diff options
Diffstat (limited to 'site/datasets/final/pipa.csv')
| -rw-r--r-- | site/datasets/final/pipa.csv | 37 |
1 files changed, 0 insertions, 37 deletions
diff --git a/site/datasets/final/pipa.csv b/site/datasets/final/pipa.csv deleted file mode 100644 index c68e70b6..00000000 --- a/site/datasets/final/pipa.csv +++ /dev/null @@ -1,37 +0,0 @@ -index,dataset_name,key,lat,lng,loc,loc_type,paper_id,paper_type,paper_url,title,year -0,PIPA,pipa,0.0,0.0,,,0a85bdff552615643dd74646ac881862a7c7072d,main,https://doi.org/10.1109/CVPR.2015.7299113,Beyond frontal faces: Improving Person Recognition using multiple cues,2015 -1,PIPA,pipa,49.2579566,7.04577417,Max Planck Institute for Informatics,edu,bfc04ce7752fac884cf5a78b30ededfd5a0ad109,citation,https://arxiv.org/pdf/1804.04779.pdf,A Hybrid Model for Identity Obfuscation by Face Replacement,2018 -2,PIPA,pipa,28.59899755,-81.19712501,University of Central Florida,edu,2b339ece73e3787f445c5b92078e8f82c9b1c522,citation,http://pdfs.semanticscholar.org/7a2e/e06aaa3f342937225272951c0b6dd4309a7a.pdf,"Human Re-identification in Crowd Videos Using Personal, Social and Environmental Constraints",2016 -3,PIPA,pipa,49.2579566,7.04577417,Max Planck Institute for Informatics,edu,bc27434e376db89fe0e6ef2d2fabc100d2575ec6,citation,https://arxiv.org/pdf/1607.08438.pdf,Faceless Person Recognition; Privacy Implications in Social Media,2016 -4,PIPA,pipa,49.2579566,7.04577417,Max Planck Institute for Informatics,edu,0c59071ddd33849bd431165bc2d21bbe165a81e0,citation,http://www.cv-foundation.org/openaccess/content_iccv_2015/papers/Oh_Person_Recognition_in_ICCV_2015_paper.pdf,Person Recognition in Personal Photo Collections,2015 -5,PIPA,pipa,49.2579566,7.04577417,Max Planck Institute for Informatics,edu,23429ef60e7a9c0e2f4d81ed1b4e47cc2616522f,citation,https://arxiv.org/pdf/1704.06456.pdf,A Domain Based Approach to Social Relation Recognition,2017 -6,PIPA,pipa,49.2579566,7.04577417,Max Planck Institute for Informatics,edu,ba7b12c8e2ff3c5e4e0f70b58215b41b18ff8feb,citation,https://arxiv.org/pdf/1711.09001.pdf,Natural and Effective Obfuscation by Head Inpainting,2017 -7,PIPA,pipa,49.2579566,7.04577417,Max Planck Institute for Informatics,edu,808b685d09912cbef4a009e74e10476304b4cccf,citation,http://pdfs.semanticscholar.org/808b/685d09912cbef4a009e74e10476304b4cccf.pdf,From Understanding to Controlling Privacy against Automatic Person Recognition in Social Media,2017 -8,PIPA,pipa,42.4505507,-76.4783513,Cornell University,edu,0da75b0d341c8f945fae1da6c77b6ec345f47f2a,citation,https://pdfs.semanticscholar.org/0da7/5b0d341c8f945fae1da6c77b6ec345f47f2a.pdf,The Effect of Computer-Generated Descriptions on Photo-Sharing Experiences of People With Visual Impairments,2017 -9,PIPA,pipa,42.4505507,-76.4783513,Cornell University,edu,0aaf785d7f21d2b5ad582b456896495d30b0a4e2,citation,http://dl.acm.org/citation.cfm?id=3173789,A Face Recognition Application for People with Visual Impairments: Understanding Use Beyond the Lab,2018 -10,PIPA,pipa,22.42031295,114.20788644,Chinese University of Hong Kong,edu,c97a5f2241cc6cd99ef0c4527ea507a50841f60b,citation,https://arxiv.org/pdf/1807.10510.pdf,Person Search in Videos with One Portrait