Alert button
Picture for Liyao Xiang

Liyao Xiang

Alert button

High-Order Relation Construction and Mining for Graph Matching

Add code
Bookmark button
Alert button
Oct 09, 2020
Hui Xu, Liyao Xiang, Youmin Le, Xiaoying Gan, Yuting Jia, Luoyi Fu, Xinbing Wang

Figure 1 for High-Order Relation Construction and Mining for Graph Matching
Figure 2 for High-Order Relation Construction and Mining for Graph Matching
Figure 3 for High-Order Relation Construction and Mining for Graph Matching
Figure 4 for High-Order Relation Construction and Mining for Graph Matching
Viaarxiv icon

Achieving Adversarial Robustness via Sparsity

Add code
Bookmark button
Alert button
Sep 11, 2020
Shufan Wang, Ningyi Liao, Liyao Xiang, Nanyang Ye, Quanshi Zhang

Figure 1 for Achieving Adversarial Robustness via Sparsity
Figure 2 for Achieving Adversarial Robustness via Sparsity
Figure 3 for Achieving Adversarial Robustness via Sparsity
Figure 4 for Achieving Adversarial Robustness via Sparsity
Viaarxiv icon

Rotation-Equivariant Neural Networks for Privacy Protection

Add code
Bookmark button
Alert button
Jun 21, 2020
Hao Zhang, Yiting Chen, Haotian Ma, Xu Cheng, Qihan Ren, Liyao Xiang, Jie Shi, Quanshi Zhang

Figure 1 for Rotation-Equivariant Neural Networks for Privacy Protection
Figure 2 for Rotation-Equivariant Neural Networks for Privacy Protection
Figure 3 for Rotation-Equivariant Neural Networks for Privacy Protection
Figure 4 for Rotation-Equivariant Neural Networks for Privacy Protection
Viaarxiv icon

Deep Quaternion Features for Privacy Protection

Add code
Bookmark button
Alert button
Mar 18, 2020
Hao Zhang, Yiting Chen, Liyao Xiang, Haotian Ma, Jie Shi, Quanshi Zhang

Figure 1 for Deep Quaternion Features for Privacy Protection
Figure 2 for Deep Quaternion Features for Privacy Protection
Figure 3 for Deep Quaternion Features for Privacy Protection
Figure 4 for Deep Quaternion Features for Privacy Protection
Viaarxiv icon

Preventing Information Leakage with Neural Architecture Search

Add code
Bookmark button
Alert button
Dec 18, 2019
Shuang Zhang, Liyao Xiang, Congcong Li, Yixuan Wang, Zeyu Liu, Quanshi Zhang, Bo Li

Figure 1 for Preventing Information Leakage with Neural Architecture Search
Figure 2 for Preventing Information Leakage with Neural Architecture Search
Figure 3 for Preventing Information Leakage with Neural Architecture Search
Figure 4 for Preventing Information Leakage with Neural Architecture Search
Viaarxiv icon

Complex-Valued Neural Networks for Privacy Protection

Add code
Bookmark button
Alert button
Jan 28, 2019
Liyao Xiang, Haotian Ma, Hao Zhang, Yifan Zhang, Quanshi Zhang

Figure 1 for Complex-Valued Neural Networks for Privacy Protection
Figure 2 for Complex-Valued Neural Networks for Privacy Protection
Figure 3 for Complex-Valued Neural Networks for Privacy Protection
Figure 4 for Complex-Valued Neural Networks for Privacy Protection
Viaarxiv icon