ARM introduces the Confidential Compute Architecture (CCA) in the forthc...
Video Copy Detection (VCD) has been developed to identify instances of
u...
This paper explores a hierarchical prompting mechanism for the hierarchi...
A number of trusted execution environments (TEEs) have been proposed by ...
Product retrieval is of great importance in the ecommerce domain. This p...
Image copy detection (ICD) aims to determine whether a query image is an...
The 2021 Image Similarity Challenge introduced a dataset to serve as a n...
Image copy detection is of great importance in real-life social media. I...
Image copy detection is of great importance in real-life social media. I...
As an emerging technique for confidential computing, trusted execution
e...
While single-view 3D reconstruction has made significant progress benefi...
Rowhammer attacks that corrupt level-1 page tables to gain kernel privil...
Existing person re-identification methods often have low generalization
...
This paper reviews the AIM 2020 challenge on efficient single image
supe...
Cache randomization has recently been revived as a promising defense aga...
A trusted execution environment (TEE) such as Intel Software Guard Exten...
Unsupervised domain adaptation (UDA) for person re-identification is
cha...
Pedestrian detection benefits from deep learning technology and gains ra...
This paper reviews the AIM 2019 challenge on constrained example-based s...
It has been a long standing problem to securely outsource computation ta...
There is an urgent demand for privacy-preserving techniques capable of
s...