Through Visual and Temporal Links,2018 -11,PIPA,pipa,40.00229045,116.32098908,Tsinghua University,edu,c97a5f2241cc6cd99ef0c4527ea507a50841f60b,citation,https://arxiv.org/pdf/1807.10510.pdf,Person Search in Videos with One Portrait Through Visual and Temporal Links,2018 -12,PIPA,pipa,22.42031295,114.20788644,Chinese University of Hong Kong,edu,6fed504da4e192fe4c2d452754d23d3db4a4e5e3,citation,http://pdfs.semanticscholar.org/85ee/d639f7367c794a6d8b38619697af3efaacfe.pdf,Learning Deep Features via Congenerous Cosine Loss for Person Recognition,2017 -13,PIPA,pipa,-33.8809651,151.20107299,University of Technology Sydney,edu,0b84f07af44f964817675ad961def8a51406dd2e,citation,http://doi.ieeecomputersociety.org/10.1109/CVPR.2017.357,Person Re-identification in the Wild,2017 -14,PIPA,pipa,17.4454957,78.34854698,International Institute of Information Technology,edu,eb8a3948c4be0d23eb7326d27f2271be893b3409,citation,http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7914701,A Probabilistic Approach to People-Centric Photo Selection and Sequencing,2017 -15,PIPA,pipa,1.3037257,103.7737763,University of Illinois’ Advanced Digital Sciences Center,edu,eb8a3948c4be0d23eb7326d27f2271be893b3409,citation,http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7914701,A Probabilistic Approach to People-Centric Photo Selection and Sequencing,2017 -16,PIPA,pipa,49.2579566,7.04577417,Max Planck Institute for Informatics,edu,3e0a1884448bfd7f416c6a45dfcdfc9f2e617268,citation,https://arxiv.org/pdf/1805.05838.pdf,Understanding and Controlling User Linkability in Decentralized Learning,2018 -17,PIPA,pipa,23.09461185,113.28788994,Sun Yat-Sen University,edu,725c3605c2d26d113637097358cd4c08c19ff9e1,citation,https://arxiv.org/pdf/1807.00504.pdf,Deep Reasoning with Knowledge Graph for Social Relationship Understanding,2018 -18,PIPA,pipa,51.7534538,-1.25400997,University of Oxford,edu,ff1f45bdad41d8b35435098041e009627e60d208,citation,http://pdfs.semanticscholar.org/ff1f/45bdad41d8b35435098041e009627e60d208.pdf,"NAGRANI, ZISSERMAN: FROM BENEDICT CUMBERBATCH TO SHERLOCK HOLMES 1 From Benedict Cumberbatch to Sherlock Holmes: Character Identification in TV series without a Script",2017 -19,PIPA,pipa,40.742252,-74.0270949,Stevens Institute of Technology,edu,1e1d7cbbef67e9e042a3a0a9a1bcefcc4a9adacf,citation,http://personal.stevens.edu/~hli18//data/papers/CVPR2016_CameraReady.pdf,A Multi-level Contextual Model for Person Recognition in Photo Albums,2016 -20,PIPA,pipa,42.4505507,-76.4783513,Cornell University,edu,269248eb8a44da5248cef840f7079b1294dbf237,citation,https://arxiv.org/pdf/1805.01515.pdf,The Effect of Computer-Generated Descriptions on Photo-Sharing Experiences of People with Visual Impairments,2017 -21,PIPA,pipa,40.47913175,-74.43168868,Rutgers University,edu,d4448f8aa320f04066cc43201d55ddd023eb712e,citation,https://pdfs.semanticscholar.org/d444/8f8aa320f04066cc43201d55ddd023eb712e.pdf,Clothing Change Aware Person Identification,0 -22,PIPA,pipa,33.9928298,-81.02685168,University of South Carolina,edu,d4448f8aa320f04066cc43201d55ddd023eb712e,citation,https://pdfs.semanticscholar.org/d444/8f8aa320f04066cc43201d55ddd023eb712e.pdf,Clothing Change Aware