Alert button
Picture for Jun Zhu

Jun Zhu

Alert button

Unsupervised Part Segmentation through Disentangling Appearance and Shape

May 26, 2021
Shilong Liu, Lei Zhang, Xiao Yang, Hang Su, Jun Zhu

Figure 1 for Unsupervised Part Segmentation through Disentangling Appearance and Shape
Figure 2 for Unsupervised Part Segmentation through Disentangling Appearance and Shape
Figure 3 for Unsupervised Part Segmentation through Disentangling Appearance and Shape
Figure 4 for Unsupervised Part Segmentation through Disentangling Appearance and Shape
Viaarxiv icon

Rethinking and Reweighting the Univariate Losses for Multi-Label Ranking: Consistency and Generalization

May 10, 2021
Guoqiang Wu, Chongxuan Li, Kun Xu, Jun Zhu

Figure 1 for Rethinking and Reweighting the Univariate Losses for Multi-Label Ranking: Consistency and Generalization
Figure 2 for Rethinking and Reweighting the Univariate Losses for Multi-Label Ranking: Consistency and Generalization
Figure 3 for Rethinking and Reweighting the Univariate Losses for Multi-Label Ranking: Consistency and Generalization
Figure 4 for Rethinking and Reweighting the Univariate Losses for Multi-Label Ranking: Consistency and Generalization
Viaarxiv icon

Automated Decision-based Adversarial Attacks

May 09, 2021
Qi-An Fu, Yinpeng Dong, Hang Su, Jun Zhu

Figure 1 for Automated Decision-based Adversarial Attacks
Figure 2 for Automated Decision-based Adversarial Attacks
Figure 3 for Automated Decision-based Adversarial Attacks
Figure 4 for Automated Decision-based Adversarial Attacks
Viaarxiv icon

MiCE: Mixture of Contrastive Experts for Unsupervised Image Clustering

May 05, 2021
Tsung Wei Tsai, Chongxuan Li, Jun Zhu

Figure 1 for MiCE: Mixture of Contrastive Experts for Unsupervised Image Clustering
Figure 2 for MiCE: Mixture of Contrastive Experts for Unsupervised Image Clustering
Figure 3 for MiCE: Mixture of Contrastive Experts for Unsupervised Image Clustering
Figure 4 for MiCE: Mixture of Contrastive Experts for Unsupervised Image Clustering
Viaarxiv icon

Few-shot Continual Learning: a Brain-inspired Approach

Apr 19, 2021
Liyuan Wang, Qian Li, Yi Zhong, Jun Zhu

Figure 1 for Few-shot Continual Learning: a Brain-inspired Approach
Figure 2 for Few-shot Continual Learning: a Brain-inspired Approach
Figure 3 for Few-shot Continual Learning: a Brain-inspired Approach
Figure 4 for Few-shot Continual Learning: a Brain-inspired Approach
Viaarxiv icon

Counter-Strike Deathmatch with Large-Scale Behavioural Cloning

Apr 09, 2021
Tim Pearce, Jun Zhu

Figure 1 for Counter-Strike Deathmatch with Large-Scale Behavioural Cloning
Figure 2 for Counter-Strike Deathmatch with Large-Scale Behavioural Cloning
Figure 3 for Counter-Strike Deathmatch with Large-Scale Behavioural Cloning
Figure 4 for Counter-Strike Deathmatch with Large-Scale Behavioural Cloning
Viaarxiv icon

Accurate and Reliable Forecasting using Stochastic Differential Equations

Mar 28, 2021
Peng Cui, Zhijie Deng, Wenbo Hu, Jun Zhu

Figure 1 for Accurate and Reliable Forecasting using Stochastic Differential Equations
Figure 2 for Accurate and Reliable Forecasting using Stochastic Differential Equations
Figure 3 for Accurate and Reliable Forecasting using Stochastic Differential Equations
Figure 4 for Accurate and Reliable Forecasting using Stochastic Differential Equations
Viaarxiv icon

LiBRe: A Practical Bayesian Approach to Adversarial Detection

Mar 27, 2021
Zhijie Deng, Xiao Yang, Shizhen Xu, Hang Su, Jun Zhu

Figure 1 for LiBRe: A Practical Bayesian Approach to Adversarial Detection
Figure 2 for LiBRe: A Practical Bayesian Approach to Adversarial Detection
Figure 3 for LiBRe: A Practical Bayesian Approach to Adversarial Detection
Figure 4 for LiBRe: A Practical Bayesian Approach to Adversarial Detection
Viaarxiv icon

Black-box Detection of Backdoor Attacks with Limited Information and Data

Mar 24, 2021
Yinpeng Dong, Xiao Yang, Zhijie Deng, Tianyu Pang, Zihao Xiao, Hang Su, Jun Zhu

Figure 1 for Black-box Detection of Backdoor Attacks with Limited Information and Data
Figure 2 for Black-box Detection of Backdoor Attacks with Limited Information and Data
Figure 3 for Black-box Detection of Backdoor Attacks with Limited Information and Data
Figure 4 for Black-box Detection of Backdoor Attacks with Limited Information and Data
Viaarxiv icon

Implicit Normalizing Flows

Mar 17, 2021
Cheng Lu, Jianfei Chen, Chongxuan Li, Qiuhao Wang, Jun Zhu

Figure 1 for Implicit Normalizing Flows
Figure 2 for Implicit Normalizing Flows
Figure 3 for Implicit Normalizing Flows
Figure 4 for Implicit Normalizing Flows
Viaarxiv icon