Picture for Ngai-Man Cheung

Ngai-Man Cheung

An Improved Self-supervised GAN via Adversarial Training

Add code
May 14, 2019
Figure 1 for An Improved Self-supervised GAN via Adversarial Training
Figure 2 for An Improved Self-supervised GAN via Adversarial Training
Figure 3 for An Improved Self-supervised GAN via Adversarial Training
Figure 4 for An Improved Self-supervised GAN via Adversarial Training
Viaarxiv icon

Simultaneous Feature Aggregating and Hashing for Compact Binary Code Learning

Add code
Apr 24, 2019
Figure 1 for Simultaneous Feature Aggregating and Hashing for Compact Binary Code Learning
Figure 2 for Simultaneous Feature Aggregating and Hashing for Compact Binary Code Learning
Figure 3 for Simultaneous Feature Aggregating and Hashing for Compact Binary Code Learning
Figure 4 for Simultaneous Feature Aggregating and Hashing for Compact Binary Code Learning
Viaarxiv icon

SDRSAC: Semidefinite-Based Randomized Approach for Robust Point Cloud Registration without Correspondences

Add code
Apr 14, 2019
Figure 1 for SDRSAC: Semidefinite-Based Randomized Approach for Robust Point Cloud Registration without Correspondences
Figure 2 for SDRSAC: Semidefinite-Based Randomized Approach for Robust Point Cloud Registration without Correspondences
Figure 3 for SDRSAC: Semidefinite-Based Randomized Approach for Robust Point Cloud Registration without Correspondences
Figure 4 for SDRSAC: Semidefinite-Based Randomized Approach for Robust Point Cloud Registration without Correspondences
Viaarxiv icon

Detecting Target-Area Link-Flooding DDoS Attacks using Traffic Analysis and Supervised Learning

Add code
Mar 01, 2019
Figure 1 for Detecting Target-Area Link-Flooding DDoS Attacks using Traffic Analysis and Supervised Learning
Figure 2 for Detecting Target-Area Link-Flooding DDoS Attacks using Traffic Analysis and Supervised Learning
Figure 3 for Detecting Target-Area Link-Flooding DDoS Attacks using Traffic Analysis and Supervised Learning
Figure 4 for Detecting Target-Area Link-Flooding DDoS Attacks using Traffic Analysis and Supervised Learning
Viaarxiv icon

Improving GAN with neighbors embedding and gradient matching

Add code
Nov 04, 2018
Figure 1 for Improving GAN with neighbors embedding and gradient matching
Figure 2 for Improving GAN with neighbors embedding and gradient matching
Figure 3 for Improving GAN with neighbors embedding and gradient matching
Figure 4 for Improving GAN with neighbors embedding and gradient matching
Viaarxiv icon

Supervised Hashing with End-to-End Binary Deep Neural Network

Add code
Oct 27, 2018
Figure 1 for Supervised Hashing with End-to-End Binary Deep Neural Network
Figure 2 for Supervised Hashing with End-to-End Binary Deep Neural Network
Figure 3 for Supervised Hashing with End-to-End Binary Deep Neural Network
Figure 4 for Supervised Hashing with End-to-End Binary Deep Neural Network
Viaarxiv icon

DOPING: Generative Data Augmentation for Unsupervised Anomaly Detection with GAN

Add code
Aug 24, 2018
Figure 1 for DOPING: Generative Data Augmentation for Unsupervised Anomaly Detection with GAN
Figure 2 for DOPING: Generative Data Augmentation for Unsupervised Anomaly Detection with GAN
Figure 3 for DOPING: Generative Data Augmentation for Unsupervised Anomaly Detection with GAN
Figure 4 for DOPING: Generative Data Augmentation for Unsupervised Anomaly Detection with GAN
Viaarxiv icon

Deep Adaptive Temporal Pooling for Activity Recognition

Add code
Aug 22, 2018
Figure 1 for Deep Adaptive Temporal Pooling for Activity Recognition
Figure 2 for Deep Adaptive Temporal Pooling for Activity Recognition
Figure 3 for Deep Adaptive Temporal Pooling for Activity Recognition
Figure 4 for Deep Adaptive Temporal Pooling for Activity Recognition
Viaarxiv icon

Defense Against Adversarial Attacks with Saak Transform

Add code
Aug 06, 2018
Figure 1 for Defense Against Adversarial Attacks with Saak Transform
Figure 2 for Defense Against Adversarial Attacks with Saak Transform
Figure 3 for Defense Against Adversarial Attacks with Saak Transform
Figure 4 for Defense Against Adversarial Attacks with Saak Transform
Viaarxiv icon

Binary Constrained Deep Hashing Network for Image Retrieval without Manual Annotation

Add code
Aug 02, 2018
Figure 1 for Binary Constrained Deep Hashing Network for Image Retrieval without Manual Annotation
Figure 2 for Binary Constrained Deep Hashing Network for Image Retrieval without Manual Annotation
Figure 3 for Binary Constrained Deep Hashing Network for Image Retrieval without Manual Annotation
Figure 4 for Binary Constrained Deep Hashing Network for Image Retrieval without Manual Annotation
Viaarxiv icon