Alert button
Picture for Dongyu Zhang

Dongyu Zhang

Alert button

CoLafier: Collaborative Noisy Label Purifier With Local Intrinsic Dimensionality Guidance

Jan 10, 2024
Dongyu Zhang, Ruofan Hu, Elke Rundensteiner

Viaarxiv icon

Image Restoration Through Generalized Ornstein-Uhlenbeck Bridge

Dec 16, 2023
Conghan Yue, Zhengwei Peng, Junlong Ma, Shiyan Du, Pengxu Wei, Dongyu Zhang

Viaarxiv icon

UCE-FID: Using Large Unlabeled, Medium Crowdsourced-Labeled, and Small Expert-Labeled Tweets for Foodborne Illness Detection

Dec 02, 2023
Ruofan Hu, Dongyu Zhang, Dandan Tao, Huayi Zhang, Hao Feng, Elke Rundensteiner

Viaarxiv icon

FATA-Trans: Field And Time-Aware Transformer for Sequential Tabular Data

Oct 20, 2023
Dongyu Zhang, Liang Wang, Xin Dai, Shubham Jain, Junpeng Wang, Yujie Fan, Chin-Chia Michael Yeh, Yan Zheng, Zhongfang Zhuang, Wei Zhang

Viaarxiv icon

EVE: Efficient Vision-Language Pre-training with Masked Prediction and Modality-Aware MoE

Aug 23, 2023
Junyi Chen, Longteng Guo, Jia Sun, Shuai Shao, Zehuan Yuan, Liang Lin, Dongyu Zhang

Figure 1 for EVE: Efficient Vision-Language Pre-training with Masked Prediction and Modality-Aware MoE
Figure 2 for EVE: Efficient Vision-Language Pre-training with Masked Prediction and Modality-Aware MoE
Figure 3 for EVE: Efficient Vision-Language Pre-training with Masked Prediction and Modality-Aware MoE
Figure 4 for EVE: Efficient Vision-Language Pre-training with Masked Prediction and Modality-Aware MoE
Viaarxiv icon

TWEET-FID: An Annotated Dataset for Multiple Foodborne Illness Detection Tasks

May 22, 2022
Ruofan Hu, Dongyu Zhang, Dandan Tao, Thomas Hartvigsen, Hao Feng, Elke Rundensteiner

Figure 1 for TWEET-FID: An Annotated Dataset for Multiple Foodborne Illness Detection Tasks
Figure 2 for TWEET-FID: An Annotated Dataset for Multiple Foodborne Illness Detection Tasks
Figure 3 for TWEET-FID: An Annotated Dataset for Multiple Foodborne Illness Detection Tasks
Figure 4 for TWEET-FID: An Annotated Dataset for Multiple Foodborne Illness Detection Tasks
Viaarxiv icon

Surf or sleep? Understanding the influence of bedtime patterns on campus

Feb 18, 2022
Teng Guo, Linhong Li, Dongyu Zhang, Feng Xia

Figure 1 for Surf or sleep? Understanding the influence of bedtime patterns on campus
Figure 2 for Surf or sleep? Understanding the influence of bedtime patterns on campus
Figure 3 for Surf or sleep? Understanding the influence of bedtime patterns on campus
Figure 4 for Surf or sleep? Understanding the influence of bedtime patterns on campus
Viaarxiv icon

Enhancing Prototypical Few-Shot Learning by Leveraging the Local-Level Strategy

Nov 08, 2021
Junying Huang, Fan Chen, Keze Wang, Liang Lin, Dongyu Zhang

Figure 1 for Enhancing Prototypical Few-Shot Learning by Leveraging the Local-Level Strategy
Figure 2 for Enhancing Prototypical Few-Shot Learning by Leveraging the Local-Level Strategy
Figure 3 for Enhancing Prototypical Few-Shot Learning by Leveraging the Local-Level Strategy
Figure 4 for Enhancing Prototypical Few-Shot Learning by Leveraging the Local-Level Strategy
Viaarxiv icon

Plug-and-Play Few-shot Object Detection with Meta Strategy and Explicit Localization Inference

Oct 26, 2021
Junying Huang, Fan Chen, Liang Lin, Dongyu Zhang

Figure 1 for Plug-and-Play Few-shot Object Detection with Meta Strategy and Explicit Localization Inference
Figure 2 for Plug-and-Play Few-shot Object Detection with Meta Strategy and Explicit Localization Inference
Figure 3 for Plug-and-Play Few-shot Object Detection with Meta Strategy and Explicit Localization Inference
Figure 4 for Plug-and-Play Few-shot Object Detection with Meta Strategy and Explicit Localization Inference
Viaarxiv icon

Transferable, Controllable, and Inconspicuous Adversarial Attacks on Person Re-identification With Deep Mis-Ranking

Apr 08, 2020
Hongjun Wang, Guangrun Wang, Ya Li, Dongyu Zhang, Liang Lin

Figure 1 for Transferable, Controllable, and Inconspicuous Adversarial Attacks on Person Re-identification With Deep Mis-Ranking
Figure 2 for Transferable, Controllable, and Inconspicuous Adversarial Attacks on Person Re-identification With Deep Mis-Ranking
Figure 3 for Transferable, Controllable, and Inconspicuous Adversarial Attacks on Person Re-identification With Deep Mis-Ranking
Figure 4 for Transferable, Controllable, and Inconspicuous Adversarial Attacks on Person Re-identification With Deep Mis-Ranking
Viaarxiv icon