Picture for Jun Zhu

Jun Zhu

Tsinghua University

Adversarial Training with Rectified Rejection

Add code
May 31, 2021
Figure 1 for Adversarial Training with Rectified Rejection
Figure 2 for Adversarial Training with Rectified Rejection
Figure 3 for Adversarial Training with Rectified Rejection
Figure 4 for Adversarial Training with Rectified Rejection
Viaarxiv icon

Unsupervised Part Segmentation through Disentangling Appearance and Shape

Add code
May 26, 2021
Figure 1 for Unsupervised Part Segmentation through Disentangling Appearance and Shape
Figure 2 for Unsupervised Part Segmentation through Disentangling Appearance and Shape
Figure 3 for Unsupervised Part Segmentation through Disentangling Appearance and Shape
Figure 4 for Unsupervised Part Segmentation through Disentangling Appearance and Shape
Viaarxiv icon

Rethinking and Reweighting the Univariate Losses for Multi-Label Ranking: Consistency and Generalization

Add code
May 10, 2021
Figure 1 for Rethinking and Reweighting the Univariate Losses for Multi-Label Ranking: Consistency and Generalization
Figure 2 for Rethinking and Reweighting the Univariate Losses for Multi-Label Ranking: Consistency and Generalization
Figure 3 for Rethinking and Reweighting the Univariate Losses for Multi-Label Ranking: Consistency and Generalization
Figure 4 for Rethinking and Reweighting the Univariate Losses for Multi-Label Ranking: Consistency and Generalization
Viaarxiv icon

Automated Decision-based Adversarial Attacks

Add code
May 09, 2021
Figure 1 for Automated Decision-based Adversarial Attacks
Figure 2 for Automated Decision-based Adversarial Attacks
Figure 3 for Automated Decision-based Adversarial Attacks
Figure 4 for Automated Decision-based Adversarial Attacks
Viaarxiv icon

MiCE: Mixture of Contrastive Experts for Unsupervised Image Clustering

Add code
May 05, 2021
Figure 1 for MiCE: Mixture of Contrastive Experts for Unsupervised Image Clustering
Figure 2 for MiCE: Mixture of Contrastive Experts for Unsupervised Image Clustering
Figure 3 for MiCE: Mixture of Contrastive Experts for Unsupervised Image Clustering
Figure 4 for MiCE: Mixture of Contrastive Experts for Unsupervised Image Clustering
Viaarxiv icon

Few-shot Continual Learning: a Brain-inspired Approach

Add code
Apr 19, 2021
Figure 1 for Few-shot Continual Learning: a Brain-inspired Approach
Figure 2 for Few-shot Continual Learning: a Brain-inspired Approach
Figure 3 for Few-shot Continual Learning: a Brain-inspired Approach
Figure 4 for Few-shot Continual Learning: a Brain-inspired Approach
Viaarxiv icon

Counter-Strike Deathmatch with Large-Scale Behavioural Cloning

Add code
Apr 09, 2021
Figure 1 for Counter-Strike Deathmatch with Large-Scale Behavioural Cloning
Figure 2 for Counter-Strike Deathmatch with Large-Scale Behavioural Cloning
Figure 3 for Counter-Strike Deathmatch with Large-Scale Behavioural Cloning
Figure 4 for Counter-Strike Deathmatch with Large-Scale Behavioural Cloning
Viaarxiv icon

Accurate and Reliable Forecasting using Stochastic Differential Equations

Add code
Mar 28, 2021
Figure 1 for Accurate and Reliable Forecasting using Stochastic Differential Equations
Figure 2 for Accurate and Reliable Forecasting using Stochastic Differential Equations
Figure 3 for Accurate and Reliable Forecasting using Stochastic Differential Equations
Figure 4 for Accurate and Reliable Forecasting using Stochastic Differential Equations
Viaarxiv icon

LiBRe: A Practical Bayesian Approach to Adversarial Detection

Add code
Mar 27, 2021
Figure 1 for LiBRe: A Practical Bayesian Approach to Adversarial Detection
Figure 2 for LiBRe: A Practical Bayesian Approach to Adversarial Detection
Figure 3 for LiBRe: A Practical Bayesian Approach to Adversarial Detection
Figure 4 for LiBRe: A Practical Bayesian Approach to Adversarial Detection
Viaarxiv icon

Black-box Detection of Backdoor Attacks with Limited Information and Data

Add code
Mar 24, 2021
Figure 1 for Black-box Detection of Backdoor Attacks with Limited Information and Data
Figure 2 for Black-box Detection of Backdoor Attacks with Limited Information and Data
Figure 3 for Black-box Detection of Backdoor Attacks with Limited Information and Data
Figure 4 for Black-box Detection of Backdoor Attacks with Limited Information and Data
Viaarxiv icon