Picture for Yingying Chen

Yingying Chen

National Lab of Pattern Recognition, Institute of Automation, Chinese Academy of Sciences, University of Chinese Academy of Sciences

FiLo: Zero-Shot Anomaly Detection by Fine-Grained Description and High-Quality Localization

Add code
Apr 21, 2024
Figure 1 for FiLo: Zero-Shot Anomaly Detection by Fine-Grained Description and High-Quality Localization
Figure 2 for FiLo: Zero-Shot Anomaly Detection by Fine-Grained Description and High-Quality Localization
Figure 3 for FiLo: Zero-Shot Anomaly Detection by Fine-Grained Description and High-Quality Localization
Figure 4 for FiLo: Zero-Shot Anomaly Detection by Fine-Grained Description and High-Quality Localization
Viaarxiv icon

Optimization of Prompt Learning via Multi-Knowledge Representation for Vision-Language Models

Add code
Apr 17, 2024
Figure 1 for Optimization of Prompt Learning via Multi-Knowledge Representation for Vision-Language Models
Figure 2 for Optimization of Prompt Learning via Multi-Knowledge Representation for Vision-Language Models
Figure 3 for Optimization of Prompt Learning via Multi-Knowledge Representation for Vision-Language Models
Figure 4 for Optimization of Prompt Learning via Multi-Knowledge Representation for Vision-Language Models
Viaarxiv icon

DisDet: Exploring Detectability of Backdoor Attack on Diffusion Models

Add code
Feb 05, 2024
Viaarxiv icon

Adaptive Quantization for Key Generation in Low-Power Wide-Area Networks

Add code
Oct 11, 2023
Figure 1 for Adaptive Quantization for Key Generation in Low-Power Wide-Area Networks
Figure 2 for Adaptive Quantization for Key Generation in Low-Power Wide-Area Networks
Figure 3 for Adaptive Quantization for Key Generation in Low-Power Wide-Area Networks
Figure 4 for Adaptive Quantization for Key Generation in Low-Power Wide-Area Networks
Viaarxiv icon

AnomalyGPT: Detecting Industrial Anomalies using Large Vision-Language Models

Add code
Sep 13, 2023
Figure 1 for AnomalyGPT: Detecting Industrial Anomalies using Large Vision-Language Models
Figure 2 for AnomalyGPT: Detecting Industrial Anomalies using Large Vision-Language Models
Figure 3 for AnomalyGPT: Detecting Industrial Anomalies using Large Vision-Language Models
Figure 4 for AnomalyGPT: Detecting Industrial Anomalies using Large Vision-Language Models
Viaarxiv icon

Benchmarking and Analyzing Robust Point Cloud Recognition: Bag of Tricks for Defending Adversarial Examples

Add code
Aug 10, 2023
Figure 1 for Benchmarking and Analyzing Robust Point Cloud Recognition: Bag of Tricks for Defending Adversarial Examples
Figure 2 for Benchmarking and Analyzing Robust Point Cloud Recognition: Bag of Tricks for Defending Adversarial Examples
Figure 3 for Benchmarking and Analyzing Robust Point Cloud Recognition: Bag of Tricks for Defending Adversarial Examples
Figure 4 for Benchmarking and Analyzing Robust Point Cloud Recognition: Bag of Tricks for Defending Adversarial Examples
Viaarxiv icon

EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers

Add code
Dec 23, 2022
Figure 1 for EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers
Figure 2 for EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers
Figure 3 for EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers
Figure 4 for EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers
Viaarxiv icon

Privacy-Utility Balanced Voice De-Identification Using Adversarial Examples

Add code
Nov 10, 2022
Figure 1 for Privacy-Utility Balanced Voice De-Identification Using Adversarial Examples
Figure 2 for Privacy-Utility Balanced Voice De-Identification Using Adversarial Examples
Figure 3 for Privacy-Utility Balanced Voice De-Identification Using Adversarial Examples
Figure 4 for Privacy-Utility Balanced Voice De-Identification Using Adversarial Examples
Viaarxiv icon

View-Disentangled Transformer for Brain Lesion Detection

Add code
Sep 20, 2022
Figure 1 for View-Disentangled Transformer for Brain Lesion Detection
Figure 2 for View-Disentangled Transformer for Brain Lesion Detection
Figure 3 for View-Disentangled Transformer for Brain Lesion Detection
Figure 4 for View-Disentangled Transformer for Brain Lesion Detection
Viaarxiv icon

RIBAC: Towards Robust and Imperceptible Backdoor Attack against Compact DNN

Add code
Aug 22, 2022
Figure 1 for RIBAC: Towards Robust and Imperceptible Backdoor Attack against Compact DNN
Viaarxiv icon