Skip to main content

Showing 1–28 of 28 results for author: Kumar, B V

Searching in archive cs. Search in all archives.
.
  1. arXiv:2502.12723  [pdf, other

    cs.CV

    myEye2Wheeler: A Two-Wheeler Indian Driver Real-World Eye-Tracking Dataset

    Authors: Bhaiya Vaibhaw Kumar, Deepti Rawat, Tanvi Kandalla, Aarnav Nagariya, Kavita Vemuri

    Abstract: This paper presents the myEye2Wheeler dataset, a unique resource of real-world gaze behaviour of two-wheeler drivers navigating complex Indian traffic. Most datasets are from four-wheeler drivers on well-planned roads and homogeneous traffic. Our dataset offers a critical lens into the unique visual attention patterns and insights into the decision-making of Indian two-wheeler drivers. The analysi… ▽ More

    Submitted 18 February, 2025; originally announced February 2025.

  2. arXiv:2305.01884  [pdf, other

    cs.CV

    Class adaptive threshold and negative class guided noisy annotation robust Facial Expression Recognition

    Authors: Darshan Gera, Badveeti Naveen Siva Kumar, Bobbili Veerendra Raj Kumar, S Balasubramanian

    Abstract: The hindering problem in facial expression recognition (FER) is the presence of inaccurate annotations referred to as noisy annotations in the datasets. These noisy annotations are present in the datasets inherently because the labeling is subjective to the annotator, clarity of the image, etc. Recent works use sample selection methods to solve this noisy annotation problem in FER. In our work, we… ▽ More

    Submitted 3 May, 2023; originally announced May 2023.

    Comments: 14 pages, 9 figures

  3. arXiv:2303.09785  [pdf, ps, other

    cs.CV

    ABAW : Facial Expression Recognition in the wild

    Authors: Darshan Gera, Badveeti Naveen Siva Kumar, Bobbili Veerendra Raj Kumar, S Balasubramanian

    Abstract: The fifth Affective Behavior Analysis in-the-wild (ABAW) competition has multiple challenges such as Valence-Arousal Estimation Challenge, Expression Classification Challenge, Action Unit Detection Challenge, Emotional Reaction Intensity Estimation Challenge. In this paper we have dealt only expression classification challenge using multiple approaches such as fully supervised, semi-supervised and… ▽ More

    Submitted 17 March, 2023; originally announced March 2023.

    Comments: 6 pages

  4. arXiv:2208.10221  [pdf, other

    cs.CV cs.AI

    Dynamic Adaptive Threshold based Learning for Noisy Annotations Robust Facial Expression Recognition

    Authors: Darshan Gera, Naveen Siva Kumar Badveeti, Bobbili Veerendra Raj Kumar, S Balasubramanian

    Abstract: The real-world facial expression recognition (FER) datasets suffer from noisy annotations due to crowd-sourcing, ambiguity in expressions, the subjectivity of annotators and inter-class similarity. However, the recent deep networks have strong capacity to memorize the noisy annotations leading to corrupted feature embedding and poor generalization. To handle noisy annotations, we propose a dynamic… ▽ More

    Submitted 22 August, 2022; originally announced August 2022.

  5. arXiv:2207.09012  [pdf, other

    cs.CV

    SS-MFAR : Semi-supervised Multi-task Facial Affect Recognition

    Authors: Darshan Gera, Badveeti Naveen Siva Kumar, Bobbili Veerendra Raj Kumar, S Balasubramanian

    Abstract: Automatic affect recognition has applications in many areas such as education, gaming, software development, automotives, medical care, etc. but it is non trivial task to achieve appreciable performance on in-the-wild data sets. In-the-wild data sets though represent real-world scenarios better than synthetic data sets, the former ones suffer from the problem of incomplete labels. Inspired by semi… ▽ More

    Submitted 5 August, 2022; v1 submitted 18 July, 2022; originally announced July 2022.

