Picture for Raja Giryes

Raja Giryes

School of Electrical Engineering, Tel Aviv University, Tel Aviv, Israel

TEXTure: Text-Guided Texturing of 3D Shapes

Add code
Feb 03, 2023
Viaarxiv icon

ADIR: Adaptive Diffusion for Image Reconstruction

Add code
Dec 06, 2022
Viaarxiv icon

MAEDAY: MAE for few and zero shot AnomalY-Detection

Add code
Nov 25, 2022
Figure 1 for MAEDAY: MAE for few and zero shot AnomalY-Detection
Figure 2 for MAEDAY: MAE for few and zero shot AnomalY-Detection
Figure 3 for MAEDAY: MAE for few and zero shot AnomalY-Detection
Figure 4 for MAEDAY: MAE for few and zero shot AnomalY-Detection
Viaarxiv icon

PIP: Positional-encoding Image Prior

Add code
Nov 25, 2022
Viaarxiv icon

Teaching Structured Vision&Language Concepts to Vision&Language Models

Add code
Nov 21, 2022
Viaarxiv icon

Latent-NeRF for Shape-Guided Generation of 3D Shapes and Textures

Add code
Nov 14, 2022
Viaarxiv icon

Learning Low Dimensional State Spaces with Overparameterized Recurrent Neural Network

Add code
Oct 25, 2022
Viaarxiv icon

A Diffusion Model Predicts 3D Shapes from 2D Microscopy Images

Add code
Aug 31, 2022
Figure 1 for A Diffusion Model Predicts 3D Shapes from 2D Microscopy Images
Figure 2 for A Diffusion Model Predicts 3D Shapes from 2D Microscopy Images
Figure 3 for A Diffusion Model Predicts 3D Shapes from 2D Microscopy Images
Figure 4 for A Diffusion Model Predicts 3D Shapes from 2D Microscopy Images
Viaarxiv icon

Utilizing Excess Resources in Training Neural Networks

Add code
Jul 12, 2022
Figure 1 for Utilizing Excess Resources in Training Neural Networks
Figure 2 for Utilizing Excess Resources in Training Neural Networks
Figure 3 for Utilizing Excess Resources in Training Neural Networks
Figure 4 for Utilizing Excess Resources in Training Neural Networks
Viaarxiv icon

Membership Inference Attack Using Self Influence Functions

Add code
May 26, 2022
Figure 1 for Membership Inference Attack Using Self Influence Functions
Figure 2 for Membership Inference Attack Using Self Influence Functions
Figure 3 for Membership Inference Attack Using Self Influence Functions
Figure 4 for Membership Inference Attack Using Self Influence Functions
Viaarxiv icon