Alert button
Picture for Kam Woh Ng

Kam Woh Ng

Alert button

IPR-NeRF: Ownership Verification meets Neural Radiance Field

Add code
Bookmark button
Alert button
Jan 23, 2024
Win Kent Ong, Kam Woh Ng, Chee Seng Chan, Yi Zhe Song, Tao Xiang

Viaarxiv icon

DreamCreature: Crafting Photorealistic Virtual Creatures from Imagination

Add code
Bookmark button
Alert button
Nov 27, 2023
Kam Woh Ng, Xiatian Zhu, Yi-Zhe Song, Tao Xiang

Figure 1 for DreamCreature: Crafting Photorealistic Virtual Creatures from Imagination
Figure 2 for DreamCreature: Crafting Photorealistic Virtual Creatures from Imagination
Figure 3 for DreamCreature: Crafting Photorealistic Virtual Creatures from Imagination
Figure 4 for DreamCreature: Crafting Photorealistic Virtual Creatures from Imagination
Viaarxiv icon

Unsupervised Hashing via Similarity Distribution Calibration

Add code
Bookmark button
Alert button
Feb 15, 2023
Kam Woh Ng, Xiatian Zhu, Jiun Tian Hoe, Chee Seng Chan, Tianyu Zhang, Yi-Zhe Song, Tao Xiang

Figure 1 for Unsupervised Hashing via Similarity Distribution Calibration
Figure 2 for Unsupervised Hashing via Similarity Distribution Calibration
Figure 3 for Unsupervised Hashing via Similarity Distribution Calibration
Figure 4 for Unsupervised Hashing via Similarity Distribution Calibration
Viaarxiv icon

Large-Scale Product Retrieval with Weakly Supervised Representation Learning

Add code
Bookmark button
Alert button
Aug 01, 2022
Xiao Han, Kam Woh Ng, Sauradip Nag, Zhiyu Qu

Figure 1 for Large-Scale Product Retrieval with Weakly Supervised Representation Learning
Figure 2 for Large-Scale Product Retrieval with Weakly Supervised Representation Learning
Figure 3 for Large-Scale Product Retrieval with Weakly Supervised Representation Learning
Figure 4 for Large-Scale Product Retrieval with Weakly Supervised Representation Learning
Viaarxiv icon

One Loss for All: Deep Hashing with a Single Cosine Similarity based Learning Objective

Add code
Bookmark button
Alert button
Sep 29, 2021
Jiun Tian Hoe, Kam Woh Ng, Tianyu Zhang, Chee Seng Chan, Yi-Zhe Song, Tao Xiang

Figure 1 for One Loss for All: Deep Hashing with a Single Cosine Similarity based Learning Objective
Figure 2 for One Loss for All: Deep Hashing with a Single Cosine Similarity based Learning Objective
Figure 3 for One Loss for All: Deep Hashing with a Single Cosine Similarity based Learning Objective
Figure 4 for One Loss for All: Deep Hashing with a Single Cosine Similarity based Learning Objective
Viaarxiv icon

Ternary Hashing

Add code
Bookmark button
Alert button
Mar 19, 2021
Chang Liu, Lixin Fan, Kam Woh Ng, Yilun Jin, Ce Ju, Tianyu Zhang, Chee Seng Chan, Qiang Yang

Figure 1 for Ternary Hashing
Figure 2 for Ternary Hashing
Figure 3 for Ternary Hashing
Figure 4 for Ternary Hashing
Viaarxiv icon

Protecting Intellectual Property of Generative Adversarial Networks from Ambiguity Attack

Add code
Bookmark button
Alert button
Mar 01, 2021
Ding Sheng Ong, Chee Seng Chan, Kam Woh Ng, Lixin Fan, Qiang Yang

Figure 1 for Protecting Intellectual Property of Generative Adversarial Networks from Ambiguity Attack
Figure 2 for Protecting Intellectual Property of Generative Adversarial Networks from Ambiguity Attack
Figure 3 for Protecting Intellectual Property of Generative Adversarial Networks from Ambiguity Attack
Figure 4 for Protecting Intellectual Property of Generative Adversarial Networks from Ambiguity Attack
Viaarxiv icon

Rethinking Uncertainty in Deep Learning: Whether and How it Improves Robustness

Add code
Bookmark button
Alert button
Nov 27, 2020
Yilun Jin, Lixin Fan, Kam Woh Ng, Ce Ju, Qiang Yang

Figure 1 for Rethinking Uncertainty in Deep Learning: Whether and How it Improves Robustness
Figure 2 for Rethinking Uncertainty in Deep Learning: Whether and How it Improves Robustness
Figure 3 for Rethinking Uncertainty in Deep Learning: Whether and How it Improves Robustness
Figure 4 for Rethinking Uncertainty in Deep Learning: Whether and How it Improves Robustness
Viaarxiv icon