    Comments: ABAW 2022 test set results added

  6. arXiv:2007.10315  [pdf, other

    cs.CV

    Joint Disentangling and Adaptation for Cross-Domain Person Re-Identification

    Authors: Yang Zou, Xiaodong Yang, Zhiding Yu, B. V. K. Vijaya Kumar, Jan Kautz

    Abstract: Although a significant progress has been witnessed in supervised person re-identification (re-id), it remains challenging to generalize re-id models to new domains due to the huge domain gaps. Recently, there has been a growing interest in using unsupervised domain adaptation to address this scalability issue. Existing methods typically conduct adaptation on the representation space that contains… ▽ More

    Submitted 20 July, 2020; originally announced July 2020.

    Comments: ECCV 2020 (Oral)

  7. arXiv:2005.00946  [pdf, other

    eess.IV cs.CV physics.optics

    Towards Occlusion-Aware Multifocal Displays

    Authors: Jen-Hao Rick Chang, Anat Levin, B. V. K. Vijaya Kumar, Aswin C. Sankaranarayanan

    Abstract: The human visual system uses numerous cues for depth perception, including disparity, accommodation, motion parallax and occlusion. It is incumbent upon virtual-reality displays to satisfy these cues to provide an immersive user experience. Multifocal displays, one of the classic approaches to satisfy the accommodation cue, place virtual content at multiple focal planes, each at a di erent depth.… ▽ More

    Submitted 2 May, 2020; originally announced May 2020.

    Comments: SIGGRAPH 2020

  8. arXiv:1910.10369  [pdf, other

    cs.CV cs.LG

    Deep Classification Network for Monocular Depth Estimation

    Authors: Azeez Oluwafemi, Yang Zou, B. V. K. Vijaya Kumar

    Abstract: Monocular Depth Estimation is usually treated as a supervised and regression problem when it actually is very similar to semantic segmentation task since they both are fundamentally pixel-level classification tasks. We applied depth increments that increases with depth in discretizing depth values and then applied Deeplab v2 and the result was higher accuracy. We were able to achieve a state-of-th… ▽ More

    Submitted 23 October, 2019; originally announced October 2019.

  9. arXiv:1908.09822  [pdf, other

    cs.CV cs.LG cs.MM cs.RO

    Confidence Regularized Self-Training

    Authors: Yang Zou, Zhiding Yu, Xiaofeng Liu, B. V. K. Vijaya Kumar, Jinsong Wang

    Abstract: Recent advances in domain adaptation show that deep self-training presents a powerful means for unsupervised domain adaptation. These methods often involve an iterative process of predicting on target domain and then taking the confident predictions as pseudo-labels for retraining. However, since pseudo-labels can be noisy, self-training can put overconfident label belief on wrong classes, leading… ▽ More

    Submitted 15 July, 2020; v1 submitted 26 August, 2019; originally announced August 2019.

    Comments: Accepted to ICCV 2019 (Oral)

  10. arXiv:1908.01872  [pdf, other

    cs.CV cs.LG eess.IV

    Attention Control with Metric Learning Alignment for Image Set-based Recognition

    Authors: Xiaofeng Liu, Zhenhua Guo, Jane You, B. V. K Vijaya Kumar

    Abstract: This paper considers the problem of image set-based face verification and identification. Unlike traditional single sample (an image or a video) setting, this situation assumes the availability of a set of heterogeneous collection of orderless images and videos. The samples can be taken at different check points, different identity documents $etc$. The importance of each image is usually considere… ▽ More

    Submitted 5 August, 2019; originally announced August 2019.

    Comments: Accepted to IEEE T-IFS (Extension of ECCV 2018 paper: Dependency-aware Attention Control for Unconstrained Face Recognition with Image Sets). arXiv admin note: substantial text overlap with arXiv:1907.03030; text overlap with arXiv:1707.00130 by other authors

  11. arXiv:1908.01174  [pdf, other

    cs.CV cs.LG eess.IV

    Permutation-invariant Feature Restructuring for Correlation-aware Image Set-based Recognition

    Authors: Xiaofeng Liu, Zhenhua Guo, Site Li, Lingsheng Kong, Ping Jia, Jane You, B. V. K. Kumar

    Abstract: We consider the problem of comparing the similarity of image sets with variable-quantity, quality and un-ordered heterogeneous images. We use feature restructuring to exploit the correlations of both inner$\&$inter-set images. Specifically, the residual self-attention can effectively restructure the features using the other features within a set to emphasize the discriminative images and eliminate… ▽ More

    Submitted 3 August, 2019; originally announced August 2019.

