Alert button
Picture for Chenchen Zhao

Chenchen Zhao

Alert button

Multichannel consecutive data cross-extraction with 1DCNN-attention for diagnosis of power transformer

Add code
Bookmark button
Alert button
Oct 11, 2023
Wei Zheng, Guogang Zhang, Chenchen Zhao, Qianqian Zhu

Figure 1 for Multichannel consecutive data cross-extraction with 1DCNN-attention for diagnosis of power transformer
Figure 2 for Multichannel consecutive data cross-extraction with 1DCNN-attention for diagnosis of power transformer
Figure 3 for Multichannel consecutive data cross-extraction with 1DCNN-attention for diagnosis of power transformer
Figure 4 for Multichannel consecutive data cross-extraction with 1DCNN-attention for diagnosis of power transformer
Viaarxiv icon

DiffGuard: Semantic Mismatch-Guided Out-of-Distribution Detection using Pre-trained Diffusion Models

Add code
Bookmark button
Alert button
Aug 16, 2023
Ruiyuan Gao, Chenchen Zhao, Lanqing Hong, Qiang Xu

Figure 1 for DiffGuard: Semantic Mismatch-Guided Out-of-Distribution Detection using Pre-trained Diffusion Models
Figure 2 for DiffGuard: Semantic Mismatch-Guided Out-of-Distribution Detection using Pre-trained Diffusion Models
Figure 3 for DiffGuard: Semantic Mismatch-Guided Out-of-Distribution Detection using Pre-trained Diffusion Models
Figure 4 for DiffGuard: Semantic Mismatch-Guided Out-of-Distribution Detection using Pre-trained Diffusion Models
Viaarxiv icon

HumanSD: A Native Skeleton-Guided Diffusion Model for Human Image Generation

Add code
Bookmark button
Alert button
Apr 09, 2023
Xuan Ju, Ailing Zeng, Chenchen Zhao, Jianan Wang, Lei Zhang, Qiang Xu

Figure 1 for HumanSD: A Native Skeleton-Guided Diffusion Model for Human Image Generation
Figure 2 for HumanSD: A Native Skeleton-Guided Diffusion Model for Human Image Generation
Figure 3 for HumanSD: A Native Skeleton-Guided Diffusion Model for Human Image Generation
Figure 4 for HumanSD: A Native Skeleton-Guided Diffusion Model for Human Image Generation
Viaarxiv icon

Blurring Fools the Network -- Adversarial Attacks by Feature Peak Suppression and Gaussian Blurring

Add code
Bookmark button
Alert button
Dec 21, 2020
Chenchen Zhao, Hao Li

Figure 1 for Blurring Fools the Network -- Adversarial Attacks by Feature Peak Suppression and Gaussian Blurring
Figure 2 for Blurring Fools the Network -- Adversarial Attacks by Feature Peak Suppression and Gaussian Blurring
Figure 3 for Blurring Fools the Network -- Adversarial Attacks by Feature Peak Suppression and Gaussian Blurring
Figure 4 for Blurring Fools the Network -- Adversarial Attacks by Feature Peak Suppression and Gaussian Blurring
Viaarxiv icon

Amplifying the Anterior-Posterior Difference via Data Enhancement -- A More Robust Deep Monocular Orientation Estimation Solution

Add code
Bookmark button
Alert button
Dec 21, 2020
Chenchen Zhao, Hao Li

Figure 1 for Amplifying the Anterior-Posterior Difference via Data Enhancement -- A More Robust Deep Monocular Orientation Estimation Solution
Figure 2 for Amplifying the Anterior-Posterior Difference via Data Enhancement -- A More Robust Deep Monocular Orientation Estimation Solution
Figure 3 for Amplifying the Anterior-Posterior Difference via Data Enhancement -- A More Robust Deep Monocular Orientation Estimation Solution
Figure 4 for Amplifying the Anterior-Posterior Difference via Data Enhancement -- A More Robust Deep Monocular Orientation Estimation Solution
Viaarxiv icon

Exploiting Vulnerability of Pooling in Convolutional Neural Networks by Strict Layer-Output Manipulation for Adversarial Attacks

Add code
Bookmark button
Alert button
Dec 21, 2020
Chenchen Zhao, Hao Li

Figure 1 for Exploiting Vulnerability of Pooling in Convolutional Neural Networks by Strict Layer-Output Manipulation for Adversarial Attacks
Figure 2 for Exploiting Vulnerability of Pooling in Convolutional Neural Networks by Strict Layer-Output Manipulation for Adversarial Attacks
Figure 3 for Exploiting Vulnerability of Pooling in Convolutional Neural Networks by Strict Layer-Output Manipulation for Adversarial Attacks
Figure 4 for Exploiting Vulnerability of Pooling in Convolutional Neural Networks by Strict Layer-Output Manipulation for Adversarial Attacks
Viaarxiv icon

Monocular Pedestrian Orientation Estimation Based on Deep 2D-3D Feedforward

Add code
Bookmark button
Alert button
Sep 24, 2019
Chenchen Zhao, Yeqiang Qian, Ming Yang

Figure 1 for Monocular Pedestrian Orientation Estimation Based on Deep 2D-3D Feedforward
Figure 2 for Monocular Pedestrian Orientation Estimation Based on Deep 2D-3D Feedforward
Figure 3 for Monocular Pedestrian Orientation Estimation Based on Deep 2D-3D Feedforward
Figure 4 for Monocular Pedestrian Orientation Estimation Based on Deep 2D-3D Feedforward
Viaarxiv icon