Alert button
Picture for Adams Wai-Kin Kong

Adams Wai-Kin Kong

Alert button

MACE: Mass Concept Erasure in Diffusion Models

Mar 10, 2024
Shilin Lu, Zilan Wang, Leyang Li, Yanzhu Liu, Adams Wai-Kin Kong

Viaarxiv icon

TF-ICON: Diffusion-Based Training-Free Cross-Domain Image Composition

Jul 25, 2023
Shilin Lu, Yanzhu Liu, Adams Wai-Kin Kong

Viaarxiv icon

A Practical Upper Bound for the Worst-Case Attribution Deviations

Mar 01, 2023
Fan Wang, Adams Wai-Kin Kong

Figure 1 for A Practical Upper Bound for the Worst-Case Attribution Deviations
Figure 2 for A Practical Upper Bound for the Worst-Case Attribution Deviations
Figure 3 for A Practical Upper Bound for the Worst-Case Attribution Deviations
Figure 4 for A Practical Upper Bound for the Worst-Case Attribution Deviations
Viaarxiv icon

Flexible-modal Deception Detection with Audio-Visual Adapter

Feb 11, 2023
Zhaoxu Li, Zitong Yu, Nithish Muthuchamy Selvaraj, Xiaobao Guo, Bingquan Shen, Adams Wai-Kin Kong, Alex Kot

Figure 1 for Flexible-modal Deception Detection with Audio-Visual Adapter
Figure 2 for Flexible-modal Deception Detection with Audio-Visual Adapter
Figure 3 for Flexible-modal Deception Detection with Audio-Visual Adapter
Figure 4 for Flexible-modal Deception Detection with Audio-Visual Adapter
Viaarxiv icon

Portmanteauing Features for Scene Text Recognition

Nov 09, 2022
Yew Lee Tan, Ernest Yu Kai Chew, Adams Wai-Kin Kong, Jung-Jae Kim, Joo Hwee Lim

Figure 1 for Portmanteauing Features for Scene Text Recognition
Figure 2 for Portmanteauing Features for Scene Text Recognition
Figure 3 for Portmanteauing Features for Scene Text Recognition
Figure 4 for Portmanteauing Features for Scene Text Recognition
Viaarxiv icon

Transferable Adversarial Attack based on Integrated Gradients

May 26, 2022
Yi Huang, Adams Wai-Kin Kong

Figure 1 for Transferable Adversarial Attack based on Integrated Gradients
Figure 2 for Transferable Adversarial Attack based on Integrated Gradients
Figure 3 for Transferable Adversarial Attack based on Integrated Gradients
Figure 4 for Transferable Adversarial Attack based on Integrated Gradients
Viaarxiv icon

Exploiting the Relationship Between Kendall's Rank Correlation and Cosine Similarity for Attribution Protection

May 15, 2022
Fan Wang, Adams Wai-Kin Kong

Figure 1 for Exploiting the Relationship Between Kendall's Rank Correlation and Cosine Similarity for Attribution Protection
Figure 2 for Exploiting the Relationship Between Kendall's Rank Correlation and Cosine Similarity for Attribution Protection
Figure 3 for Exploiting the Relationship Between Kendall's Rank Correlation and Cosine Similarity for Attribution Protection
Figure 4 for Exploiting the Relationship Between Kendall's Rank Correlation and Cosine Similarity for Attribution Protection
Viaarxiv icon

The Nipple-Areola Complex for Criminal Identification

May 28, 2019
Wojciech Michal Matkowski, Krzysztof Matkowski, Adams Wai-Kin Kong, Cory Lloyd Hall

Figure 1 for The Nipple-Areola Complex for Criminal Identification
Figure 2 for The Nipple-Areola Complex for Criminal Identification
Figure 3 for The Nipple-Areola Complex for Criminal Identification
Figure 4 for The Nipple-Areola Complex for Criminal Identification
Viaarxiv icon