Reconstructing a high-resolution 3D model of an object is a challenging task in computer vision. Designing scalable and light-weight architectures is crucial while addressing this problem. Existing point-cloud based reconstruction approaches directly predict the entire point cloud in a single stage. Although this technique can handle lowresolution point clouds, it is not a viable solution for generating dense, high-resolution outputs. In this work, we introduce DensePCR, a deep pyramidal network for point cloud reconstruction that hierarchically predicts point clouds of increasing resolution. Towards this end, we propose an architecture that first predicts a low-resolution point cloud, and then hierarchically increases the resolution by aggregating local and global point features to deform a grid. Our method generates point clouds that are accurate, uniform and dense. Through extensive quantitative and qualitative evaluation on synthetic and real datasets, we demonstrate that DensePCR outperforms the existing state-of-theart point cloud reconstruction works, while also providing a light-weight and scalable architecture for predicting highresolution outputs.
Provenance for transactional updates is critical for many applications such
as auditing and debugging of transactions. Recently, we have introduced
MV-semirings, an extension of the semiring provenance model that supports
updates and transactions. Furthermore, we have proposed reenactment, a
declarative form of replay with provenance capture, as an efficient and
non-invasive method for computing this type of provenance. However, this
approach is limited to the snapshot isolation (SI) concurrency control protocol
while many real world applications apply the read committed version of snapshot
isolation (RC-SI) to improve performance at the cost of consistency. We present
non-trivial extensions of the model and reenactment approach to be able to
compute provenance of RC-SI transactions efficiently. In addition, we develop
techniques for applying reenactment across multiple RC-SI transactions. Our
experiments demonstrate that our implementation in the GProM system supports
efficient re-construction and querying of provenance.Comment: long versions of CIKM pape
Though Deep Neural Networks (DNN) show excellent performance across various computer vision tasks, several works show their vulnerability to adversarial samples, i.e., image samples with imperceptible noise engineered to manipulate the network's prediction. Adversarial sample generation methods range from simple to complex optimization techniques. Majority of these methods generate adversaries through optimization objectives that are tied to the pre-softmax or softmax output of the network. In this work we, (i) show the drawbacks of such attacks, (ii) propose two new evaluation metrics: Old Label New Rank (OLNR) and New Label Old Rank (NLOR) in order to quantify the extent of damage made by an attack, and (iii) propose a new adversarial attack FDA: Feature Disruptive Attack, to address the drawbacks of existing attacks. FDA works by generating image perturbation that disrupt features at each layer of the network and causes deep-features to be highly corrupt. This allows FDA adversaries to severely reduce the performance of deep networks. We experimentally validate that FDA generates stronger adversaries than other state-of-theart methods for image classification, even in the presence of various defense measures. More importantly, we show that FDA disrupts feature-representation based tasks even without access to the task-specific network or methodology. 1
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.