Alert button
Picture for Fei Wu

Fei Wu

Alert button

SyntaSpeech: Syntax-Aware Generative Adversarial Text-to-Speech

Add code
Bookmark button
Alert button
Apr 25, 2022
Zhenhui Ye, Zhou Zhao, Yi Ren, Fei Wu

Figure 1 for SyntaSpeech: Syntax-Aware Generative Adversarial Text-to-Speech
Figure 2 for SyntaSpeech: Syntax-Aware Generative Adversarial Text-to-Speech
Figure 3 for SyntaSpeech: Syntax-Aware Generative Adversarial Text-to-Speech
Figure 4 for SyntaSpeech: Syntax-Aware Generative Adversarial Text-to-Speech
Viaarxiv icon

OakInk: A Large-scale Knowledge Repository for Understanding Hand-Object Interaction

Add code
Bookmark button
Alert button
Mar 29, 2022
Lixin Yang, Kailin Li, Xinyu Zhan, Fei Wu, Anran Xu, Liu Liu, Cewu Lu

Figure 1 for OakInk: A Large-scale Knowledge Repository for Understanding Hand-Object Interaction
Figure 2 for OakInk: A Large-scale Knowledge Repository for Understanding Hand-Object Interaction
Figure 3 for OakInk: A Large-scale Knowledge Repository for Understanding Hand-Object Interaction
Figure 4 for OakInk: A Large-scale Knowledge Repository for Understanding Hand-Object Interaction
Viaarxiv icon

Compositional Temporal Grounding with Structured Variational Cross-Graph Correspondence Learning

Add code
Bookmark button
Alert button
Mar 28, 2022
Juncheng Li, Junlin Xie, Long Qian, Linchao Zhu, Siliang Tang, Fei Wu, Yi Yang, Yueting Zhuang, Xin Eric Wang

Figure 1 for Compositional Temporal Grounding with Structured Variational Cross-Graph Correspondence Learning
Figure 2 for Compositional Temporal Grounding with Structured Variational Cross-Graph Correspondence Learning
Figure 3 for Compositional Temporal Grounding with Structured Variational Cross-Graph Correspondence Learning
Figure 4 for Compositional Temporal Grounding with Structured Variational Cross-Graph Correspondence Learning
Viaarxiv icon

End-to-End Modeling via Information Tree for One-Shot Natural Language Spatial Video Grounding

Add code
Bookmark button
Alert button
Mar 15, 2022
Mengze Li, Tianbao Wang, Haoyu Zhang, Shengyu Zhang, Zhou Zhao, Jiaxu Miao, Wenqiao Zhang, Wenming Tan, Jin Wang, Peng Wang, Shiliang Pu, Fei Wu

Figure 1 for End-to-End Modeling via Information Tree for One-Shot Natural Language Spatial Video Grounding
Figure 2 for End-to-End Modeling via Information Tree for One-Shot Natural Language Spatial Video Grounding
Figure 3 for End-to-End Modeling via Information Tree for One-Shot Natural Language Spatial Video Grounding
Figure 4 for End-to-End Modeling via Information Tree for One-Shot Natural Language Spatial Video Grounding
Viaarxiv icon

A Novel Architecture Slimming Method for Network Pruning and Knowledge Distillation

Add code
Bookmark button
Alert button
Feb 21, 2022
Dongqi Wang, Shengyu Zhang, Zhipeng Di, Xin Lin, Weihua Zhou, Fei Wu

Figure 1 for A Novel Architecture Slimming Method for Network Pruning and Knowledge Distillation
Figure 2 for A Novel Architecture Slimming Method for Network Pruning and Knowledge Distillation
Figure 3 for A Novel Architecture Slimming Method for Network Pruning and Knowledge Distillation
Figure 4 for A Novel Architecture Slimming Method for Network Pruning and Knowledge Distillation
Viaarxiv icon

Boosting RGB-D Saliency Detection by Leveraging Unlabeled RGB Images

Add code
Bookmark button
Alert button
Jan 01, 2022
Xiaoqiang Wang, Lei Zhu, Siliang Tang, Huazhu Fu, Ping Li, Fei Wu, Yi Yang, Yueting Zhuang

Figure 1 for Boosting RGB-D Saliency Detection by Leveraging Unlabeled RGB Images
Figure 2 for Boosting RGB-D Saliency Detection by Leveraging Unlabeled RGB Images
Figure 3 for Boosting RGB-D Saliency Detection by Leveraging Unlabeled RGB Images
Figure 4 for Boosting RGB-D Saliency Detection by Leveraging Unlabeled RGB Images
Viaarxiv icon

Multi-agent Communication with Graph Information Bottleneck under Limited Bandwidth

Add code
Bookmark button
Alert button
Dec 29, 2021
Qi Tian, Kun Kuang, Baoxiang Wang, Furui Liu, Fei Wu

Figure 1 for Multi-agent Communication with Graph Information Bottleneck under Limited Bandwidth
Figure 2 for Multi-agent Communication with Graph Information Bottleneck under Limited Bandwidth
Figure 3 for Multi-agent Communication with Graph Information Bottleneck under Limited Bandwidth
Figure 4 for Multi-agent Communication with Graph Information Bottleneck under Limited Bandwidth
Viaarxiv icon

Multi-agent Communication with Graph Information Bottleneck under Limited Bandwidth (a position paper)

Add code
Bookmark button
Alert button
Dec 20, 2021
Qi Tian, Kun Kuang, Baoxiang Wang, Furui Liu, Fei Wu

Figure 1 for Multi-agent Communication with Graph Information Bottleneck under Limited Bandwidth (a position paper)
Figure 2 for Multi-agent Communication with Graph Information Bottleneck under Limited Bandwidth (a position paper)
Figure 3 for Multi-agent Communication with Graph Information Bottleneck under Limited Bandwidth (a position paper)
Figure 4 for Multi-agent Communication with Graph Information Bottleneck under Limited Bandwidth (a position paper)
Viaarxiv icon

Feature Distillation Interaction Weighting Network for Lightweight Image Super-Resolution

Add code
Bookmark button
Alert button
Dec 16, 2021
Guangwei Gao, Wenjie Li, Juncheng Li, Fei Wu, Huimin Lu, Yi Yu

Figure 1 for Feature Distillation Interaction Weighting Network for Lightweight Image Super-Resolution
Figure 2 for Feature Distillation Interaction Weighting Network for Lightweight Image Super-Resolution
Figure 3 for Feature Distillation Interaction Weighting Network for Lightweight Image Super-Resolution
Figure 4 for Feature Distillation Interaction Weighting Network for Lightweight Image Super-Resolution
Viaarxiv icon

A General Framework for Defending Against Backdoor Attacks via Influence Graph

Add code
Bookmark button
Alert button
Nov 29, 2021
Xiaofei Sun, Jiwei Li, Xiaoya Li, Ziyao Wang, Tianwei Zhang, Han Qiu, Fei Wu, Chun Fan

Figure 1 for A General Framework for Defending Against Backdoor Attacks via Influence Graph
Figure 2 for A General Framework for Defending Against Backdoor Attacks via Influence Graph
Figure 3 for A General Framework for Defending Against Backdoor Attacks via Influence Graph
Figure 4 for A General Framework for Defending Against Backdoor Attacks via Influence Graph
Viaarxiv icon