Alert button
Picture for Changshui Zhang

Changshui Zhang

Alert button

Fusion Recurrent Neural Network

Add code
Bookmark button
Alert button
Jun 07, 2020
Yiwen Sun, Yulu Wang, Kun Fu, Zheng Wang, Changshui Zhang, Jieping Ye

Figure 1 for Fusion Recurrent Neural Network
Figure 2 for Fusion Recurrent Neural Network
Figure 3 for Fusion Recurrent Neural Network
Figure 4 for Fusion Recurrent Neural Network
Viaarxiv icon

Constructing Geographic and Long-term Temporal Graph for Traffic Forecasting

Add code
Bookmark button
Alert button
Apr 23, 2020
Yiwen Sun, Yulu Wang, Kun Fu, Zheng Wang, Changshui Zhang, Jieping Ye

Figure 1 for Constructing Geographic and Long-term Temporal Graph for Traffic Forecasting
Figure 2 for Constructing Geographic and Long-term Temporal Graph for Traffic Forecasting
Figure 3 for Constructing Geographic and Long-term Temporal Graph for Traffic Forecasting
Figure 4 for Constructing Geographic and Long-term Temporal Graph for Traffic Forecasting
Viaarxiv icon

Boosting Semantic Human Matting with Coarse Annotations

Add code
Bookmark button
Alert button
Apr 10, 2020
Jinlin Liu, Yuan Yao, Wendi Hou, Miaomiao Cui, Xuansong Xie, Changshui Zhang, Xian-sheng Hua

Figure 1 for Boosting Semantic Human Matting with Coarse Annotations
Figure 2 for Boosting Semantic Human Matting with Coarse Annotations
Figure 3 for Boosting Semantic Human Matting with Coarse Annotations
Figure 4 for Boosting Semantic Human Matting with Coarse Annotations
Viaarxiv icon

GreedyNAS: Towards Fast One-Shot NAS with Greedy Supernet

Add code
Bookmark button
Alert button
Mar 25, 2020
Shan You, Tao Huang, Mingmin Yang, Fei Wang, Chen Qian, Changshui Zhang

Figure 1 for GreedyNAS: Towards Fast One-Shot NAS with Greedy Supernet
Figure 2 for GreedyNAS: Towards Fast One-Shot NAS with Greedy Supernet
Figure 3 for GreedyNAS: Towards Fast One-Shot NAS with Greedy Supernet
Figure 4 for GreedyNAS: Towards Fast One-Shot NAS with Greedy Supernet
Viaarxiv icon

RL-Duet: Online Music Accompaniment Generation Using Deep Reinforcement Learning

Add code
Bookmark button
Alert button
Feb 08, 2020
Nan Jiang, Sheng Jin, Zhiyao Duan, Changshui Zhang

Figure 1 for RL-Duet: Online Music Accompaniment Generation Using Deep Reinforcement Learning
Figure 2 for RL-Duet: Online Music Accompaniment Generation Using Deep Reinforcement Learning
Figure 3 for RL-Duet: Online Music Accompaniment Generation Using Deep Reinforcement Learning
Figure 4 for RL-Duet: Online Music Accompaniment Generation Using Deep Reinforcement Learning
Viaarxiv icon

Adversarial Margin Maximization Networks

Add code
Bookmark button
Alert button
Nov 14, 2019
Ziang Yan, Yiwen Guo, Changshui Zhang

Figure 1 for Adversarial Margin Maximization Networks
Figure 2 for Adversarial Margin Maximization Networks
Figure 3 for Adversarial Margin Maximization Networks
Figure 4 for Adversarial Margin Maximization Networks
Viaarxiv icon

What You See is What You Get: Visual Pronoun Coreference Resolution in Dialogues

Add code
Bookmark button
Alert button
Sep 01, 2019
Xintong Yu, Hongming Zhang, Yangqiu Song, Yan Song, Changshui Zhang

Figure 1 for What You See is What You Get: Visual Pronoun Coreference Resolution in Dialogues
Figure 2 for What You See is What You Get: Visual Pronoun Coreference Resolution in Dialogues
Figure 3 for What You See is What You Get: Visual Pronoun Coreference Resolution in Dialogues
Figure 4 for What You See is What You Get: Visual Pronoun Coreference Resolution in Dialogues
Viaarxiv icon

Self-reinforcing Unsupervised Matching

Add code
Bookmark button
Alert button
Aug 23, 2019
Jiang Lu, Lei Li, Changshui Zhang

Figure 1 for Self-reinforcing Unsupervised Matching
Figure 2 for Self-reinforcing Unsupervised Matching
Figure 3 for Self-reinforcing Unsupervised Matching
Figure 4 for Self-reinforcing Unsupervised Matching
Viaarxiv icon

Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks

Add code
Bookmark button
Alert button
Jun 11, 2019
Ziang Yan, Yiwen Guo, Changshui Zhang

Figure 1 for Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks
Figure 2 for Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks
Figure 3 for Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks
Figure 4 for Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks
Viaarxiv icon

Deep Likelihood Network for Image Restoration with Multiple Degradations

Add code
Bookmark button
Alert button
Apr 19, 2019
Yiwen Guo, Wangmeng Zuo, Changshui Zhang, Yurong Chen

Figure 1 for Deep Likelihood Network for Image Restoration with Multiple Degradations
Figure 2 for Deep Likelihood Network for Image Restoration with Multiple Degradations
Figure 3 for Deep Likelihood Network for Image Restoration with Multiple Degradations
Figure 4 for Deep Likelihood Network for Image Restoration with Multiple Degradations
Viaarxiv icon