Picture for Jun-Hyuk Kim

Jun-Hyuk Kim

Progressive Learned Image Compression for Machine Perception

Add code
Dec 23, 2025
Viaarxiv icon

SLIM: Semantic-based Low-bitrate Image compression for Machines by leveraging diffusion

Add code
Dec 23, 2025
Viaarxiv icon

DESSERT: Diffusion-based Event-driven Single-frame Synthesis via Residual Training

Add code
Dec 19, 2025
Viaarxiv icon

Neural Image Compression with Text-guided Encoding for both Pixel-level and Perceptual Fidelity

Add code
Mar 05, 2024
Viaarxiv icon

Demystifying Randomly Initialized Networks for Evaluating Generative Models

Add code
Aug 19, 2022
Figure 1 for Demystifying Randomly Initialized Networks for Evaluating Generative Models
Figure 2 for Demystifying Randomly Initialized Networks for Evaluating Generative Models
Figure 3 for Demystifying Randomly Initialized Networks for Evaluating Generative Models
Figure 4 for Demystifying Randomly Initialized Networks for Evaluating Generative Models
Viaarxiv icon

Joint Global and Local Hierarchical Priors for Learned Image Compression

Add code
Dec 08, 2021
Figure 1 for Joint Global and Local Hierarchical Priors for Learned Image Compression
Figure 2 for Joint Global and Local Hierarchical Priors for Learned Image Compression
Figure 3 for Joint Global and Local Hierarchical Priors for Learned Image Compression
Figure 4 for Joint Global and Local Hierarchical Priors for Learned Image Compression
Viaarxiv icon

Deep Image Destruction: A Comprehensive Study on Vulnerability of Deep Image-to-Image Models against Adversarial Attacks

Add code
Apr 30, 2021
Figure 1 for Deep Image Destruction: A Comprehensive Study on Vulnerability of Deep Image-to-Image Models against Adversarial Attacks
Figure 2 for Deep Image Destruction: A Comprehensive Study on Vulnerability of Deep Image-to-Image Models against Adversarial Attacks
Figure 3 for Deep Image Destruction: A Comprehensive Study on Vulnerability of Deep Image-to-Image Models against Adversarial Attacks
Figure 4 for Deep Image Destruction: A Comprehensive Study on Vulnerability of Deep Image-to-Image Models against Adversarial Attacks
Viaarxiv icon

Just One Moment: Inconspicuous One Frame Attack on Deep Action Recognition

Add code
Nov 30, 2020
Figure 1 for Just One Moment: Inconspicuous One Frame Attack on Deep Action Recognition
Figure 2 for Just One Moment: Inconspicuous One Frame Attack on Deep Action Recognition
Figure 3 for Just One Moment: Inconspicuous One Frame Attack on Deep Action Recognition
Figure 4 for Just One Moment: Inconspicuous One Frame Attack on Deep Action Recognition
Viaarxiv icon

AIM 2020 Challenge on Real Image Super-Resolution: Methods and Results

Add code
Sep 25, 2020
Figure 1 for AIM 2020 Challenge on Real Image Super-Resolution: Methods and Results
Figure 2 for AIM 2020 Challenge on Real Image Super-Resolution: Methods and Results
Figure 3 for AIM 2020 Challenge on Real Image Super-Resolution: Methods and Results
Figure 4 for AIM 2020 Challenge on Real Image Super-Resolution: Methods and Results
Viaarxiv icon

AIM 2020 Challenge on Efficient Super-Resolution: Methods and Results

Add code
Sep 15, 2020
Figure 1 for AIM 2020 Challenge on Efficient Super-Resolution: Methods and Results
Figure 2 for AIM 2020 Challenge on Efficient Super-Resolution: Methods and Results
Figure 3 for AIM 2020 Challenge on Efficient Super-Resolution: Methods and Results
Figure 4 for AIM 2020 Challenge on Efficient Super-Resolution: Methods and Results
Viaarxiv icon