Picture for Yongwei Wang

Yongwei Wang

CCDM: Continuous Conditional Diffusion Models for Image Generation

Add code
May 06, 2024
Figure 1 for CCDM: Continuous Conditional Diffusion Models for Image Generation
Figure 2 for CCDM: Continuous Conditional Diffusion Models for Image Generation
Figure 3 for CCDM: Continuous Conditional Diffusion Models for Image Generation
Figure 4 for CCDM: Continuous Conditional Diffusion Models for Image Generation
Viaarxiv icon

Impart: An Imperceptible and Effective Label-Specific Backdoor Attack

Add code
Mar 18, 2024
Figure 1 for Impart: An Imperceptible and Effective Label-Specific Backdoor Attack
Figure 2 for Impart: An Imperceptible and Effective Label-Specific Backdoor Attack
Figure 3 for Impart: An Imperceptible and Effective Label-Specific Backdoor Attack
Figure 4 for Impart: An Imperceptible and Effective Label-Specific Backdoor Attack
Viaarxiv icon

HGAttack: Transferable Heterogeneous Graph Adversarial Attack

Jan 18, 2024
Figure 1 for HGAttack: Transferable Heterogeneous Graph Adversarial Attack
Figure 2 for HGAttack: Transferable Heterogeneous Graph Adversarial Attack
Figure 3 for HGAttack: Transferable Heterogeneous Graph Adversarial Attack
Figure 4 for HGAttack: Transferable Heterogeneous Graph Adversarial Attack
Viaarxiv icon

Turning Waste into Wealth: Leveraging Low-Quality Samples for Enhancing Continuous Conditional Generative Adversarial Networks

Add code
Aug 20, 2023
Figure 1 for Turning Waste into Wealth: Leveraging Low-Quality Samples for Enhancing Continuous Conditional Generative Adversarial Networks
Figure 2 for Turning Waste into Wealth: Leveraging Low-Quality Samples for Enhancing Continuous Conditional Generative Adversarial Networks
Figure 3 for Turning Waste into Wealth: Leveraging Low-Quality Samples for Enhancing Continuous Conditional Generative Adversarial Networks
Figure 4 for Turning Waste into Wealth: Leveraging Low-Quality Samples for Enhancing Continuous Conditional Generative Adversarial Networks
Viaarxiv icon

Occlusion-Robust FAU Recognition by Mining Latent Space of Masked Autoencoders

Dec 08, 2022
Figure 1 for Occlusion-Robust FAU Recognition by Mining Latent Space of Masked Autoencoders
Figure 2 for Occlusion-Robust FAU Recognition by Mining Latent Space of Masked Autoencoders
Figure 3 for Occlusion-Robust FAU Recognition by Mining Latent Space of Masked Autoencoders
Figure 4 for Occlusion-Robust FAU Recognition by Mining Latent Space of Masked Autoencoders
Viaarxiv icon

MetaNetwork: A Task-agnostic Network Parameters Generation Framework for Improving Device Model Generalization

Sep 12, 2022
Figure 1 for MetaNetwork: A Task-agnostic Network Parameters Generation Framework for Improving Device Model Generalization
Figure 2 for MetaNetwork: A Task-agnostic Network Parameters Generation Framework for Improving Device Model Generalization
Figure 3 for MetaNetwork: A Task-agnostic Network Parameters Generation Framework for Improving Device Model Generalization
Figure 4 for MetaNetwork: A Task-agnostic Network Parameters Generation Framework for Improving Device Model Generalization
Viaarxiv icon

Fight Fire With Fire: Reversing Skin Adversarial Examples by Multiscale Diffusive and Denoising Aggregation Mechanism

Aug 22, 2022
Figure 1 for Fight Fire With Fire: Reversing Skin Adversarial Examples by Multiscale Diffusive and Denoising Aggregation Mechanism
Figure 2 for Fight Fire With Fire: Reversing Skin Adversarial Examples by Multiscale Diffusive and Denoising Aggregation Mechanism
Figure 3 for Fight Fire With Fire: Reversing Skin Adversarial Examples by Multiscale Diffusive and Denoising Aggregation Mechanism
Figure 4 for Fight Fire With Fire: Reversing Skin Adversarial Examples by Multiscale Diffusive and Denoising Aggregation Mechanism
Viaarxiv icon

Revisiting Item Promotion in GNN-based Collaborative Filtering: A Masked Targeted Topological Attack Perspective

Aug 21, 2022
Figure 1 for Revisiting Item Promotion in GNN-based Collaborative Filtering: A Masked Targeted Topological Attack Perspective
Figure 2 for Revisiting Item Promotion in GNN-based Collaborative Filtering: A Masked Targeted Topological Attack Perspective
Figure 3 for Revisiting Item Promotion in GNN-based Collaborative Filtering: A Masked Targeted Topological Attack Perspective
Figure 4 for Revisiting Item Promotion in GNN-based Collaborative Filtering: A Masked Targeted Topological Attack Perspective
Viaarxiv icon

SSD-KD: A Self-supervised Diverse Knowledge Distillation Method for Lightweight Skin Lesion Classification Using Dermoscopic Images

Add code
Mar 30, 2022
Figure 1 for SSD-KD: A Self-supervised Diverse Knowledge Distillation Method for Lightweight Skin Lesion Classification Using Dermoscopic Images
Figure 2 for SSD-KD: A Self-supervised Diverse Knowledge Distillation Method for Lightweight Skin Lesion Classification Using Dermoscopic Images
Figure 3 for SSD-KD: A Self-supervised Diverse Knowledge Distillation Method for Lightweight Skin Lesion Classification Using Dermoscopic Images
Figure 4 for SSD-KD: A Self-supervised Diverse Knowledge Distillation Method for Lightweight Skin Lesion Classification Using Dermoscopic Images
Viaarxiv icon

Delving into Deep Image Prior for Adversarial Defense: A Novel Reconstruction-based Defense Framework

Add code
Jul 31, 2021
Figure 1 for Delving into Deep Image Prior for Adversarial Defense: A Novel Reconstruction-based Defense Framework
Figure 2 for Delving into Deep Image Prior for Adversarial Defense: A Novel Reconstruction-based Defense Framework
Figure 3 for Delving into Deep Image Prior for Adversarial Defense: A Novel Reconstruction-based Defense Framework
Figure 4 for Delving into Deep Image Prior for Adversarial Defense: A Novel Reconstruction-based Defense Framework
Viaarxiv icon