Alert button
Picture for Xin Wang

Xin Wang

Alert button

Efficiently Solve the Max-cut Problem via a Quantum Qubit Rotation Algorithm

Oct 20, 2021
Xin Wang

Figure 1 for Efficiently Solve the Max-cut Problem via a Quantum Qubit Rotation Algorithm
Figure 2 for Efficiently Solve the Max-cut Problem via a Quantum Qubit Rotation Algorithm
Figure 3 for Efficiently Solve the Max-cut Problem via a Quantum Qubit Rotation Algorithm
Viaarxiv icon

Estimating the confidence of speech spoofing countermeasure

Oct 10, 2021
Xin Wang, Junichi Yamagishi

Figure 1 for Estimating the confidence of speech spoofing countermeasure
Figure 2 for Estimating the confidence of speech spoofing countermeasure
Figure 3 for Estimating the confidence of speech spoofing countermeasure
Figure 4 for Estimating the confidence of speech spoofing countermeasure
Viaarxiv icon

Orthogonal Graph Neural Networks

Sep 23, 2021
Kai Guo, Kaixiong Zhou, Xia Hu, Yu Li, Yi Chang, Xin Wang

Figure 1 for Orthogonal Graph Neural Networks
Figure 2 for Orthogonal Graph Neural Networks
Figure 3 for Orthogonal Graph Neural Networks
Figure 4 for Orthogonal Graph Neural Networks
Viaarxiv icon

Rapid detection and recognition of whole brain activity in a freely behaving Caenorhabditis elegans

Sep 23, 2021
Yuxiang Wu, Shang Wu, Xin Wang, Chengtian Lang, Quanshi Zhang, Quan Wen, Tianqi Xu

Figure 1 for Rapid detection and recognition of whole brain activity in a freely behaving Caenorhabditis elegans
Figure 2 for Rapid detection and recognition of whole brain activity in a freely behaving Caenorhabditis elegans
Figure 3 for Rapid detection and recognition of whole brain activity in a freely behaving Caenorhabditis elegans
Figure 4 for Rapid detection and recognition of whole brain activity in a freely behaving Caenorhabditis elegans
Viaarxiv icon

A Survey on Temporal Sentence Grounding in Videos

Sep 17, 2021
Xiaohan Lan, Yitian Yuan, Xin Wang, Zhi Wang, Wenwu Zhu

Figure 1 for A Survey on Temporal Sentence Grounding in Videos
Figure 2 for A Survey on Temporal Sentence Grounding in Videos
Figure 3 for A Survey on Temporal Sentence Grounding in Videos
Figure 4 for A Survey on Temporal Sentence Grounding in Videos
Viaarxiv icon

SynCoBERT: Syntax-Guided Multi-Modal Contrastive Pre-Training for Code Representation

Sep 09, 2021
Xin Wang, Yasheng Wang, Fei Mi, Pingyi Zhou, Yao Wan, Xiao Liu, Li Li, Hao Wu, Jin Liu, Xin Jiang

Figure 1 for SynCoBERT: Syntax-Guided Multi-Modal Contrastive Pre-Training for Code Representation
Figure 2 for SynCoBERT: Syntax-Guided Multi-Modal Contrastive Pre-Training for Code Representation
Figure 3 for SynCoBERT: Syntax-Guided Multi-Modal Contrastive Pre-Training for Code Representation
Figure 4 for SynCoBERT: Syntax-Guided Multi-Modal Contrastive Pre-Training for Code Representation
Viaarxiv icon

Wanderlust: Online Continual Object Detection in the Real World

Sep 07, 2021
Jianren Wang, Xin Wang, Yue Shang-Guan, Abhinav Gupta

Figure 1 for Wanderlust: Online Continual Object Detection in the Real World
Figure 2 for Wanderlust: Online Continual Object Detection in the Real World
Figure 3 for Wanderlust: Online Continual Object Detection in the Real World
Figure 4 for Wanderlust: Online Continual Object Detection in the Real World
Viaarxiv icon

Robust Attentive Deep Neural Network for Exposing GAN-generated Faces

Sep 05, 2021
Hui Guo, Shu Hu, Xin Wang, Ming-Ching Chang, Siwei Lyu

Figure 1 for Robust Attentive Deep Neural Network for Exposing GAN-generated Faces
Figure 2 for Robust Attentive Deep Neural Network for Exposing GAN-generated Faces
Figure 3 for Robust Attentive Deep Neural Network for Exposing GAN-generated Faces
Figure 4 for Robust Attentive Deep Neural Network for Exposing GAN-generated Faces
Viaarxiv icon

Tolerating Adversarial Attacks and Byzantine Faults in Distributed Machine Learning

Sep 05, 2021
Yusen Wu, Hao Chen, Xin Wang, Chao Liu, Phuong Nguyen, Yelena Yesha

Figure 1 for Tolerating Adversarial Attacks and Byzantine Faults in Distributed Machine Learning
Figure 2 for Tolerating Adversarial Attacks and Byzantine Faults in Distributed Machine Learning
Figure 3 for Tolerating Adversarial Attacks and Byzantine Faults in Distributed Machine Learning
Figure 4 for Tolerating Adversarial Attacks and Byzantine Faults in Distributed Machine Learning
Viaarxiv icon