Alert button
Picture for Kai Chen

Kai Chen

Alert button

DG-STGCN: Dynamic Spatial-Temporal Modeling for Skeleton-based Action Recognition

Add code
Bookmark button
Alert button
Oct 12, 2022
Haodong Duan, Jiaqi Wang, Kai Chen, Dahua Lin

Figure 1 for DG-STGCN: Dynamic Spatial-Temporal Modeling for Skeleton-based Action Recognition
Figure 2 for DG-STGCN: Dynamic Spatial-Temporal Modeling for Skeleton-based Action Recognition
Figure 3 for DG-STGCN: Dynamic Spatial-Temporal Modeling for Skeleton-based Action Recognition
Figure 4 for DG-STGCN: Dynamic Spatial-Temporal Modeling for Skeleton-based Action Recognition
Viaarxiv icon

Mitigating Representation Bias in Action Recognition: Algorithms and Benchmarks

Add code
Bookmark button
Alert button
Sep 20, 2022
Haodong Duan, Yue Zhao, Kai Chen, Yuanjun Xiong, Dahua Lin

Figure 1 for Mitigating Representation Bias in Action Recognition: Algorithms and Benchmarks
Figure 2 for Mitigating Representation Bias in Action Recognition: Algorithms and Benchmarks
Figure 3 for Mitigating Representation Bias in Action Recognition: Algorithms and Benchmarks
Figure 4 for Mitigating Representation Bias in Action Recognition: Algorithms and Benchmarks
Viaarxiv icon

Deliberated Domain Bridging for Domain Adaptive Semantic Segmentation

Add code
Bookmark button
Alert button
Sep 16, 2022
Lin Chen, Zhixiang Wei, Xin Jin, Huaian Chen, Miao Zheng, Kai Chen, Yi Jin

Figure 1 for Deliberated Domain Bridging for Domain Adaptive Semantic Segmentation
Figure 2 for Deliberated Domain Bridging for Domain Adaptive Semantic Segmentation
Figure 3 for Deliberated Domain Bridging for Domain Adaptive Semantic Segmentation
Figure 4 for Deliberated Domain Bridging for Domain Adaptive Semantic Segmentation
Viaarxiv icon

SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning

Add code
Bookmark button
Alert button
Sep 08, 2022
Peizhuo Lv, Pan Li, Shenchen Zhu, Shengzhi Zhang, Kai Chen, Ruigang Liang, Chang Yue, Fan Xiang, Yuling Cai, Hualong Ma, Yingjun Zhang, Guozhu Meng

Figure 1 for SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning
Figure 2 for SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning
Figure 3 for SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning
Figure 4 for SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning
Viaarxiv icon

Consistent Teacher Provides Better Supervision in Semi-supervised Object Detection

Add code
Bookmark button
Alert button
Sep 04, 2022
Xinjiang Wang, Xingyi Yang, Shilong Zhang, Yijiang Li, Litong Feng, Shijie Fang, Chengqi Lyu, Kai Chen, Wayne Zhang

Figure 1 for Consistent Teacher Provides Better Supervision in Semi-supervised Object Detection
Figure 2 for Consistent Teacher Provides Better Supervision in Semi-supervised Object Detection
Figure 3 for Consistent Teacher Provides Better Supervision in Semi-supervised Object Detection
Figure 4 for Consistent Teacher Provides Better Supervision in Semi-supervised Object Detection
Viaarxiv icon

Inference skipping for more efficient real-time speech enhancement with parallel RNNs

Add code
Bookmark button
Alert button
Jul 22, 2022
Xiaohuai Le, Tong Lei, Kai Chen, Jing Lu

Figure 1 for Inference skipping for more efficient real-time speech enhancement with parallel RNNs
Figure 2 for Inference skipping for more efficient real-time speech enhancement with parallel RNNs
Figure 3 for Inference skipping for more efficient real-time speech enhancement with parallel RNNs
Figure 4 for Inference skipping for more efficient real-time speech enhancement with parallel RNNs
Viaarxiv icon

Invisible Backdoor Attacks Using Data Poisoning in the Frequency Domain

Add code
Bookmark button
Alert button
Jul 09, 2022
Chang Yue, Peizhuo Lv, Ruigang Liang, Kai Chen

Figure 1 for Invisible Backdoor Attacks Using Data Poisoning in the Frequency Domain
Figure 2 for Invisible Backdoor Attacks Using Data Poisoning in the Frequency Domain
Figure 3 for Invisible Backdoor Attacks Using Data Poisoning in the Frequency Domain
Figure 4 for Invisible Backdoor Attacks Using Data Poisoning in the Frequency Domain
Viaarxiv icon

Semi-blind source separation using convolutive transfer function for nonlinear acoustic echo cancellation

Add code
Bookmark button
Alert button
Jul 04, 2022
Guoliang Cheng, Lele Liao, Kai Chen, Yuxiang Hu, Changbao Zhu, Jing Lu

Figure 1 for Semi-blind source separation using convolutive transfer function for nonlinear acoustic echo cancellation
Figure 2 for Semi-blind source separation using convolutive transfer function for nonlinear acoustic echo cancellation
Figure 3 for Semi-blind source separation using convolutive transfer function for nonlinear acoustic echo cancellation
Figure 4 for Semi-blind source separation using convolutive transfer function for nonlinear acoustic echo cancellation
Viaarxiv icon

Secure Forward Aggregation for Vertical Federated Neural Networks

Add code
Bookmark button
Alert button
Jun 28, 2022
Shuowei Cai, Di Chai, Liu Yang, Junxue Zhang, Yilun Jin, Leye Wang, Kun Guo, Kai Chen

Figure 1 for Secure Forward Aggregation for Vertical Federated Neural Networks
Figure 2 for Secure Forward Aggregation for Vertical Federated Neural Networks
Figure 3 for Secure Forward Aggregation for Vertical Federated Neural Networks
Figure 4 for Secure Forward Aggregation for Vertical Federated Neural Networks
Viaarxiv icon

A two-stage full-band speech enhancement model with effective spectral compression mapping

Add code
Bookmark button
Alert button
Jun 27, 2022
Zhongshu Hou, Qinwen Hu, Kai Chen, Jing Lu

Figure 1 for A two-stage full-band speech enhancement model with effective spectral compression mapping
Figure 2 for A two-stage full-band speech enhancement model with effective spectral compression mapping
Figure 3 for A two-stage full-band speech enhancement model with effective spectral compression mapping
Figure 4 for A two-stage full-band speech enhancement model with effective spectral compression mapping
Viaarxiv icon