Alert button
Picture for Weiming Zhang

Weiming Zhang

Alert button

PeCo: Perceptual Codebook for BERT Pre-training of Vision Transformers

Add code
Bookmark button
Alert button
Nov 24, 2021
Xiaoyi Dong, Jianmin Bao, Ting Zhang, Dongdong Chen, Weiming Zhang, Lu Yuan, Dong Chen, Fang Wen, Nenghai Yu

Figure 1 for PeCo: Perceptual Codebook for BERT Pre-training of Vision Transformers
Figure 2 for PeCo: Perceptual Codebook for BERT Pre-training of Vision Transformers
Figure 3 for PeCo: Perceptual Codebook for BERT Pre-training of Vision Transformers
Figure 4 for PeCo: Perceptual Codebook for BERT Pre-training of Vision Transformers
Viaarxiv icon

Speech Pattern based Black-box Model Watermarking for Automatic Speech Recognition

Add code
Bookmark button
Alert button
Oct 19, 2021
Haozhe Chen, Weiming Zhang, Kunlin Liu, Kejiang Chen, Han Fang, Nenghai Yu

Figure 1 for Speech Pattern based Black-box Model Watermarking for Automatic Speech Recognition
Figure 2 for Speech Pattern based Black-box Model Watermarking for Automatic Speech Recognition
Figure 3 for Speech Pattern based Black-box Model Watermarking for Automatic Speech Recognition
Figure 4 for Speech Pattern based Black-box Model Watermarking for Automatic Speech Recognition
Viaarxiv icon

MBRS : Enhancing Robustness of DNN-based Watermarking by Mini-Batch of Real and Simulated JPEG Compression

Add code
Bookmark button
Alert button
Aug 18, 2021
Zhaoyang Jia, Han Fang, Weiming Zhang

Figure 1 for MBRS : Enhancing Robustness of DNN-based Watermarking by Mini-Batch of Real and Simulated JPEG Compression
Figure 2 for MBRS : Enhancing Robustness of DNN-based Watermarking by Mini-Batch of Real and Simulated JPEG Compression
Figure 3 for MBRS : Enhancing Robustness of DNN-based Watermarking by Mini-Batch of Real and Simulated JPEG Compression
Figure 4 for MBRS : Enhancing Robustness of DNN-based Watermarking by Mini-Batch of Real and Simulated JPEG Compression
Viaarxiv icon

Poison Ink: Robust and Invisible Backdoor Attack

Add code
Bookmark button
Alert button
Aug 14, 2021
Jie Zhang, Dongdong Chen, Jing Liao, Qidong Huang, Gang Hua, Weiming Zhang, Nenghai Yu

Figure 1 for Poison Ink: Robust and Invisible Backdoor Attack
Figure 2 for Poison Ink: Robust and Invisible Backdoor Attack
Figure 3 for Poison Ink: Robust and Invisible Backdoor Attack
Figure 4 for Poison Ink: Robust and Invisible Backdoor Attack
Viaarxiv icon

Exploring Structure Consistency for Deep Model Watermarking

Add code
Bookmark button
Alert button
Aug 05, 2021
Jie Zhang, Dongdong Chen, Jing Liao, Han Fang, Zehua Ma, Weiming Zhang, Gang Hua, Nenghai Yu

Figure 1 for Exploring Structure Consistency for Deep Model Watermarking
Figure 2 for Exploring Structure Consistency for Deep Model Watermarking
Figure 3 for Exploring Structure Consistency for Deep Model Watermarking
Figure 4 for Exploring Structure Consistency for Deep Model Watermarking
Viaarxiv icon

CSWin Transformer: A General Vision Transformer Backbone with Cross-Shaped Windows

Add code
Bookmark button
Alert button
Jul 15, 2021
Xiaoyi Dong, Jianmin Bao, Dongdong Chen, Weiming Zhang, Nenghai Yu, Lu Yuan, Dong Chen, Baining Guo

Figure 1 for CSWin Transformer: A General Vision Transformer Backbone with Cross-Shaped Windows
Figure 2 for CSWin Transformer: A General Vision Transformer Backbone with Cross-Shaped Windows
Figure 3 for CSWin Transformer: A General Vision Transformer Backbone with Cross-Shaped Windows
Figure 4 for CSWin Transformer: A General Vision Transformer Backbone with Cross-Shaped Windows
Viaarxiv icon

A Simple Baseline for StyleGAN Inversion

Add code
Bookmark button
Alert button
Apr 15, 2021
Tianyi Wei, Dongdong Chen, Wenbo Zhou, Jing Liao, Weiming Zhang, Lu Yuan, Gang Hua, Nenghai Yu

Figure 1 for A Simple Baseline for StyleGAN Inversion
Figure 2 for A Simple Baseline for StyleGAN Inversion
Figure 3 for A Simple Baseline for StyleGAN Inversion
Figure 4 for A Simple Baseline for StyleGAN Inversion
Viaarxiv icon

Reversible Watermarking in Deep Convolutional Neural Networks for Integrity Authentication

Add code
Bookmark button
Alert button
Apr 09, 2021
Xiquan Guan, Huamin Feng, Weiming Zhang, Hang Zhou, Jie Zhang, Nenghai Yu

Figure 1 for Reversible Watermarking in Deep Convolutional Neural Networks for Integrity Authentication
Figure 2 for Reversible Watermarking in Deep Convolutional Neural Networks for Integrity Authentication
Figure 3 for Reversible Watermarking in Deep Convolutional Neural Networks for Integrity Authentication
Figure 4 for Reversible Watermarking in Deep Convolutional Neural Networks for Integrity Authentication
Viaarxiv icon