Picture for Jian Weng

Jian Weng

Hierarchical Invariance for Robust and Interpretable Vision Tasks at Larger Scales

Add code
Feb 23, 2024
Viaarxiv icon

Federated Learning in Intelligent Transportation Systems: Recent Applications and Open Problems

Add code
Sep 20, 2023
Figure 1 for Federated Learning in Intelligent Transportation Systems: Recent Applications and Open Problems
Figure 2 for Federated Learning in Intelligent Transportation Systems: Recent Applications and Open Problems
Figure 3 for Federated Learning in Intelligent Transportation Systems: Recent Applications and Open Problems
Figure 4 for Federated Learning in Intelligent Transportation Systems: Recent Applications and Open Problems
Viaarxiv icon

A Survey of Secure Computation Using Trusted Execution Environments

Add code
Feb 23, 2023
Figure 1 for A Survey of Secure Computation Using Trusted Execution Environments
Figure 2 for A Survey of Secure Computation Using Trusted Execution Environments
Figure 3 for A Survey of Secure Computation Using Trusted Execution Environments
Figure 4 for A Survey of Secure Computation Using Trusted Execution Environments
Viaarxiv icon

Enhancing Deep Knowledge Tracing with Auxiliary Tasks

Add code
Feb 14, 2023
Figure 1 for Enhancing Deep Knowledge Tracing with Auxiliary Tasks
Figure 2 for Enhancing Deep Knowledge Tracing with Auxiliary Tasks
Figure 3 for Enhancing Deep Knowledge Tracing with Auxiliary Tasks
Figure 4 for Enhancing Deep Knowledge Tracing with Auxiliary Tasks
Viaarxiv icon

Learning Second Order Local Anomaly for General Face Forgery Detection

Add code
Sep 30, 2022
Figure 1 for Learning Second Order Local Anomaly for General Face Forgery Detection
Figure 2 for Learning Second Order Local Anomaly for General Face Forgery Detection
Figure 3 for Learning Second Order Local Anomaly for General Face Forgery Detection
Figure 4 for Learning Second Order Local Anomaly for General Face Forgery Detection
Viaarxiv icon

Towards Target Sequential Rules

Add code
Jun 09, 2022
Figure 1 for Towards Target Sequential Rules
Figure 2 for Towards Target Sequential Rules
Figure 3 for Towards Target Sequential Rules
Figure 4 for Towards Target Sequential Rules
Viaarxiv icon

Deniable Steganography

Add code
May 25, 2022
Figure 1 for Deniable Steganography
Figure 2 for Deniable Steganography
Figure 3 for Deniable Steganography
Figure 4 for Deniable Steganography
Viaarxiv icon

A Screen-Shooting Resilient Document Image Watermarking Scheme using Deep Neural Network

Add code
Mar 10, 2022
Figure 1 for A Screen-Shooting Resilient Document Image Watermarking Scheme using Deep Neural Network
Figure 2 for A Screen-Shooting Resilient Document Image Watermarking Scheme using Deep Neural Network
Figure 3 for A Screen-Shooting Resilient Document Image Watermarking Scheme using Deep Neural Network
Figure 4 for A Screen-Shooting Resilient Document Image Watermarking Scheme using Deep Neural Network
Viaarxiv icon

A Robust Document Image Watermarking Scheme using Deep Neural Network

Add code
Feb 26, 2022
Figure 1 for A Robust Document Image Watermarking Scheme using Deep Neural Network
Figure 2 for A Robust Document Image Watermarking Scheme using Deep Neural Network
Figure 3 for A Robust Document Image Watermarking Scheme using Deep Neural Network
Figure 4 for A Robust Document Image Watermarking Scheme using Deep Neural Network
Viaarxiv icon

pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network Testing

Add code
Jan 23, 2022
Figure 1 for pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network Testing
Figure 2 for pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network Testing
Figure 3 for pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network Testing
Figure 4 for pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network Testing
Viaarxiv icon