Goto

Collaborating Authors

 groundtruth



Appendix

Neural Information Processing Systems

The annotation tool is a free painting tool, which allows the raters to freely draw the instance mask. We ask the raters to try to draw within the bbox, but if the object is obviously exceeding the bbox, then they can draw outside the bbox. The size of the stroke is adjustable.



Geometry-Aware Recurrent Neural Networks for Active Visual Recognition

Ricson Cheng, Ziyan Wang, Katerina Fragkiadaki

Neural Information Processing Systems

Cross-object occlusions remain an important source of failures for current state-of-the-art object detectors [29],which, despite their formidable performance increase inrecent years, still carrythe biases and idiosyncrasies of the data they were trained on [16]: static images from Imagenet and COCOdatasets.


1 Data Ingestion

Neural Information Processing Systems

For all other remaining architectures, the reported results are from private datasets. Neck Shaft Angle(NSA) cannot be estimated. Additionally, [? ] requires estimation of the diaphysis Figure 4: Repeatability of the femur morphometry extraction method as measured by error distributions for a) the landmarks/anatomical sizes and b) axis alignment identified by the adapted method. Do the main claims made in the abstract and introduction accurately reflect the paper's Did you specify all the training details (e.g., data splits, hyperparameters, how they were Data splits are available in the GitHub repository. Did you report error bars (e.g., with respect to the random seed after running ex-67 Did you include the total amount of compute and the type of resources used (e.g., Did you mention the license of the assets?



NeuralSequenceModels

Neural Information Processing Systems

All of the questions posed in Table 1in the main paper can be decomposed into readily available components that our modelpθ can estimate. Q1 P (X1) is already naturally in a form that our model can directly estimate due to the autoregressive factorization imposed by the architecture:p θ(X1). Q3 The "hitting time" or the next occurrence of a specific event typea V is defined asτ(a). Interestingly, we can see thatQ3 is a generalization ofQ2 by noting that they are identical when A={}. In practice, computing this exactly is intractable due to it being an infinite sum.



RemedyGS: Defend 3D Gaussian Splatting against Computation Cost Attacks

Li, Yanping, Liu, Zhening, Li, Zijian, Lin, Zehong, Zhang, Jun

arXiv.org Artificial Intelligence

As a mainstream technique for 3D reconstruction, 3D Gaussian splatting (3DGS) has been applied in a wide range of applications and services. Recent studies have revealed critical vulnerabilities in this pipeline and introduced computation cost attacks that lead to malicious resource occupancies and even denial-of-service (DoS) conditions, thereby hindering the reliable deployment of 3DGS. In this paper, we propose the first effective and comprehensive black-box defense framework, named RemedyGS, against such computation cost attacks, safeguarding 3DGS reconstruction systems and services. Our pipeline comprises two key components: a detector to identify the attacked input images with poisoned textures and a purifier to recover the benign images from their attacked counterparts, mitigating the adverse effects of these attacks. Moreover, we incorporate adversarial training into the purifier to enforce distributional alignment between the recovered and original natural images, thereby enhancing the defense efficacy. Experimental results demonstrate that our framework effectively defends against white-box, black-box, and adaptive attacks in 3DGS systems, achieving state-of-the-art performance in both safety and utility.