Picture for Xiangtai Li

Xiangtai Li

Auto Cherry-Picker: Learning from High-quality Generative Data Driven by Language

Add code
Jun 28, 2024
Viaarxiv icon

Mamba or RWKV: Exploring High-Quality and High-Efficiency Segment Anything Model

Add code
Jun 27, 2024
Figure 1 for Mamba or RWKV: Exploring High-Quality and High-Efficiency Segment Anything Model
Figure 2 for Mamba or RWKV: Exploring High-Quality and High-Efficiency Segment Anything Model
Figure 3 for Mamba or RWKV: Exploring High-Quality and High-Efficiency Segment Anything Model
Figure 4 for Mamba or RWKV: Exploring High-Quality and High-Efficiency Segment Anything Model
Viaarxiv icon

OMG-LLaVA: Bridging Image-level, Object-level, Pixel-level Reasoning and Understanding

Add code
Jun 27, 2024
Viaarxiv icon

MG-LLaVA: Towards Multi-Granularity Visual Instruction Tuning

Add code
Jun 25, 2024
Figure 1 for MG-LLaVA: Towards Multi-Granularity Visual Instruction Tuning
Figure 2 for MG-LLaVA: Towards Multi-Granularity Visual Instruction Tuning
Figure 3 for MG-LLaVA: Towards Multi-Granularity Visual Instruction Tuning
Figure 4 for MG-LLaVA: Towards Multi-Granularity Visual Instruction Tuning
Viaarxiv icon

MotionBooth: Motion-Aware Customized Text-to-Video Generation

Add code
Jun 25, 2024
Viaarxiv icon

Towards Semantic Equivalence of Tokenization in Multimodal LLM

Add code
Jun 07, 2024
Viaarxiv icon

BACON: Bayesian Optimal Condensation Framework for Dataset Distillation

Add code
Jun 03, 2024
Viaarxiv icon

SemFlow: Binding Semantic Segmentation and Image Synthesis via Rectified Flow

Add code
May 30, 2024
Viaarxiv icon

Reason3D: Searching and Reasoning 3D Segmentation via Large Language Model

Add code
May 27, 2024
Viaarxiv icon

Adversarial Attacks on Both Face Recognition and Face Anti-spoofing Models

Add code
May 27, 2024
Figure 1 for Adversarial Attacks on Both Face Recognition and Face Anti-spoofing Models
Figure 2 for Adversarial Attacks on Both Face Recognition and Face Anti-spoofing Models
Figure 3 for Adversarial Attacks on Both Face Recognition and Face Anti-spoofing Models
Figure 4 for Adversarial Attacks on Both Face Recognition and Face Anti-spoofing Models
Viaarxiv icon