Alert button
Picture for Junjie Guo

Junjie Guo

Alert button

Emotion-Anchored Contrastive Learning Framework for Emotion Recognition in Conversation

Add code
Bookmark button
Alert button
Mar 29, 2024
Fangxu Yu, Junjie Guo, Zhen Wu, Xinyu Dai

Figure 1 for Emotion-Anchored Contrastive Learning Framework for Emotion Recognition in Conversation
Figure 2 for Emotion-Anchored Contrastive Learning Framework for Emotion Recognition in Conversation
Figure 3 for Emotion-Anchored Contrastive Learning Framework for Emotion Recognition in Conversation
Figure 4 for Emotion-Anchored Contrastive Learning Framework for Emotion Recognition in Conversation
Viaarxiv icon

DAMSDet: Dynamic Adaptive Multispectral Detection Transformer with Competitive Query Selection and Adaptive Feature Fusion

Add code
Bookmark button
Alert button
Mar 07, 2024
Junjie Guo, Chenqiang Gao, Fangcen Liu, Deyu Meng, Xinbo Gao

Figure 1 for DAMSDet: Dynamic Adaptive Multispectral Detection Transformer with Competitive Query Selection and Adaptive Feature Fusion
Figure 2 for DAMSDet: Dynamic Adaptive Multispectral Detection Transformer with Competitive Query Selection and Adaptive Feature Fusion
Figure 3 for DAMSDet: Dynamic Adaptive Multispectral Detection Transformer with Competitive Query Selection and Adaptive Feature Fusion
Figure 4 for DAMSDet: Dynamic Adaptive Multispectral Detection Transformer with Competitive Query Selection and Adaptive Feature Fusion
Viaarxiv icon

InfMAE: A Foundation Model in Infrared Modality

Add code
Bookmark button
Alert button
Feb 01, 2024
Fangcen Liu, Chenqiang Gao, Yaming Zhang, Junjie Guo, Jinhao Wang, Deyu Meng

Viaarxiv icon

A Universal Identity Backdoor Attack against Speaker Verification based on Siamese Network

Add code
Bookmark button
Alert button
Mar 28, 2023
Haodong Zhao, Wei Du, Junjie Guo, Gongshen Liu

Figure 1 for A Universal Identity Backdoor Attack against Speaker Verification based on Siamese Network
Figure 2 for A Universal Identity Backdoor Attack against Speaker Verification based on Siamese Network
Figure 3 for A Universal Identity Backdoor Attack against Speaker Verification based on Siamese Network
Figure 4 for A Universal Identity Backdoor Attack against Speaker Verification based on Siamese Network
Viaarxiv icon