Alert button
Picture for Dongdong Hou

Dongdong Hou

Alert button

Semantic-Transferable Weakly-Supervised Endoscopic Lesions Segmentation

Add code
Bookmark button
Alert button
Aug 22, 2019
Jiahua Dong, Yang Cong, Gan Sun, Dongdong Hou

Figure 1 for Semantic-Transferable Weakly-Supervised Endoscopic Lesions Segmentation
Figure 2 for Semantic-Transferable Weakly-Supervised Endoscopic Lesions Segmentation
Figure 3 for Semantic-Transferable Weakly-Supervised Endoscopic Lesions Segmentation
Figure 4 for Semantic-Transferable Weakly-Supervised Endoscopic Lesions Segmentation
Viaarxiv icon

Gated Context Aggregation Network for Image Dehazing and Deraining

Add code
Bookmark button
Alert button
Nov 21, 2018
Dongdong Chen, Mingming He, Qingnan Fan, Jing Liao, Liheng Zhang, Dongdong Hou, Lu Yuan, Gang Hua

Figure 1 for Gated Context Aggregation Network for Image Dehazing and Deraining
Figure 2 for Gated Context Aggregation Network for Image Dehazing and Deraining
Figure 3 for Gated Context Aggregation Network for Image Dehazing and Deraining
Figure 4 for Gated Context Aggregation Network for Image Dehazing and Deraining
Viaarxiv icon

Emerging Applications of Reversible Data Hiding

Add code
Bookmark button
Alert button
Nov 07, 2018
Dongdong Hou, Weiming Zhang, Jiayang Liu, Siyan Zhou, Dongdong Chen, Nenghai Yu

Figure 1 for Emerging Applications of Reversible Data Hiding
Figure 2 for Emerging Applications of Reversible Data Hiding
Figure 3 for Emerging Applications of Reversible Data Hiding
Figure 4 for Emerging Applications of Reversible Data Hiding
Viaarxiv icon

Reversible Adversarial Examples

Add code
Bookmark button
Alert button
Nov 01, 2018
Jiayang Liu, Dongdong Hou, Weiming Zhang, Nenghai Yu

Figure 1 for Reversible Adversarial Examples
Figure 2 for Reversible Adversarial Examples
Figure 3 for Reversible Adversarial Examples
Viaarxiv icon

Detection based Defense against Adversarial Examples from the Steganalysis Point ot View

Add code
Bookmark button
Alert button
Sep 07, 2018
Jiayang Liu, Weiming Zhang, Yiwei Zhang, Dongdong Hou, Yujia Liu, Hongyue Zha, Nenghai Yu

Figure 1 for Detection based Defense against Adversarial Examples from the Steganalysis Point ot View
Figure 2 for Detection based Defense against Adversarial Examples from the Steganalysis Point ot View
Figure 3 for Detection based Defense against Adversarial Examples from the Steganalysis Point ot View
Figure 4 for Detection based Defense against Adversarial Examples from the Steganalysis Point ot View
Viaarxiv icon