    Comments: Accepted to ICCV 2019

  12. arXiv:1907.03030  [pdf, other

    cs.CV cs.AI cs.LG cs.MM

    Dependency-aware Attention Control for Unconstrained Face Recognition with Image Sets

    Authors: Xiaofeng Liu, B. V. K Vijaya Kumar, Chao Yang, Qingming Tang, Jane You

    Abstract: This paper targets the problem of image set-based face verification and identification. Unlike traditional single media (an image or video) setting, we encounter a set of heterogeneous contents containing orderless images and videos. The importance of each image is usually considered either equal or based on their independent quality assessment. How to model the relationship of orderless images wi… ▽ More

    Submitted 5 July, 2019; originally announced July 2019.

    Comments: Fixed the unreadable code in CVF version. arXiv admin note: text overlap with arXiv:1707.00130 by other authors

  13. arXiv:1810.07911  [pdf, other

    cs.CV cs.LG cs.MM

    Domain Adaptation for Semantic Segmentation via Class-Balanced Self-Training

    Authors: Yang Zou, Zhiding Yu, B. V. K. Vijaya Kumar, Jinsong Wang

    Abstract: Recent deep networks achieved state of the art performance on a variety of semantic segmentation tasks. Despite such progress, these models often face challenges in real world `wild tasks' where large difference between labeled training/source data and unseen test/target data exists. In particular, such difference is often referred to as `domain gap', and could cause significantly decreased perfor… ▽ More

    Submitted 25 October, 2018; v1 submitted 18 October, 2018; originally announced October 2018.

    Comments: Accepted to ECCV 2018

  14. arXiv:1808.01992  [pdf, other

    cs.CV cs.LG cs.MM cs.RO

    Simultaneous Edge Alignment and Learning

    Authors: Zhiding Yu, Weiyang Liu, Yang Zou, Chen Feng, Srikumar Ramalingam, B. V. K. Vijaya Kumar, Jan Kautz

    Abstract: Edge detection is among the most fundamental vision problems for its role in perceptual grouping and its wide applications. Recent advances in representation learning have led to considerable improvements in this area. Many state of the art edge detection models are learned with fully convolutional networks (FCNs). However, FCN-based edge learning tends to be vulnerable to misaligned labels due to… ▽ More

    Submitted 26 October, 2018; v1 submitted 6 August, 2018; originally announced August 2018.

    Comments: Accepted to ECCV 2018

  15. Towards Multifocal Displays with Dense Focal Stacks

    Authors: Jen-Hao Rick Chang, B. V. K. Vijaya Kumar, Aswin C. Sankaranarayanan

    Abstract: We present a virtual reality display that is capable of generating a dense collection of depth/focal planes. This is achieved by driving a focus-tunable lens to sweep a range of focal lengths at a high frequency and, subsequently, tracking the focal length precisely at microsecond time resolutions using an optical module. Precise tracking of the focal length, coupled with a high-speed display, ena… ▽ More

    Submitted 22 September, 2018; v1 submitted 27 May, 2018; originally announced May 2018.

  16. Redundancy allocation in finite-length nested codes for nonvolatile memories

    Authors: Yongjune Kim, B. V. K. Vijaya Kumar

    Abstract: In this paper, we investigate the optimum way to allocate redundancy of finite-length nested codes for modern nonvolatile memories suffering from both permanent defects and transient errors (erasures or random errors). A nested coding approach such as partitioned codes can handle both permanent defects and transient errors by using two parts of redundancy: 1) redundancy to deal with permanent defe… ▽ More

    Submitted 28 February, 2018; originally announced March 2018.

