Picture for Wen-Sheng Chu

Wen-Sheng Chu

Semantic Image Inversion and Editing using Rectified Stochastic Differential Equations

Add code
Oct 14, 2024
Viaarxiv icon

RB-Modulation: Training-Free Personalization of Diffusion Models using Stochastic Optimal Control

Add code
May 27, 2024
Viaarxiv icon

Beyond First-Order Tweedie: Solving Inverse Problems using Latent Diffusion

Add code
Dec 01, 2023
Viaarxiv icon

Distributionally Robust Post-hoc Classifiers under Prior Shifts

Add code
Sep 16, 2023
Viaarxiv icon

Rethinking Domain Generalization for Face Anti-spoofing: Separability and Alignment

Add code
Mar 23, 2023
Viaarxiv icon

Adaptive Transformers for Robust Few-shot Cross-domain Face Anti-spoofing

Add code
Mar 23, 2022
Figure 1 for Adaptive Transformers for Robust Few-shot Cross-domain Face Anti-spoofing
Figure 2 for Adaptive Transformers for Robust Few-shot Cross-domain Face Anti-spoofing
Figure 3 for Adaptive Transformers for Robust Few-shot Cross-domain Face Anti-spoofing
Figure 4 for Adaptive Transformers for Robust Few-shot Cross-domain Face Anti-spoofing
Viaarxiv icon

Solving Inverse Problems with NerfGANs

Add code
Dec 16, 2021
Figure 1 for Solving Inverse Problems with NerfGANs
Figure 2 for Solving Inverse Problems with NerfGANs
Figure 3 for Solving Inverse Problems with NerfGANs
Figure 4 for Solving Inverse Problems with NerfGANs
Viaarxiv icon

Retrieve in Style: Unsupervised Facial Feature Transfer and Retrieval

Add code
Jul 17, 2021
Figure 1 for Retrieve in Style: Unsupervised Facial Feature Transfer and Retrieval
Figure 2 for Retrieve in Style: Unsupervised Facial Feature Transfer and Retrieval
Figure 3 for Retrieve in Style: Unsupervised Facial Feature Transfer and Retrieval
Figure 4 for Retrieve in Style: Unsupervised Facial Feature Transfer and Retrieval
Viaarxiv icon

Improved Detection of Face Presentation Attacks Using Image Decomposition

Add code
Mar 22, 2021
Figure 1 for Improved Detection of Face Presentation Attacks Using Image Decomposition
Figure 2 for Improved Detection of Face Presentation Attacks Using Image Decomposition
Figure 3 for Improved Detection of Face Presentation Attacks Using Image Decomposition
Figure 4 for Improved Detection of Face Presentation Attacks Using Image Decomposition
Viaarxiv icon

Few-Shot Adaptation of Generative Adversarial Networks

Add code
Oct 22, 2020
Figure 1 for Few-Shot Adaptation of Generative Adversarial Networks
Figure 2 for Few-Shot Adaptation of Generative Adversarial Networks
Figure 3 for Few-Shot Adaptation of Generative Adversarial Networks
Figure 4 for Few-Shot Adaptation of Generative Adversarial Networks
Viaarxiv icon