Alert button
Picture for Yong Shi

Yong Shi

Alert button

Jack

Towards Training Reproducible Deep Learning Models

Feb 04, 2022
Boyuan Chen, Mingzhi Wen, Yong Shi, Dayi Lin, Gopi Krishnan Rajbahadur, Zhen Ming, Jiang

Figure 1 for Towards Training Reproducible Deep Learning Models
Figure 2 for Towards Training Reproducible Deep Learning Models
Figure 3 for Towards Training Reproducible Deep Learning Models
Figure 4 for Towards Training Reproducible Deep Learning Models
Viaarxiv icon

Latent Network Embedding via Adversarial Auto-encoders

Sep 30, 2021
Minglong Lei, Yong Shi, Lingfeng Niu

Figure 1 for Latent Network Embedding via Adversarial Auto-encoders
Figure 2 for Latent Network Embedding via Adversarial Auto-encoders
Figure 3 for Latent Network Embedding via Adversarial Auto-encoders
Figure 4 for Latent Network Embedding via Adversarial Auto-encoders
Viaarxiv icon

Visual Anomaly Detection for Images: A Survey

Sep 27, 2021
Jie Yang, Ruijie Xu, Zhiquan Qi, Yong Shi

Viaarxiv icon

DFR: Deep Feature Reconstruction for Unsupervised Anomaly Segmentation

Dec 13, 2020
Jie Yang, Yong Shi, Zhiquan Qi

Figure 1 for DFR: Deep Feature Reconstruction for Unsupervised Anomaly Segmentation
Figure 2 for DFR: Deep Feature Reconstruction for Unsupervised Anomaly Segmentation
Figure 3 for DFR: Deep Feature Reconstruction for Unsupervised Anomaly Segmentation
Figure 4 for DFR: Deep Feature Reconstruction for Unsupervised Anomaly Segmentation
Viaarxiv icon

Learning to Incorporate Structure Knowledge for Image Inpainting

Feb 12, 2020
Jie Yang, Zhiquan Qi, Yong Shi

Figure 1 for Learning to Incorporate Structure Knowledge for Image Inpainting
Figure 2 for Learning to Incorporate Structure Knowledge for Image Inpainting
Figure 3 for Learning to Incorporate Structure Knowledge for Image Inpainting
Figure 4 for Learning to Incorporate Structure Knowledge for Image Inpainting
Viaarxiv icon

s-LWSR: Super Lightweight Super-Resolution Network

Sep 24, 2019
Biao Li, Jiabin Liu, Bo Wang, Zhiquan Qi, Yong Shi

Figure 1 for s-LWSR: Super Lightweight Super-Resolution Network
Figure 2 for s-LWSR: Super Lightweight Super-Resolution Network
Figure 3 for s-LWSR: Super Lightweight Super-Resolution Network
Figure 4 for s-LWSR: Super Lightweight Super-Resolution Network
Viaarxiv icon

Learning from Label Proportions with Generative Adversarial Networks

Sep 05, 2019
Jiabin Liu, Bo Wang, Zhiquan Qi, Yingjie Tian, Yong Shi

Figure 1 for Learning from Label Proportions with Generative Adversarial Networks
Figure 2 for Learning from Label Proportions with Generative Adversarial Networks
Figure 3 for Learning from Label Proportions with Generative Adversarial Networks
Figure 4 for Learning from Label Proportions with Generative Adversarial Networks
Viaarxiv icon

A Novel Large-scale Ordinal Regression Model

Dec 19, 2018
Yong Shi, Huadong Wang, Xin Shen, Lingfeng Niu

Figure 1 for A Novel Large-scale Ordinal Regression Model
Figure 2 for A Novel Large-scale Ordinal Regression Model
Figure 3 for A Novel Large-scale Ordinal Regression Model
Figure 4 for A Novel Large-scale Ordinal Regression Model
Viaarxiv icon

Research on Artificial Intelligence Ethics Based on the Evolution of Population Knowledge Base

Nov 18, 2018
Feng Liu, Yong Shi

Figure 1 for Research on Artificial Intelligence Ethics Based on the Evolution of Population Knowledge Base
Figure 2 for Research on Artificial Intelligence Ethics Based on the Evolution of Population Knowledge Base
Figure 3 for Research on Artificial Intelligence Ethics Based on the Evolution of Population Knowledge Base
Figure 4 for Research on Artificial Intelligence Ethics Based on the Evolution of Population Knowledge Base
Viaarxiv icon

IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection

Sep 07, 2018
Zilong Lin, Yong Shi, Zhi Xue

Figure 1 for IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection
Figure 2 for IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection
Figure 3 for IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection
Figure 4 for IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection
Viaarxiv icon