Alert button
Picture for Alan Yuille

Alan Yuille

Alert button

When Radiology Report Generation Meets Knowledge Graph

Feb 19, 2020
Yixiao Zhang, Xiaosong Wang, Ziyue Xu, Qihang Yu, Alan Yuille, Daguang Xu

Figure 1 for When Radiology Report Generation Meets Knowledge Graph
Figure 2 for When Radiology Report Generation Meets Knowledge Graph
Figure 3 for When Radiology Report Generation Meets Knowledge Graph
Figure 4 for When Radiology Report Generation Meets Knowledge Graph
Viaarxiv icon

Object as Hotspots: An Anchor-Free 3D Object Detection Approach via Firing of Hotspots

Dec 30, 2019
Qi Chen, Lin Sun, Zhixin Wang, Kui Jia, Alan Yuille

Figure 1 for Object as Hotspots: An Anchor-Free 3D Object Detection Approach via Firing of Hotspots
Figure 2 for Object as Hotspots: An Anchor-Free 3D Object Detection Approach via Firing of Hotspots
Figure 3 for Object as Hotspots: An Anchor-Free 3D Object Detection Approach via Firing of Hotspots
Figure 4 for Object as Hotspots: An Anchor-Free 3D Object Detection Approach via Firing of Hotspots
Viaarxiv icon

AtomNAS: Fine-Grained End-to-End Neural Architecture Search

Dec 20, 2019
Jieru Mei, Yingwei Li, Xiaochen Lian, Xiaojie Jin, Linjie Yang, Alan Yuille, Jianchao Yang

Figure 1 for AtomNAS: Fine-Grained End-to-End Neural Architecture Search
Figure 2 for AtomNAS: Fine-Grained End-to-End Neural Architecture Search
Figure 3 for AtomNAS: Fine-Grained End-to-End Neural Architecture Search
Figure 4 for AtomNAS: Fine-Grained End-to-End Neural Architecture Search
Viaarxiv icon

Learning from Synthetic Animals

Dec 17, 2019
Jiteng Mu, Weichao Qiu, Gregory Hager, Alan Yuille

Figure 1 for Learning from Synthetic Animals
Figure 2 for Learning from Synthetic Animals
Figure 3 for Learning from Synthetic Animals
Figure 4 for Learning from Synthetic Animals
Viaarxiv icon

Identity Preserve Transform: Understand What Activity Classification Models Have Learnt

Dec 13, 2019
Jialing Lyu, Weichao Qiu, Xinyue Wei, Yi Zhang, Alan Yuille, Zheng-Jun Zha

Figure 1 for Identity Preserve Transform: Understand What Activity Classification Models Have Learnt
Figure 2 for Identity Preserve Transform: Understand What Activity Classification Models Have Learnt
Figure 3 for Identity Preserve Transform: Understand What Activity Classification Models Have Learnt
Figure 4 for Identity Preserve Transform: Understand What Activity Classification Models Have Learnt
Viaarxiv icon

Zero-shot Recognition of Complex Action Sequences

Dec 08, 2019
Jonathan D. Jones, Tae Soo Kim, Michael Peven, Jin Bai, Zihao Xiao, Yi Zhang, Weichao Qiu, Alan Yuille, Gregory D. Hager

Figure 1 for Zero-shot Recognition of Complex Action Sequences
Figure 2 for Zero-shot Recognition of Complex Action Sequences
Figure 3 for Zero-shot Recognition of Complex Action Sequences
Figure 4 for Zero-shot Recognition of Complex Action Sequences
Viaarxiv icon

RSA: Randomized Simulation as Augmentation for Robust Human Action Recognition

Dec 03, 2019
Yi Zhang, Xinyue Wei, Weichao Qiu, Zihao Xiao, Gregory D. Hager, Alan Yuille

Figure 1 for RSA: Randomized Simulation as Augmentation for Robust Human Action Recognition
Figure 2 for RSA: Randomized Simulation as Augmentation for Robust Human Action Recognition
Figure 3 for RSA: Randomized Simulation as Augmentation for Robust Human Action Recognition
Figure 4 for RSA: Randomized Simulation as Augmentation for Robust Human Action Recognition
Viaarxiv icon

Shape-aware Feature Extraction for Instance Segmentation

Nov 25, 2019
Hao Ding, Siyuan Qiao, Wei Shen, Alan Yuille

Figure 1 for Shape-aware Feature Extraction for Instance Segmentation
Figure 2 for Shape-aware Feature Extraction for Instance Segmentation
Figure 3 for Shape-aware Feature Extraction for Instance Segmentation
Figure 4 for Shape-aware Feature Extraction for Instance Segmentation
Viaarxiv icon

Identifying Model Weakness with Adversarial Examiner

Nov 25, 2019
Michelle Shu, Chenxi Liu, Weichao Qiu, Alan Yuille

Figure 1 for Identifying Model Weakness with Adversarial Examiner
Figure 2 for Identifying Model Weakness with Adversarial Examiner
Figure 3 for Identifying Model Weakness with Adversarial Examiner
Figure 4 for Identifying Model Weakness with Adversarial Examiner
Viaarxiv icon

Rethinking Normalization and Elimination Singularity in Neural Networks

Nov 21, 2019
Siyuan Qiao, Huiyu Wang, Chenxi Liu, Wei Shen, Alan Yuille

Figure 1 for Rethinking Normalization and Elimination Singularity in Neural Networks
Figure 2 for Rethinking Normalization and Elimination Singularity in Neural Networks
Figure 3 for Rethinking Normalization and Elimination Singularity in Neural Networks
Figure 4 for Rethinking Normalization and Elimination Singularity in Neural Networks
Viaarxiv icon