    Comments: accepted by Journal of Communications and Networks (JCN)

  17. arXiv:1703.09912  [pdf, other

    cs.CV

    One Network to Solve Them All --- Solving Linear Inverse Problems using Deep Projection Models

    Authors: J. H. Rick Chang, Chun-Liang Li, Barnabas Poczos, B. V. K. Vijaya Kumar, Aswin C. Sankaranarayanan

    Abstract: While deep learning methods have achieved state-of-the-art performance in many challenging inverse problems like image inpainting and super-resolution, they invariably involve problem-specific training of the networks. Under this approach, different problems require different networks. In scenarios where we need to solve a wide variety of problems, e.g., on a mobile camera, it is inefficient and c… ▽ More

    Submitted 29 March, 2017; originally announced March 2017.

    ACM Class: I.4.5

  18. Duality between erasures and defects

    Authors: Yongjune Kim, B. V. K. Vijaya Kumar

    Abstract: We investigate the duality of the binary erasure channel (BEC) and the binary defect channel (BDC). This duality holds for channel capacities, capacity achieving schemes, minimum distances, and upper bounds on the probability of failure to retrieve the original message. In addition, the relations between BEC, BDC, binary erasure quantization (BEQ), and write-once memory (WOM) are described. From t… ▽ More

    Submitted 10 February, 2016; originally announced February 2016.

    Comments: Presented at Information Theory and Applications (ITA) Workshop 2016. arXiv admin note: text overlap with arXiv:1602.01202

  19. Locally rewritable codes for resistive memories

    Authors: Yongjune Kim, Abhishek A. Sharma, Robert Mateescu, Seung-Hwan Song, Zvonimir Z. Bandic, James A. Bain, B. V. K. Vijaya Kumar

    Abstract: We propose locally rewritable codes (LWC) for resistive memories inspired by locally repairable codes (LRC) for distributed storage systems. Small values of repair locality of LRC enable fast repair of a single failed node since the lost data in the failed node can be recovered by accessing only a small fraction of other nodes. By using rewriting locality, LWC can improve endurance limit and power… ▽ More

    Submitted 3 February, 2016; originally announced February 2016.

    Comments: accepted by IEEE International Conference on Communications (ICC) 2016

  20. arXiv:1411.4701  [pdf, other

    cs.CV cs.RO

    Structured Hough Voting for Vision-based Highway Border Detection

    Authors: Zhiding Yu, Wende Zhang, B. V. K. Vijaya Kumar, Dan Levi

    Abstract: We propose a vision-based highway border detection algorithm using structured Hough voting. Our approach takes advantage of the geometric relationship between highway road borders and highway lane markings. It uses a strategy where a number of trained road border and lane marking detectors are triggered, followed by Hough voting to generate corresponding detection of the border and lane marking. S… ▽ More

    Submitted 17 November, 2014; originally announced November 2014.

  21. Zero-Aliasing Correlation Filters for Object Recognition

    Authors: Joseph A. Fernandez, Vishnu Naresh Boddeti, Andres Rodriguez, B. V. K. Vijaya Kumar

    Abstract: Correlation filters (CFs) are a class of classifiers that are attractive for object localization and tracking applications. Traditionally, CFs have been designed in the frequency domain using the discrete Fourier transform (DFT), where correlation is efficiently implemented. However, existing CF designs do not account for the fact that the multiplication of two DFTs in the frequency domain corresp… ▽ More

    Submitted 19 November, 2014; v1 submitted 9 November, 2014; originally announced November 2014.

    Comments: 14 pages, to appear in IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI)

  22. Coding scheme for 3D vertical flash memory

    Authors: Yongjune Kim, Robert Mateescu, Seung-Hwan Song, Zvonimir Bandic, B. V. K. Vijaya Kumar

    Abstract: Recently introduced 3D vertical flash memory is expected to be a disruptive technology since it overcomes scaling challenges of conventional 2D planar flash memory by stacking up cells in the vertical direction. However, 3D vertical flash memory suffers from a new problem known as fast detrapping, which is a rapid charge loss problem. In this paper, we propose a scheme to compensate the effect of… ▽ More

    Submitted 10 February, 2015; v1 submitted 30 October, 2014; originally announced October 2014.

