Alert button
Picture for Qi Li

Qi Li

Alert button

DFGC 2021: A DeepFake Game Competition

Add code
Bookmark button
Alert button
Jun 02, 2021
Bo Peng, Hongxing Fan, Wei Wang, Jing Dong, Yuezun Li, Siwei Lyu, Qi Li, Zhenan Sun, Han Chen, Baoying Chen, Yanjie Hu, Shenghai Luo, Junrui Huang, Yutong Yao, Boyuan Liu, Hefei Ling, Guosheng Zhang, Zhiliang Xu, Changtao Miao, Changlei Lu, Shan He, Xiaoyan Wu, Wanyi Zhuang

Figure 1 for DFGC 2021: A DeepFake Game Competition
Figure 2 for DFGC 2021: A DeepFake Game Competition
Figure 3 for DFGC 2021: A DeepFake Game Competition
Figure 4 for DFGC 2021: A DeepFake Game Competition
Viaarxiv icon

SRDiff: Single Image Super-Resolution with Diffusion Probabilistic Models

Add code
Bookmark button
Alert button
May 18, 2021
Haoying Li, Yifan Yang, Meng Chang, Huajun Feng, Zhihai Xu, Qi Li, Yueting Chen

Figure 1 for SRDiff: Single Image Super-Resolution with Diffusion Probabilistic Models
Figure 2 for SRDiff: Single Image Super-Resolution with Diffusion Probabilistic Models
Figure 3 for SRDiff: Single Image Super-Resolution with Diffusion Probabilistic Models
Figure 4 for SRDiff: Single Image Super-Resolution with Diffusion Probabilistic Models
Viaarxiv icon

One Shot Face Swapping on Megapixels

Add code
Bookmark button
Alert button
May 11, 2021
Yuhao Zhu, Qi Li, Jian Wang, Chengzhong Xu, Zhenan Sun

Figure 1 for One Shot Face Swapping on Megapixels
Figure 2 for One Shot Face Swapping on Megapixels
Figure 3 for One Shot Face Swapping on Megapixels
Figure 4 for One Shot Face Swapping on Megapixels
Viaarxiv icon

Few-shot Intent Classification and Slot Filling with Retrieved Examples

Add code
Bookmark button
Alert button
Apr 12, 2021
Dian Yu, Luheng He, Yuan Zhang, Xinya Du, Panupong Pasupat, Qi Li

Figure 1 for Few-shot Intent Classification and Slot Filling with Retrieved Examples
Figure 2 for Few-shot Intent Classification and Slot Filling with Retrieved Examples
Figure 3 for Few-shot Intent Classification and Slot Filling with Retrieved Examples
Figure 4 for Few-shot Intent Classification and Slot Filling with Retrieved Examples
Viaarxiv icon

Free-form Description Guided 3D Visual Graph Network for Object Grounding in Point Cloud

Add code
Bookmark button
Alert button
Mar 30, 2021
Mingtao Feng, Zhen Li, Qi Li, Liang Zhang, XiangDong Zhang, Guangming Zhu, Hui Zhang, Yaonan Wang, Ajmal Mian

Figure 1 for Free-form Description Guided 3D Visual Graph Network for Object Grounding in Point Cloud
Figure 2 for Free-form Description Guided 3D Visual Graph Network for Object Grounding in Point Cloud
Figure 3 for Free-form Description Guided 3D Visual Graph Network for Object Grounding in Point Cloud
Figure 4 for Free-form Description Guided 3D Visual Graph Network for Object Grounding in Point Cloud
Viaarxiv icon

Data Poisoning Attacks and Defenses to Crowdsourcing Systems

Add code
Bookmark button
Alert button
Feb 24, 2021
Minghong Fang, Minghao Sun, Qi Li, Neil Zhenqiang Gong, Jin Tian, Jia Liu

Figure 1 for Data Poisoning Attacks and Defenses to Crowdsourcing Systems
Figure 2 for Data Poisoning Attacks and Defenses to Crowdsourcing Systems
Figure 3 for Data Poisoning Attacks and Defenses to Crowdsourcing Systems
Figure 4 for Data Poisoning Attacks and Defenses to Crowdsourcing Systems
Viaarxiv icon

Truncation-Free Matching System for Display Advertising at Alibaba

Add code
Bookmark button
Alert button
Feb 18, 2021
Jin Li, Jie Liu, Shangzhou Li, Yao Xu, Ran Cao, Qi Li, Biye Jiang, Guan Wang, Han Zhu, Kun Gai, Xiaoqiang Zhu

Figure 1 for Truncation-Free Matching System for Display Advertising at Alibaba
Figure 2 for Truncation-Free Matching System for Display Advertising at Alibaba
Figure 3 for Truncation-Free Matching System for Display Advertising at Alibaba
Figure 4 for Truncation-Free Matching System for Display Advertising at Alibaba
Viaarxiv icon

Detecting Localized Adversarial Examples: A Generic Approach using Critical Region Analysis

Add code
Bookmark button
Alert button
Feb 14, 2021
Fengting Li, Xuankai Liu, Xiaoli Zhang, Qi Li, Kun Sun, Kang Li

Figure 1 for Detecting Localized Adversarial Examples: A Generic Approach using Critical Region Analysis
Figure 2 for Detecting Localized Adversarial Examples: A Generic Approach using Critical Region Analysis
Figure 3 for Detecting Localized Adversarial Examples: A Generic Approach using Critical Region Analysis
Figure 4 for Detecting Localized Adversarial Examples: A Generic Approach using Critical Region Analysis
Viaarxiv icon