Alert button
Picture for Su Wang

Su Wang

Alert button

Imagen Editor and EditBench: Advancing and Evaluating Text-Guided Image Inpainting

Add code
Bookmark button
Alert button
Dec 13, 2022
Su Wang, Chitwan Saharia, Ceslee Montgomery, Jordi Pont-Tuset, Shai Noy, Stefano Pellegrini, Yasumasa Onoe, Sarah Laszlo, David J. Fleet, Radu Soricut, Jason Baldridge, Mohammad Norouzi, Peter Anderson, William Chan

Figure 1 for Imagen Editor and EditBench: Advancing and Evaluating Text-Guided Image Inpainting
Figure 2 for Imagen Editor and EditBench: Advancing and Evaluating Text-Guided Image Inpainting
Figure 3 for Imagen Editor and EditBench: Advancing and Evaluating Text-Guided Image Inpainting
Figure 4 for Imagen Editor and EditBench: Advancing and Evaluating Text-Guided Image Inpainting
Viaarxiv icon

A New Path: Scaling Vision-and-Language Navigation with Synthetic Instructions and Imitation Learning

Add code
Bookmark button
Alert button
Oct 06, 2022
Aishwarya Kamath, Peter Anderson, Su Wang, Jing Yu Koh, Alexander Ku, Austin Waters, Yinfei Yang, Jason Baldridge, Zarana Parekh

Figure 1 for A New Path: Scaling Vision-and-Language Navigation with Synthetic Instructions and Imitation Learning
Figure 2 for A New Path: Scaling Vision-and-Language Navigation with Synthetic Instructions and Imitation Learning
Figure 3 for A New Path: Scaling Vision-and-Language Navigation with Synthetic Instructions and Imitation Learning
Figure 4 for A New Path: Scaling Vision-and-Language Navigation with Synthetic Instructions and Imitation Learning
Viaarxiv icon

Parallel Successive Learning for Dynamic Distributed Model Training over Heterogeneous Wireless Networks

Add code
Bookmark button
Alert button
Feb 12, 2022
Seyyedali Hosseinalipour, Su Wang, Nicolo Michelusi, Vaneet Aggarwal, Christopher G. Brinton, David J. Love, Mung Chiang

Figure 1 for Parallel Successive Learning for Dynamic Distributed Model Training over Heterogeneous Wireless Networks
Figure 2 for Parallel Successive Learning for Dynamic Distributed Model Training over Heterogeneous Wireless Networks
Figure 3 for Parallel Successive Learning for Dynamic Distributed Model Training over Heterogeneous Wireless Networks
Figure 4 for Parallel Successive Learning for Dynamic Distributed Model Training over Heterogeneous Wireless Networks
Viaarxiv icon

GenAD: General Representations of Multivariate Time Seriesfor Anomaly Detection

Add code
Bookmark button
Alert button
Feb 09, 2022
Xiaolei Hua, Lin Zhu, Shenglin Zhang, Zeyan Li, Su Wang, Dong Zhou, Shuo Wang, Chao Deng

Figure 1 for GenAD: General Representations of Multivariate Time Seriesfor Anomaly Detection
Figure 2 for GenAD: General Representations of Multivariate Time Seriesfor Anomaly Detection
Figure 3 for GenAD: General Representations of Multivariate Time Seriesfor Anomaly Detection
Figure 4 for GenAD: General Representations of Multivariate Time Seriesfor Anomaly Detection
Viaarxiv icon

Less is More: Generating Grounded Navigation Instructions from Landmarks

Add code
Bookmark button
Alert button
Nov 29, 2021
Su Wang, Ceslee Montgomery, Jordi Orbay, Vighnesh Birodkar, Aleksandra Faust, Izzeddin Gur, Natasha Jaques, Austin Waters, Jason Baldridge, Peter Anderson

Figure 1 for Less is More: Generating Grounded Navigation Instructions from Landmarks
Figure 2 for Less is More: Generating Grounded Navigation Instructions from Landmarks
Figure 3 for Less is More: Generating Grounded Navigation Instructions from Landmarks
Figure 4 for Less is More: Generating Grounded Navigation Instructions from Landmarks
Viaarxiv icon

threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning

Add code
Bookmark button
Alert button
Nov 08, 2021
Su Wang, Zhiliang Wang, Tao Zhou, Xia Yin, Dongqi Han, Han Zhang, Hongbin Sun, Xingang Shi, Jiahai Yang

Figure 1 for threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning
Figure 2 for threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning
Figure 3 for threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning
Figure 4 for threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning
Viaarxiv icon

DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications

Add code
Bookmark button
Alert button
Sep 23, 2021
Dongqi Han, Zhiliang Wang, Wenqi Chen, Ying Zhong, Su Wang, Han Zhang, Jiahai Yang, Xingang Shi, Xia Yin

Figure 1 for DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications
Figure 2 for DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications
Figure 3 for DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications
Figure 4 for DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications
Viaarxiv icon

UAV-assisted Online Machine Learning over Multi-Tiered Networks: A Hierarchical Nested Personalized Federated Learning Approach

Add code
Bookmark button
Alert button
Jul 11, 2021
Su Wang, Seyyedali Hosseinalipour, Maria Gorlatova, Christopher G. Brinton, Mung Chiang

Figure 1 for UAV-assisted Online Machine Learning over Multi-Tiered Networks: A Hierarchical Nested Personalized Federated Learning Approach
Figure 2 for UAV-assisted Online Machine Learning over Multi-Tiered Networks: A Hierarchical Nested Personalized Federated Learning Approach
Figure 3 for UAV-assisted Online Machine Learning over Multi-Tiered Networks: A Hierarchical Nested Personalized Federated Learning Approach
Figure 4 for UAV-assisted Online Machine Learning over Multi-Tiered Networks: A Hierarchical Nested Personalized Federated Learning Approach
Viaarxiv icon