Alert button
Picture for Kaiyuan Xu

Kaiyuan Xu

Alert button

Comparison of Centralized and Decentralized Approaches in Cooperative Coverage Problems with Energy-Constrained Agents

Add code
Bookmark button
Alert button
Aug 26, 2020
Xiangyu Meng, Xinmiao Sun, Christos G. Cassandras, Kaiyuan Xu

Figure 1 for Comparison of Centralized and Decentralized Approaches in Cooperative Coverage Problems with Energy-Constrained Agents
Figure 2 for Comparison of Centralized and Decentralized Approaches in Cooperative Coverage Problems with Energy-Constrained Agents
Figure 3 for Comparison of Centralized and Decentralized Approaches in Cooperative Coverage Problems with Energy-Constrained Agents
Figure 4 for Comparison of Centralized and Decentralized Approaches in Cooperative Coverage Problems with Energy-Constrained Agents
Viaarxiv icon

Adaptive Adversarial Logits Pairing

Add code
Bookmark button
Alert button
May 25, 2020
Shangxi Wu, Jitao Sang, Kaiyuan Xu, Guanhua Zheng, Changsheng Xu

Figure 1 for Adaptive Adversarial Logits Pairing
Figure 2 for Adaptive Adversarial Logits Pairing
Figure 3 for Adaptive Adversarial Logits Pairing
Figure 4 for Adaptive Adversarial Logits Pairing
Viaarxiv icon

Butterfly detection and classification based on integrated YOLO algorithm

Add code
Bookmark button
Alert button
Jan 02, 2020
Bohan Liang, Shangxi Wu, Kaiyuan Xu, Jingyu Hao

Figure 1 for Butterfly detection and classification based on integrated YOLO algorithm
Figure 2 for Butterfly detection and classification based on integrated YOLO algorithm
Figure 3 for Butterfly detection and classification based on integrated YOLO algorithm
Figure 4 for Butterfly detection and classification based on integrated YOLO algorithm
Viaarxiv icon

blessing in disguise: Designing Robust Turing Test by Employing Algorithm Unrobustness

Add code
Bookmark button
Alert button
Apr 22, 2019
Jiaming Zhang, Jitao Sang, Kaiyuan Xu, Shangxi Wu, Yongli Hu, Yanfeng Sun, Jian Yu

Figure 1 for blessing in disguise: Designing Robust Turing Test by Employing Algorithm Unrobustness
Figure 2 for blessing in disguise: Designing Robust Turing Test by Employing Algorithm Unrobustness
Figure 3 for blessing in disguise: Designing Robust Turing Test by Employing Algorithm Unrobustness
Figure 4 for blessing in disguise: Designing Robust Turing Test by Employing Algorithm Unrobustness
Viaarxiv icon

Attention, Please! Adversarial Defense via Attention Rectification and Preservation

Add code
Bookmark button
Alert button
Nov 24, 2018
Shangxi Wu, Jitao Sang, Kaiyuan Xu, Jiaming Zhang, Yanfeng Sun, Liping Jing, Jian Yu

Figure 1 for Attention, Please! Adversarial Defense via Attention Rectification and Preservation
Figure 2 for Attention, Please! Adversarial Defense via Attention Rectification and Preservation
Figure 3 for Attention, Please! Adversarial Defense via Attention Rectification and Preservation
Figure 4 for Attention, Please! Adversarial Defense via Attention Rectification and Preservation
Viaarxiv icon

Deep neural network based i-vector mapping for speaker verification using short utterances

Add code
Bookmark button
Alert button
Oct 16, 2018
Jinxi Guo, Ning Xu, Kailun Qian, Yang Shi, Kaiyuan Xu, Yingnian Wu, Abeer Alwan

Figure 1 for Deep neural network based i-vector mapping for speaker verification using short utterances
Figure 2 for Deep neural network based i-vector mapping for speaker verification using short utterances
Figure 3 for Deep neural network based i-vector mapping for speaker verification using short utterances
Figure 4 for Deep neural network based i-vector mapping for speaker verification using short utterances
Viaarxiv icon