Alert button
Picture for Xiao Lu

Xiao Lu

Alert button

Towards Source-free Domain Adaptive Semantic Segmentation via Importance-aware and Prototype-contrast Learning

Add code
Bookmark button
Alert button
Jun 02, 2023
Yihong Cao, Hui Zhang, Xiao Lu, Zheng Xiao, Kailun Yang, Yaonan Wang

Figure 1 for Towards Source-free Domain Adaptive Semantic Segmentation via Importance-aware and Prototype-contrast Learning
Figure 2 for Towards Source-free Domain Adaptive Semantic Segmentation via Importance-aware and Prototype-contrast Learning
Figure 3 for Towards Source-free Domain Adaptive Semantic Segmentation via Importance-aware and Prototype-contrast Learning
Figure 4 for Towards Source-free Domain Adaptive Semantic Segmentation via Importance-aware and Prototype-contrast Learning
Viaarxiv icon

Achieving Covert Communication in Large-Scale SWIPT-Enabled D2D Networks

Add code
Bookmark button
Alert button
Feb 16, 2023
Shaohan Feng, Xiao Lu, Dusit Niyato, Ekram Hossain, Sumei Sun

Figure 1 for Achieving Covert Communication in Large-Scale SWIPT-Enabled D2D Networks
Figure 2 for Achieving Covert Communication in Large-Scale SWIPT-Enabled D2D Networks
Figure 3 for Achieving Covert Communication in Large-Scale SWIPT-Enabled D2D Networks
Figure 4 for Achieving Covert Communication in Large-Scale SWIPT-Enabled D2D Networks
Viaarxiv icon

Semantic Encoder Guided Generative Adversarial Face Ultra-Resolution Network

Add code
Bookmark button
Alert button
Nov 18, 2022
Xiang Wang, Yimin Yang, Qixiang Pang, Xiao Lu, Yu Liu, Shan Du

Figure 1 for Semantic Encoder Guided Generative Adversarial Face Ultra-Resolution Network
Figure 2 for Semantic Encoder Guided Generative Adversarial Face Ultra-Resolution Network
Figure 3 for Semantic Encoder Guided Generative Adversarial Face Ultra-Resolution Network
Figure 4 for Semantic Encoder Guided Generative Adversarial Face Ultra-Resolution Network
Viaarxiv icon

Securing Large-Scale D2D Networks Using Covert Communication and Friendly Jamming

Add code
Bookmark button
Alert button
Sep 30, 2022
Shaohan Feng, Xiao Lu, Sumei Sun, Dusit Niyato, Ekram Hossain

Figure 1 for Securing Large-Scale D2D Networks Using Covert Communication and Friendly Jamming
Figure 2 for Securing Large-Scale D2D Networks Using Covert Communication and Friendly Jamming
Figure 3 for Securing Large-Scale D2D Networks Using Covert Communication and Friendly Jamming
Figure 4 for Securing Large-Scale D2D Networks Using Covert Communication and Friendly Jamming
Viaarxiv icon

Video Shadow Detection via Spatio-Temporal Interpolation Consistency Training

Add code
Bookmark button
Alert button
Jun 17, 2022
Xiao Lu, Yihong Cao, Sheng Liu, Chengjiang Long, Zipei Chen, Xuanyu Zhou, Yimin Yang, Chunxia Xiao

Figure 1 for Video Shadow Detection via Spatio-Temporal Interpolation Consistency Training
Figure 2 for Video Shadow Detection via Spatio-Temporal Interpolation Consistency Training
Figure 3 for Video Shadow Detection via Spatio-Temporal Interpolation Consistency Training
Figure 4 for Video Shadow Detection via Spatio-Temporal Interpolation Consistency Training
Viaarxiv icon

Pseudo-supervised Deep Subspace Clustering

Add code
Bookmark button
Alert button
Apr 08, 2021
Juncheng Lv, Zhao Kang, Xiao Lu, Zenglin Xu

Figure 1 for Pseudo-supervised Deep Subspace Clustering
Figure 2 for Pseudo-supervised Deep Subspace Clustering
Figure 3 for Pseudo-supervised Deep Subspace Clustering
Figure 4 for Pseudo-supervised Deep Subspace Clustering
Viaarxiv icon

Relation-Guided Representation Learning

Add code
Bookmark button
Alert button
Jul 11, 2020
Zhao Kang, Xiao Lu, Jian Liang, Kun Bai, Zenglin Xu

Figure 1 for Relation-Guided Representation Learning
Figure 2 for Relation-Guided Representation Learning
Figure 3 for Relation-Guided Representation Learning
Figure 4 for Relation-Guided Representation Learning
Viaarxiv icon

Detecting Cyberattacks in Industrial Control Systems Using Online Learning Algorithms

Add code
Bookmark button
Alert button
Dec 08, 2019
Guangxia Lia, Yulong Shena, Peilin Zhaob, Xiao Lu, Jia Liu, Yangyang Liu, Steven C. H. Hoi

Figure 1 for Detecting Cyberattacks in Industrial Control Systems Using Online Learning Algorithms
Figure 2 for Detecting Cyberattacks in Industrial Control Systems Using Online Learning Algorithms
Figure 3 for Detecting Cyberattacks in Industrial Control Systems Using Online Learning Algorithms
Figure 4 for Detecting Cyberattacks in Industrial Control Systems Using Online Learning Algorithms
Viaarxiv icon

Structure Learning with Similarity Preserving

Add code
Bookmark button
Alert button
Dec 03, 2019
Zhao Kang, Xiao Lu, Yiwei Lu, Chong Peng, Zenglin Xu

Figure 1 for Structure Learning with Similarity Preserving
Figure 2 for Structure Learning with Similarity Preserving
Figure 3 for Structure Learning with Similarity Preserving
Figure 4 for Structure Learning with Similarity Preserving
Viaarxiv icon

Probabilistic Load Forecasting via Point Forecast Feature Integration

Add code
Bookmark button
Alert button
Mar 26, 2019
Qicheng Chang, Yishen Wang, Xiao Lu, Di Shi, Haifeng Li, Jiajun Duan, Zhiwei Wang

Figure 1 for Probabilistic Load Forecasting via Point Forecast Feature Integration
Figure 2 for Probabilistic Load Forecasting via Point Forecast Feature Integration
Figure 3 for Probabilistic Load Forecasting via Point Forecast Feature Integration
Figure 4 for Probabilistic Load Forecasting via Point Forecast Feature Integration
Viaarxiv icon