Picture for Jihong Wang

Jihong Wang

Monotone Peridynamic Neural Operator for Nonlinear Material Modeling with Conditionally Unique Solutions

Add code
May 02, 2025
Viaarxiv icon

Disentangled Noisy Correspondence Learning

Add code
Aug 10, 2024
Figure 1 for Disentangled Noisy Correspondence Learning
Figure 2 for Disentangled Noisy Correspondence Learning
Figure 3 for Disentangled Noisy Correspondence Learning
Figure 4 for Disentangled Noisy Correspondence Learning
Viaarxiv icon

Disentangled Representation Learning with Transmitted Information Bottleneck

Add code
Nov 03, 2023
Viaarxiv icon

Disentangled Generation with Information Bottleneck for Few-Shot Learning

Add code
Nov 29, 2022
Figure 1 for Disentangled Generation with Information Bottleneck for Few-Shot Learning
Figure 2 for Disentangled Generation with Information Bottleneck for Few-Shot Learning
Figure 3 for Disentangled Generation with Information Bottleneck for Few-Shot Learning
Figure 4 for Disentangled Generation with Information Bottleneck for Few-Shot Learning
Viaarxiv icon

Towards Explanation for Unsupervised Graph-Level Representation Learning

Add code
May 20, 2022
Figure 1 for Towards Explanation for Unsupervised Graph-Level Representation Learning
Figure 2 for Towards Explanation for Unsupervised Graph-Level Representation Learning
Figure 3 for Towards Explanation for Unsupervised Graph-Level Representation Learning
Figure 4 for Towards Explanation for Unsupervised Graph-Level Representation Learning
Viaarxiv icon

Robust Unsupervised Graph Representation Learning via Mutual Information Maximization

Add code
Jan 21, 2022
Figure 1 for Robust Unsupervised Graph Representation Learning via Mutual Information Maximization
Figure 2 for Robust Unsupervised Graph Representation Learning via Mutual Information Maximization
Figure 3 for Robust Unsupervised Graph Representation Learning via Mutual Information Maximization
Figure 4 for Robust Unsupervised Graph Representation Learning via Mutual Information Maximization
Viaarxiv icon

Scalable Attack on Graph Data by Injecting Vicious Nodes

Add code
Apr 22, 2020
Figure 1 for Scalable Attack on Graph Data by Injecting Vicious Nodes
Figure 2 for Scalable Attack on Graph Data by Injecting Vicious Nodes
Figure 3 for Scalable Attack on Graph Data by Injecting Vicious Nodes
Figure 4 for Scalable Attack on Graph Data by Injecting Vicious Nodes
Viaarxiv icon