    Comments: 7 pages, 9 figures. accepted to ICC 2015. arXiv admin note: text overlap with arXiv:1410.1775

  23. Writing on dirty flash memory

    Authors: Yongjune Kim, B. V. K. Vijaya Kumar

    Abstract: The most important challenge in the scaling down of flash memory is its increased inter-cell interference (ICI). If side information about ICI is known to the encoder, the flash memory channel can be viewed as similar to Costa's "writing on dirty paper (dirty paper coding)." We first explain why flash memories are dirty due to ICI. We then show that "dirty flash memory" can be changed into "memory… ▽ More

    Submitted 7 October, 2014; originally announced October 2014.

    Comments: 8 pages, accepted to 52nd Annual Allerton Conference on Communication, Control, and Computing, Oct. 2014

  24. arXiv:1404.6031  [pdf, other

    cs.CV

    Maximum Margin Vector Correlation Filter

    Authors: Vishnu Naresh Boddeti, B. V. K. Vijaya Kumar

    Abstract: Correlation Filters (CFs) are a class of classifiers which are designed for accurate pattern localization. Traditionally CFs have been used with scalar features only, which limits their ability to be used with vector feature representations like Gabor filter banks, SIFT, HOG, etc. In this paper we present a new CF named Maximum Margin Vector Correlation Filter (MMVCF) which extends the traditional… ▽ More

    Submitted 24 April, 2014; originally announced April 2014.

    Comments: 8 pages

  25. On the Duality of Erasures and Defects

    Authors: Yongjune Kim, B V K Vijaya Kumar

    Abstract: In this paper, the duality of erasures and defects will be investigated by comparing the binary erasure channel (BEC) and the binary defect channel (BDC). The duality holds for channel capacities, capacity achieving schemes, minimum distances, and upper bounds on the probability of failure to retrieve the original message. Also, the binary defect and erasure channel (BDEC) will be introduced by co… ▽ More

    Submitted 7 March, 2014; originally announced March 2014.

    Comments: 40 pages, 8 figures, submitted to IEEE Transactions on Information Theory

  26. Redundancy Allocation of Partitioned Linear Block Codes

    Authors: Yongjune Kim, B. V. K. Vijaya Kumar

    Abstract: Most memories suffer from both permanent defects and intermittent random errors. The partitioned linear block codes (PLBC) were proposed by Heegard to efficiently mask stuck-at defects and correct random errors. The PLBC have two separate redundancy parts for defects and random errors. In this paper, we investigate the allocation of redundancy between these two parts. The optimal redundancy alloca… ▽ More

    Submitted 14 May, 2013; originally announced May 2013.

    Comments: 5 pages, 2 figures, to appear in IEEE International Symposium on Information Theory (ISIT), Jul. 2013

  27. Coding for Memory with Stuck-at Defects

    Authors: Yongjune Kim, B. V. K. Vijaya Kumar

    Abstract: In this paper, we propose an encoding scheme for partitioned linear block codes (PLBC) which mask the stuck-at defects in memories. In addition, we derive an upper bound and the estimate of the probability that masking fails. Numerical results show that PLBC can efficiently mask the defects with the proposed encoding scheme. Also, we show that our upper bound is very tight by using numerical resul… ▽ More

    Submitted 17 April, 2013; originally announced April 2013.

    Comments: 6 pages, 5 figures, IEEE International Conference on Communications (ICC), Jun. 2013

  28. Modulation Coding for Flash Memories

    Authors: Yongjune Kim, Kyoung Lae Cho, Hongrak Son, Jaehong Kim, Jun Jin Kong, Jaejin Lee, B. V. K. Vijaya Kumar

    Abstract: The aggressive scaling down of flash memories has threatened data reliability since the scaling down of cell sizes gives rise to more serious degradation mechanisms such as cell-to-cell interference and lateral charge spreading. The effect of these mechanisms has pattern dependency and some data patterns are more vulnerable than other ones. In this paper, we will categorize data patterns taking in… ▽ More

    Submitted 17 April, 2013; originally announced April 2013.

    Comments: 7 pages, 9 figures, Proc. IEEE International Conference on Computing, Networking and Communications (ICNC), Jan. 2013