Alert button
Picture for Hao Li

Hao Li

Alert button

A linearized framework and a new benchmark for model selection for fine-tuning

Add code
Bookmark button
Alert button
Jan 29, 2021
Aditya Deshpande, Alessandro Achille, Avinash Ravichandran, Hao Li, Luca Zancato, Charless Fowlkes, Rahul Bhotika, Stefano Soatto, Pietro Perona

Figure 1 for A linearized framework and a new benchmark for model selection for fine-tuning
Figure 2 for A linearized framework and a new benchmark for model selection for fine-tuning
Figure 3 for A linearized framework and a new benchmark for model selection for fine-tuning
Figure 4 for A linearized framework and a new benchmark for model selection for fine-tuning
Viaarxiv icon

Robust Representation Learning with Feedback for Single Image Deraining

Add code
Bookmark button
Alert button
Jan 29, 2021
Chenghao Chen, Hao Li

Figure 1 for Robust Representation Learning with Feedback for Single Image Deraining
Figure 2 for Robust Representation Learning with Feedback for Single Image Deraining
Figure 3 for Robust Representation Learning with Feedback for Single Image Deraining
Figure 4 for Robust Representation Learning with Feedback for Single Image Deraining
Viaarxiv icon

Object Detection Made Simpler by Eliminating Heuristic NMS

Add code
Bookmark button
Alert button
Jan 28, 2021
Qiang Zhou, Chaohui Yu, Chunhua Shen, Zhibin Wang, Hao Li

Figure 1 for Object Detection Made Simpler by Eliminating Heuristic NMS
Figure 2 for Object Detection Made Simpler by Eliminating Heuristic NMS
Figure 3 for Object Detection Made Simpler by Eliminating Heuristic NMS
Figure 4 for Object Detection Made Simpler by Eliminating Heuristic NMS
Viaarxiv icon

1st Place Solution to ECCV-TAO-2020: Detect and Represent Any Object for Tracking

Add code
Bookmark button
Alert button
Jan 20, 2021
Fei Du, Bo Xu, Jiasheng Tang, Yuqi Zhang, Fan Wang, Hao Li

Figure 1 for 1st Place Solution to ECCV-TAO-2020: Detect and Represent Any Object for Tracking
Figure 2 for 1st Place Solution to ECCV-TAO-2020: Detect and Represent Any Object for Tracking
Figure 3 for 1st Place Solution to ECCV-TAO-2020: Detect and Represent Any Object for Tracking
Viaarxiv icon

AsymptoticNG: A regularized natural gradient optimization algorithm with look-ahead strategy

Add code
Bookmark button
Alert button
Jan 16, 2021
Zedong Tang, Fenlong Jiang, Junke Song, Maoguo Gong, Hao Li, Fan Yu, Zidong Wang, Min Wang

Figure 1 for AsymptoticNG: A regularized natural gradient optimization algorithm with look-ahead strategy
Figure 2 for AsymptoticNG: A regularized natural gradient optimization algorithm with look-ahead strategy
Figure 3 for AsymptoticNG: A regularized natural gradient optimization algorithm with look-ahead strategy
Figure 4 for AsymptoticNG: A regularized natural gradient optimization algorithm with look-ahead strategy
Viaarxiv icon

1st Place Solution to VisDA-2020: Bias Elimination for Domain Adaptive Pedestrian Re-identification

Add code
Bookmark button
Alert button
Dec 25, 2020
Jianyang Gu, Hao Luo, Weihua Chen, Yiqi Jiang, Yuqi Zhang, Shuting He, Fan Wang, Hao Li, Wei Jiang

Figure 1 for 1st Place Solution to VisDA-2020: Bias Elimination for Domain Adaptive Pedestrian Re-identification
Figure 2 for 1st Place Solution to VisDA-2020: Bias Elimination for Domain Adaptive Pedestrian Re-identification
Figure 3 for 1st Place Solution to VisDA-2020: Bias Elimination for Domain Adaptive Pedestrian Re-identification
Figure 4 for 1st Place Solution to VisDA-2020: Bias Elimination for Domain Adaptive Pedestrian Re-identification
Viaarxiv icon

Blurring Fools the Network -- Adversarial Attacks by Feature Peak Suppression and Gaussian Blurring

Add code
Bookmark button
Alert button
Dec 21, 2020
Chenchen Zhao, Hao Li

Figure 1 for Blurring Fools the Network -- Adversarial Attacks by Feature Peak Suppression and Gaussian Blurring
Figure 2 for Blurring Fools the Network -- Adversarial Attacks by Feature Peak Suppression and Gaussian Blurring
Figure 3 for Blurring Fools the Network -- Adversarial Attacks by Feature Peak Suppression and Gaussian Blurring
Figure 4 for Blurring Fools the Network -- Adversarial Attacks by Feature Peak Suppression and Gaussian Blurring
Viaarxiv icon

Amplifying the Anterior-Posterior Difference via Data Enhancement -- A More Robust Deep Monocular Orientation Estimation Solution

Add code
Bookmark button
Alert button
Dec 21, 2020
Chenchen Zhao, Hao Li

Figure 1 for Amplifying the Anterior-Posterior Difference via Data Enhancement -- A More Robust Deep Monocular Orientation Estimation Solution
Figure 2 for Amplifying the Anterior-Posterior Difference via Data Enhancement -- A More Robust Deep Monocular Orientation Estimation Solution
Figure 3 for Amplifying the Anterior-Posterior Difference via Data Enhancement -- A More Robust Deep Monocular Orientation Estimation Solution
Figure 4 for Amplifying the Anterior-Posterior Difference via Data Enhancement -- A More Robust Deep Monocular Orientation Estimation Solution
Viaarxiv icon

Exploiting Vulnerability of Pooling in Convolutional Neural Networks by Strict Layer-Output Manipulation for Adversarial Attacks

Add code
Bookmark button
Alert button
Dec 21, 2020
Chenchen Zhao, Hao Li

Figure 1 for Exploiting Vulnerability of Pooling in Convolutional Neural Networks by Strict Layer-Output Manipulation for Adversarial Attacks
Figure 2 for Exploiting Vulnerability of Pooling in Convolutional Neural Networks by Strict Layer-Output Manipulation for Adversarial Attacks
Figure 3 for Exploiting Vulnerability of Pooling in Convolutional Neural Networks by Strict Layer-Output Manipulation for Adversarial Attacks
Figure 4 for Exploiting Vulnerability of Pooling in Convolutional Neural Networks by Strict Layer-Output Manipulation for Adversarial Attacks
Viaarxiv icon