Alert button
Picture for Guoqiang Li

Guoqiang Li

Alert button

Can Language Models Pretend Solvers? Logic Code Simulation with LLMs

Add code
Bookmark button
Alert button
Mar 28, 2024
Minyu Chen, Guoqiang Li, Ling-I Wu, Ruibang Liu, Yuxin Su, Xi Chang, Jianxin Xue

Viaarxiv icon

AC4: Algebraic Computation Checker for Circuit Constraints in ZKPs

Add code
Bookmark button
Alert button
Mar 23, 2024
Hao Chen, Minyu Chen, Ruibang Liu, Guoqiang Li

Viaarxiv icon

GPS Attack Detection and Mitigation for Safe Autonomous Driving using Image and Map based Lateral Direction Localization

Add code
Bookmark button
Alert button
Oct 09, 2023
Qingming Chen, Peng Liu, Guoqiang Li, Zhenpo Wang

Figure 1 for GPS Attack Detection and Mitigation for Safe Autonomous Driving using Image and Map based Lateral Direction Localization
Figure 2 for GPS Attack Detection and Mitigation for Safe Autonomous Driving using Image and Map based Lateral Direction Localization
Figure 3 for GPS Attack Detection and Mitigation for Safe Autonomous Driving using Image and Map based Lateral Direction Localization
Figure 4 for GPS Attack Detection and Mitigation for Safe Autonomous Driving using Image and Map based Lateral Direction Localization
Viaarxiv icon

Differential Newborn Face Morphing Attack Detection using Wavelet Scatter Network

Add code
Bookmark button
Alert button
May 02, 2023
Raghavendra Ramachandra, Sushma Venkatesh, Guoqiang Li, Kiran Raja

Figure 1 for Differential Newborn Face Morphing Attack Detection using Wavelet Scatter Network
Figure 2 for Differential Newborn Face Morphing Attack Detection using Wavelet Scatter Network
Figure 3 for Differential Newborn Face Morphing Attack Detection using Wavelet Scatter Network
Figure 4 for Differential Newborn Face Morphing Attack Detection using Wavelet Scatter Network
Viaarxiv icon

Vulnerability of Face Morphing Attacks: A Case Study on Lookalike and Identical Twins

Add code
Bookmark button
Alert button
Mar 24, 2023
Raghavendra Ramachandra, Sushma Venkatesh, Gaurav Jaswal, Guoqiang Li

Figure 1 for Vulnerability of Face Morphing Attacks: A Case Study on Lookalike and Identical Twins
Figure 2 for Vulnerability of Face Morphing Attacks: A Case Study on Lookalike and Identical Twins
Figure 3 for Vulnerability of Face Morphing Attacks: A Case Study on Lookalike and Identical Twins
Figure 4 for Vulnerability of Face Morphing Attacks: A Case Study on Lookalike and Identical Twins
Viaarxiv icon

A New Action Recognition Framework for Video Highlights Summarization in Sporting Events

Add code
Bookmark button
Alert button
Dec 01, 2020
Cheng Yan, Xin Li, Guoqiang Li

Figure 1 for A New Action Recognition Framework for Video Highlights Summarization in Sporting Events
Figure 2 for A New Action Recognition Framework for Video Highlights Summarization in Sporting Events
Figure 3 for A New Action Recognition Framework for Video Highlights Summarization in Sporting Events
Figure 4 for A New Action Recognition Framework for Video Highlights Summarization in Sporting Events
Viaarxiv icon

Object Detection for Graphical User Interface: Old Fashioned or Deep Learning or a Combination?

Add code
Bookmark button
Alert button
Sep 07, 2020
Jieshan Chen, Mulong Xie, Zhenchang Xing, Chunyang Chen, Xiwei Xu, Liming Zhu, Guoqiang Li

Figure 1 for Object Detection for Graphical User Interface: Old Fashioned or Deep Learning or a Combination?
Figure 2 for Object Detection for Graphical User Interface: Old Fashioned or Deep Learning or a Combination?
Figure 3 for Object Detection for Graphical User Interface: Old Fashioned or Deep Learning or a Combination?
Figure 4 for Object Detection for Graphical User Interface: Old Fashioned or Deep Learning or a Combination?
Viaarxiv icon

Morphing Attack Detection -- Database, Evaluation Platform and Benchmarking

Add code
Bookmark button
Alert button
Jun 16, 2020
Kiran Raja, Matteo Ferrara, Annalisa Franco, Luuk Spreeuwers, Illias Batskos, Florens de Wit Marta Gomez-Barrero, Ulrich Scherhag, Daniel Fischer, Sushma Venkatesh, Jag Mohan Singh, Guoqiang Li, Loïc Bergeron, Sergey Isadskiy, Raghavendra Ramachandra, Christian Rathgeb, Dinusha Frings, Uwe Seidel, Fons Knopjes, Raymond Veldhuis, Davide Maltoni, Christoph Busch

Figure 1 for Morphing Attack Detection -- Database, Evaluation Platform and Benchmarking
Figure 2 for Morphing Attack Detection -- Database, Evaluation Platform and Benchmarking
Figure 3 for Morphing Attack Detection -- Database, Evaluation Platform and Benchmarking
Figure 4 for Morphing Attack Detection -- Database, Evaluation Platform and Benchmarking
Viaarxiv icon

A Survey on Unknown Presentation Attack Detection for Fingerprint

Add code
Bookmark button
Alert button
May 17, 2020
Jag Mohan Singh, Ahmed Madhun, Guoqiang Li, Raghavendra Ramachandra

Figure 1 for A Survey on Unknown Presentation Attack Detection for Fingerprint
Figure 2 for A Survey on Unknown Presentation Attack Detection for Fingerprint
Figure 3 for A Survey on Unknown Presentation Attack Detection for Fingerprint
Figure 4 for A Survey on Unknown Presentation Attack Detection for Fingerprint
Viaarxiv icon