Person Identification,0 -23,PIPA,pipa,39.94976005,116.33629046,Beijing Jiaotong University,edu,b5968e7bb23f5f03213178c22fd2e47af3afa04c,citation,https://arxiv.org/pdf/1705.07206.pdf,Multiple-Human Parsing in the Wild,2017 -24,PIPA,pipa,1.2962018,103.77689944,National University of Singapore,edu,b5968e7bb23f5f03213178c22fd2e47af3afa04c,citation,https://arxiv.org/pdf/1705.07206.pdf,Multiple-Human Parsing in the Wild,2017 -25,PIPA,pipa,42.4505507,-76.4783513,Cornell University,edu,537328af75f50d49696972a6c34bca97c14bc762,citation,https://arxiv.org/pdf/1805.04049.pdf,Exploiting Unintended Feature Leakage in Collaborative Learning,2018 -26,PIPA,pipa,22.42031295,114.20788644,Chinese University of Hong Kong,edu,1c9efb6c895917174ac6ccc3bae191152f90c625,citation,https://arxiv.org/pdf/1806.03084.pdf,Unifying Identification and Context Learning for Person Recognition,2018 -27,PIPA,pipa,37.21872455,-80.42542519,Virginia Polytechnic Institute and State University,edu,6d8eef8f8d6cd8436c55018e6ca5c5907b31ac19,citation,http://pdfs.semanticscholar.org/6d8e/ef8f8d6cd8436c55018e6ca5c5907b31ac19.pdf,Understanding Representations and Reducing their Redundancy in Deep Networks,2016 -28,PIPA,pipa,17.4454957,78.34854698,International Institute of Information Technology,edu,01e27c91c7cef926389f913d12410725e7dd35ab,citation,https://doi.org/10.1007/s11760-017-1140-5,Semi-supervised annotation of faces in image collection,2018 -29,PIPA,pipa,49.2579566,7.04577417,Max Planck Institute for Informatics,edu,b68150bfdec373ed8e025f448b7a3485c16e3201,citation,https://arxiv.org/pdf/1703.09471.pdf,Adversarial Image Perturbation for Privacy Protection A Game Theory Perspective,2017 -30,PIPA,pipa,30.284151,-97.73195598,University of Texas at Austin,edu,3c57e28a4eb463d532ea2b0b1ba4b426ead8d9a0,citation,http://pdfs.semanticscholar.org/73cc/fdedbd7d72a147925727ba1932f9488cfde3.pdf,Defeating Image Obfuscation with Deep Learning,2016 -31,PIPA,pipa,28.2290209,112.99483204,"National University of Defense Technology, China",edu,5f771fed91c8e4b666489ba2384d0705bcf75030,citation,https://arxiv.org/pdf/1804.03287.pdf,Understanding Humans in Crowded Scenes: Deep Nested Adversarial Learning and A New Benchmark for Multi-Human Parsing,2018 -32,PIPA,pipa,1.2962018,103.77689944,National University of Singapore,edu,5f771fed91c8e4b666489ba2384d0705bcf75030,citation,https://arxiv.org/pdf/1804.03287.pdf,Understanding Humans in Crowded Scenes: Deep Nested Adversarial Learning and A New Benchmark for Multi-Human Parsing,2018 -33,PIPA,pipa,22.42031295,114.20788644,Chinese University of Hong Kong,edu,d949fadc9b6c5c8b067fa42265ad30945f9caa99,citation,https://arxiv.org/pdf/1710.00870.pdf,Rethinking Feature Discrimination and Polymerization for Large-scale Recognition,2017 -34,PIPA,pipa,-34.9189226,138.60423668,University of Adelaide,edu,3d24b386d003bee176a942c26336dbe8f427aadd,citation,http://arxiv.org/abs/1611.09967,Sequential Person Recognition in Photo Albums with a Recurrent Network,2017 -35,PIPA,pipa,42.4505507,-76.4783513,Cornell University,edu,8bdf6f03bde08c424c214188b35be8b2dec7cdea,citation,https://arxiv.org/pdf/1805.04049.pdf,Inference Attacks Against Collaborative Learning,2018 |
