Closed oliviernguyenquoc closed 1 year ago
@oliviernguyenquoc, many thanks for your question. This is a very inspiring work, and indeed the two methods are pretty close since both develop an SSL training process using a similar set of augmentations. Therefore, we have included the published version of this work, i.e. the VRL [31] method, in our comparison to the state-of-the-art in Table 1. Yet, there are some key differences between the two approaches:
I am closing this issue since it is not directly related to this repo. Feel free to ask anything if there are further queries.
Very inspiring. Thank you for releasing your code.
Congratulation !
https://www.semanticscholar.org/reader/93d3b14ac1c5b86dc7ea2eef54d4541e4e2df57f
This work seems to be very similar. Did you take inspiration of it ?
How do you think do you perform vs this work ?
If you release the code open source, it already make a huge difference.
Anyway, your paper is very insightful !