Picture for Yu Lin

Yu Lin

MedM2G: Unifying Medical Multi-Modal Generation via Cross-Guided Diffusion with Visual Invariant

Add code
Mar 07, 2024
Figure 1 for MedM2G: Unifying Medical Multi-Modal Generation via Cross-Guided Diffusion with Visual Invariant
Figure 2 for MedM2G: Unifying Medical Multi-Modal Generation via Cross-Guided Diffusion with Visual Invariant
Figure 3 for MedM2G: Unifying Medical Multi-Modal Generation via Cross-Guided Diffusion with Visual Invariant
Figure 4 for MedM2G: Unifying Medical Multi-Modal Generation via Cross-Guided Diffusion with Visual Invariant
Viaarxiv icon

SeqTrack3D: Exploring Sequence Information for Robust 3D Point Cloud Tracking

Add code
Feb 26, 2024
Figure 1 for SeqTrack3D: Exploring Sequence Information for Robust 3D Point Cloud Tracking
Figure 2 for SeqTrack3D: Exploring Sequence Information for Robust 3D Point Cloud Tracking
Figure 3 for SeqTrack3D: Exploring Sequence Information for Robust 3D Point Cloud Tracking
Figure 4 for SeqTrack3D: Exploring Sequence Information for Robust 3D Point Cloud Tracking
Viaarxiv icon

UniDCP: Unifying Multiple Medical Vision-language Tasks via Dynamic Cross-modal Learnable Prompts

Add code
Dec 18, 2023
Figure 1 for UniDCP: Unifying Multiple Medical Vision-language Tasks via Dynamic Cross-modal Learnable Prompts
Figure 2 for UniDCP: Unifying Multiple Medical Vision-language Tasks via Dynamic Cross-modal Learnable Prompts
Figure 3 for UniDCP: Unifying Multiple Medical Vision-language Tasks via Dynamic Cross-modal Learnable Prompts
Figure 4 for UniDCP: Unifying Multiple Medical Vision-language Tasks via Dynamic Cross-modal Learnable Prompts
Viaarxiv icon

Double-Flow-based Steganography without Embedding for Image-to-Image Hiding

Add code
Nov 25, 2023
Figure 1 for Double-Flow-based Steganography without Embedding for Image-to-Image Hiding
Figure 2 for Double-Flow-based Steganography without Embedding for Image-to-Image Hiding
Figure 3 for Double-Flow-based Steganography without Embedding for Image-to-Image Hiding
Figure 4 for Double-Flow-based Steganography without Embedding for Image-to-Image Hiding
Viaarxiv icon

PrivateLoRA For Efficient Privacy Preserving LLM

Add code
Nov 23, 2023
Figure 1 for PrivateLoRA For Efficient Privacy Preserving LLM
Figure 2 for PrivateLoRA For Efficient Privacy Preserving LLM
Figure 3 for PrivateLoRA For Efficient Privacy Preserving LLM
Figure 4 for PrivateLoRA For Efficient Privacy Preserving LLM
Viaarxiv icon

MultiLoRA: Democratizing LoRA for Better Multi-Task Learning

Add code
Nov 20, 2023
Figure 1 for MultiLoRA: Democratizing LoRA for Better Multi-Task Learning
Figure 2 for MultiLoRA: Democratizing LoRA for Better Multi-Task Learning
Figure 3 for MultiLoRA: Democratizing LoRA for Better Multi-Task Learning
Figure 4 for MultiLoRA: Democratizing LoRA for Better Multi-Task Learning
Viaarxiv icon

An LSTM-Based Predictive Monitoring Method for Data with Time-varying Variability

Add code
Sep 05, 2023
Figure 1 for An LSTM-Based Predictive Monitoring Method for Data with Time-varying Variability
Figure 2 for An LSTM-Based Predictive Monitoring Method for Data with Time-varying Variability
Figure 3 for An LSTM-Based Predictive Monitoring Method for Data with Time-varying Variability
Figure 4 for An LSTM-Based Predictive Monitoring Method for Data with Time-varying Variability
Viaarxiv icon

Motion-to-Matching: A Mixed Paradigm for 3D Single Object Tracking

Add code
Aug 23, 2023
Figure 1 for Motion-to-Matching: A Mixed Paradigm for 3D Single Object Tracking
Figure 2 for Motion-to-Matching: A Mixed Paradigm for 3D Single Object Tracking
Figure 3 for Motion-to-Matching: A Mixed Paradigm for 3D Single Object Tracking
Figure 4 for Motion-to-Matching: A Mixed Paradigm for 3D Single Object Tracking
Viaarxiv icon

Controllable Fake Document Infilling for Cyber Deception

Add code
Oct 18, 2022
Figure 1 for Controllable Fake Document Infilling for Cyber Deception
Figure 2 for Controllable Fake Document Infilling for Cyber Deception
Figure 3 for Controllable Fake Document Infilling for Cyber Deception
Figure 4 for Controllable Fake Document Infilling for Cyber Deception
Viaarxiv icon

DBE-KT22: A Knowledge Tracing Dataset Based on Online Student Evaluation

Add code
Aug 19, 2022
Figure 1 for DBE-KT22: A Knowledge Tracing Dataset Based on Online Student Evaluation
Figure 2 for DBE-KT22: A Knowledge Tracing Dataset Based on Online Student Evaluation
Figure 3 for DBE-KT22: A Knowledge Tracing Dataset Based on Online Student Evaluation
Figure 4 for DBE-KT22: A Knowledge Tracing Dataset Based on Online Student Evaluation
Viaarxiv icon