Jun 13, 2018Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆16Jan 13, 2024Updated 2 years ago
- PyTorch code for ECCV 2020 paper: "Robust Re-Identification by Multiple Views Knowledge Distillation"☆75Oct 3, 2023Updated 2 years ago
- ☆44Oct 7, 2020Updated 5 years ago
- Comprint: Image Forgery Detection and Localization using Compression Fingerprints☆23Feb 27, 2024Updated 2 years ago
- Official code for TeD-SPAD: Temporal Distinctiveness for Self-supervised Privacy-preservation for video Anomaly Detection, accepted at IC…☆17Feb 18, 2025Updated last year
- A curated list of Person Re-Identification papers and BibTeX entries☆19Feb 24, 2024Updated 2 years ago
- CM-NAS: Cross-Modality Neural Architecture Search for Visible-Infrared Person Re-Identification (ICCV2021)☆48Aug 12, 2021Updated 4 years ago
- network for person re-identification☆18Oct 30, 2018Updated 7 years ago
- NeatMS is an open source python package for untargeted LCMS signal labelling and filtering.☆34Aug 19, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆29Feb 18, 2023Updated 3 years ago
- A collection of state-of-the-art Super-Resolution/Person re-identification architectures.☆18Nov 9, 2020Updated 5 years ago
- computer vision/deep learning data set helper toolbox☆26Nov 18, 2019Updated 6 years ago
- ☆43Dec 19, 2024Updated last year
- Towards a Visual Privacy Advisor: Understanding and Predicting Risks in Images, ICCV '17☆26Dec 11, 2017Updated 8 years ago
- ☆27Aug 19, 2022Updated 3 years ago
- Accelerating Transfer Learning with Robust Neural Nets☆11Oct 2, 2020Updated 5 years ago
- DukeMTMC4ReID dataset☆30Apr 26, 2019Updated 6 years ago
- HOLMES: Health OnLine Model Ensemble Serving for Deep Learning Models in Intensive Care Units (KDD 2020)☆12Jan 25, 2021Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Pytorch implementation of "Appearance-Preserving 3D Convolution for Video-based Person Re-identification"☆101Jul 17, 2020Updated 5 years ago
- Open-source stronger baseline for unsupervised or domain adaptive object re-ID.☆144Aug 5, 2021Updated 4 years ago
- NAS-FCOS: Fast Neural Architecture Search for Object Detection (CVPR 2020)☆196Jun 10, 2020Updated 5 years ago
- 1st Place Solution to ECCV-TAO-2020: Detect and Represent Any Object for Tracking☆82Mar 16, 2021Updated 5 years ago
- Code to accompany "Does computer vision matter for action?"☆44Sep 2, 2024Updated last year
- Code for paper 'Weakly Supervised Generative Network for Multiple 3D Human Pose Hypotheses'☆14Nov 21, 2020Updated 5 years ago
- An tensorflow(slim) implementation of Densenet☆18Aug 31, 2017Updated 8 years ago