Alert button
Picture for Changyou Chen

Changyou Chen

Alert button

LAFITE: Towards Language-Free Training for Text-to-Image Generation

Add code
Bookmark button
Alert button
Dec 13, 2021
Yufan Zhou, Ruiyi Zhang, Changyou Chen, Chunyuan Li, Chris Tensmeyer, Tong Yu, Jiuxiang Gu, Jinhui Xu, Tong Sun

Figure 1 for LAFITE: Towards Language-Free Training for Text-to-Image Generation
Figure 2 for LAFITE: Towards Language-Free Training for Text-to-Image Generation
Figure 3 for LAFITE: Towards Language-Free Training for Text-to-Image Generation
Figure 4 for LAFITE: Towards Language-Free Training for Text-to-Image Generation
Viaarxiv icon

A Generic Approach for Enhancing GANs by Regularized Latent Optimization

Add code
Bookmark button
Alert button
Dec 07, 2021
Yufan Zhou, Chunyuan Li, Changyou Chen, Jinhui Xu

Figure 1 for A Generic Approach for Enhancing GANs by Regularized Latent Optimization
Figure 2 for A Generic Approach for Enhancing GANs by Regularized Latent Optimization
Figure 3 for A Generic Approach for Enhancing GANs by Regularized Latent Optimization
Figure 4 for A Generic Approach for Enhancing GANs by Regularized Latent Optimization
Viaarxiv icon

Using Sampling to Estimate and Improve Performance of Automated Scoring Systems with Guarantees

Add code
Bookmark button
Alert button
Nov 17, 2021
Yaman Kumar Singla, Sriram Krishna, Rajiv Ratn Shah, Changyou Chen

Figure 1 for Using Sampling to Estimate and Improve Performance of Automated Scoring Systems with Guarantees
Figure 2 for Using Sampling to Estimate and Improve Performance of Automated Scoring Systems with Guarantees
Figure 3 for Using Sampling to Estimate and Improve Performance of Automated Scoring Systems with Guarantees
Figure 4 for Using Sampling to Estimate and Improve Performance of Automated Scoring Systems with Guarantees
Viaarxiv icon

AES Systems Are Both Overstable And Oversensitive: Explaining Why And Proposing Defenses

Add code
Bookmark button
Alert button
Oct 14, 2021
Yaman Kumar Singla, Swapnil Parekh, Somesh Singh, Junyi Jessy Li, Rajiv Ratn Shah, Changyou Chen

Figure 1 for AES Systems Are Both Overstable And Oversensitive: Explaining Why And Proposing Defenses
Figure 2 for AES Systems Are Both Overstable And Oversensitive: Explaining Why And Proposing Defenses
Figure 3 for AES Systems Are Both Overstable And Oversensitive: Explaining Why And Proposing Defenses
Figure 4 for AES Systems Are Both Overstable And Oversensitive: Explaining Why And Proposing Defenses
Viaarxiv icon

Perception Point: Identifying Critical Learning Periods in Speech for Bilingual Networks

Add code
Bookmark button
Alert button
Oct 13, 2021
Anuj Saraswat, Mehar Bhatia, Yaman Kumar Singla, Changyou Chen, Rajiv Ratn Shah

Figure 1 for Perception Point: Identifying Critical Learning Periods in Speech for Bilingual Networks
Figure 2 for Perception Point: Identifying Critical Learning Periods in Speech for Bilingual Networks
Figure 3 for Perception Point: Identifying Critical Learning Periods in Speech for Bilingual Networks
Figure 4 for Perception Point: Identifying Critical Learning Periods in Speech for Bilingual Networks
Viaarxiv icon

MINIMAL: Mining Models for Data Free Universal Adversarial Triggers

Add code
Bookmark button
Alert button
Sep 25, 2021
Swapnil Parekh, Yaman Singla Kumar, Somesh Singh, Changyou Chen, Balaji Krishnamurthy, Rajiv Ratn Shah

Figure 1 for MINIMAL: Mining Models for Data Free Universal Adversarial Triggers
Figure 2 for MINIMAL: Mining Models for Data Free Universal Adversarial Triggers
Figure 3 for MINIMAL: Mining Models for Data Free Universal Adversarial Triggers
Figure 4 for MINIMAL: Mining Models for Data Free Universal Adversarial Triggers
Viaarxiv icon

AES Are Both Overstable And Oversensitive: Explaining Why And Proposing Defenses

Add code
Bookmark button
Alert button
Sep 24, 2021
Yaman Kumar Singla, Swapnil Parekh, Somesh Singh, Junyi Jessy Li, Rajiv Ratn Shah, Changyou Chen

Figure 1 for AES Are Both Overstable And Oversensitive: Explaining Why And Proposing Defenses
Figure 2 for AES Are Both Overstable And Oversensitive: Explaining Why And Proposing Defenses
Figure 3 for AES Are Both Overstable And Oversensitive: Explaining Why And Proposing Defenses
Figure 4 for AES Are Both Overstable And Oversensitive: Explaining Why And Proposing Defenses
Viaarxiv icon

Speaker-Conditioned Hierarchical Modeling for Automated Speech Scoring

Add code
Bookmark button
Alert button
Aug 30, 2021
Yaman Kumar Singla, Avykat Gupta, Shaurya Bagga, Changyou Chen, Balaji Krishnamurthy, Rajiv Ratn Shah

Figure 1 for Speaker-Conditioned Hierarchical Modeling for Automated Speech Scoring
Figure 2 for Speaker-Conditioned Hierarchical Modeling for Automated Speech Scoring
Figure 3 for Speaker-Conditioned Hierarchical Modeling for Automated Speech Scoring
Figure 4 for Speaker-Conditioned Hierarchical Modeling for Automated Speech Scoring
Viaarxiv icon