Index for invis

_invis_
invis: integrated night vision surveillance and observation system

_invisibility_
Challenging The invisibility of Mobile Cultures Remote Sensing, Environment and Archaeology in The Near East
invisibility and application functionalities in perceptual watermarking an overview
Making an invisibility Cloak: Real World Adversarial Attacks on Object Detectors

_invisible_
3D Face Scanning Systems Based on invisible Infrared Coded Light
3d Modelling the invisible Using Ground Penetrating Radar
3D non-linear invisible boundary detection filters
BadCM: invisible Backdoor Attack Against Cross-Modal Learning
Baseline Detection and Localization for invisible Omnidirectional Cameras
Blind invisible watermarking for 3D meshes with textures
Blind invisible Watermarking Technique in DT-CWT Domain Using Visual Cryptography
Can invisible Watermarks Resolve Rightful Ownerships?
Catching the high altitude invisible by satellite-based forward scatter PCL
Constrained Energy Maximization and Self-Referencing Method for invisible Ink Detection from Multispectral Historical Document Images
Contrast Enhancement Using Novel White Balancing Parameter Optimization for Perceptually invisible Images
Correlated and uncorrelated invisible temporal white noise alters mesopic rod signaling
Counterfeiting Attacks on Oblivious Block-wise Independent invisible Watermarking Schemes
Data Protection in Palmprint Recognition via Dynamic Random invisible Watermark Embedding
Detecting invisible People
Development of an invisible Human Experience System Using Diminished Reality
Dynamic and invisible messaging for visual MIMO
Embedding invisible Codes Into Normal Video Projection: Principle, Evaluation, and Applications
Embedding invisible Information in Color Images
Fuzzified Contrast Enhancement for Nearly invisible Images
Generation of an Omnidirectional Video without invisible Areas Using Image Inpainting
GIGAN: Self-supervised GAN for generating the invisible using cycle transformation and conditional normalization
HCISNet: Higher-capacity invisible image steganographic network
High-Capacity invisible Background Encoding for Digital Authentication of Hardcopy Documents
Human De-occlusion: invisible Perception and Recovery for Humans
Human-Centric Light Sensing and Estimation From RGBD Images: The invisible Light Switch
Infrared invisible Clothing: Hiding from Infrared Detectors at Multiple Angles in Real World
invisible Backdoor Attack with Sample-Specific Triggers
invisible barcode with optimized error correction
invisible Black-Box Backdoor Attack Through Frequency Domain, An
invisible Calibration Pattern Based on Human Visual Perception Characteristics
invisible Calibration Pattern for Print-and-Scan Data Hiding Based on Human Visual Perception
invisible hybrid color image system using spread vector quantization neural networks with penalized FCM, An
invisible light: Using infrared for video conference relighting
invisible Perturbations: Physical Adversarial Examples Exploiting the Rolling Shutter Effect
invisible Semi-Fragile Watermarking and Steganography of Digital Videos for Content Authentication and Data Hiding
invisible Watermarking Technique for Image Verification, An
Learning invisible Markers for Hidden Codes in Offline-to-online Photography
Learning to See the invisible: End-to-End Trainable Amodal Instance Segmentation
Making the invisible Visible: Action Recognition Through Walls and Occlusions
Making the invisible Visible: Strategies for Visualizing Underground Infrastructures in Immersive Environments
Making the invisible Visible: Toward High-Quality Terahertz Tomographic Imaging via Physics-Guided Restoration
Making the invisible Visible: Underwater Malta: A Virtual Museum for Submerged Cultural Heritage
Multi-Sensor Multi-Target Tracking: Strategies for Events that become invisible
Multi-View Clustering Based on invisible Weights
On Learning the invisible in Photoacoustic Tomography with Flat Directionally Sensitive Detector
On Resolving Rightful Ownerships of Digital Images by invisible Watermarks
On the Invertibility of invisible Watermarking Techniques
OPOM: Customized invisible Cloak Towards Face Privacy Protection
Perceptual intra-frame coding for HEVC still picture profile based on invisible signal suppression
Poison Ink: Robust and invisible Backdoor Attack
Polarization-based Decorrelation of Transparent Layers: The Inclination Angle of an invisible Surface
Protecting Publicly Available Images with an invisible Image Watermark
Remotely Sensing the invisible-Thermal and Magnetic Survey Data Integration for Landscape Archaeology
Revealing invisible Changes In The World
Revealing the invisible With Model and Data Shrinking for Composite-Database Micro-Expression Recognition
RIHOOP: Robust invisible Hyperlinks in Offline and Online Photographs
Seeing invisible Poses: Estimating 3D Body Pose from Egocentric Video
Seeing the invisible and Predicting the Unexpected
Seeing the invisible: Survey of Video Motion Magnification and Small Motion Analysis
SeGAN: Segmenting and Generating the invisible
Segmentation with invisible Keying Signal
Spectral Imaging Technique for Visualizing the invisible Information
Statistical Inference of Motion in the invisible
StegaNeRF: Embedding invisible Information within Neural Radiance Fields
StegaStamp: invisible Hyperlinks in Physical Photographs
Three-Dimensional Nonlinear invisible Boundary Detection
To make yourself invisible with Adversarial Semantic Contours
Tracking the invisible: Learning where the object might be
Visiting the invisible: Layer-by-Layer Completed Scene Decomposition
Visual Imaging of invisible Hazardous Substances Using Bacterial Inspiration
Visualizing the invisible: Occluded Vehicle Segmentation and Recovery
72 for invisible

_inviso_
inviso

Index for "i"


Last update:18-Apr-24 12:23:06
Use price@usc.edu for comments.