Alert button
Picture for Yu Lin

Yu Lin

Alert button

MedM2G: Unifying Medical Multi-Modal Generation via Cross-Guided Diffusion with Visual Invariant

Add code
Bookmark button
Alert button
Mar 07, 2024
Chenlu Zhan, Yu Lin, Gaoang Wang, Hongwei Wang, Jian Wu

Figure 1 for MedM2G: Unifying Medical Multi-Modal Generation via Cross-Guided Diffusion with Visual Invariant
Figure 2 for MedM2G: Unifying Medical Multi-Modal Generation via Cross-Guided Diffusion with Visual Invariant
Figure 3 for MedM2G: Unifying Medical Multi-Modal Generation via Cross-Guided Diffusion with Visual Invariant
Figure 4 for MedM2G: Unifying Medical Multi-Modal Generation via Cross-Guided Diffusion with Visual Invariant
Viaarxiv icon

SeqTrack3D: Exploring Sequence Information for Robust 3D Point Cloud Tracking

Add code
Bookmark button
Alert button
Feb 26, 2024
Yu Lin, Zhiheng Li, Yubo Cui, Zheng Fang

Viaarxiv icon

UniDCP: Unifying Multiple Medical Vision-language Tasks via Dynamic Cross-modal Learnable Prompts

Add code
Bookmark button
Alert button
Dec 18, 2023
Chenlu Zhan, Yufei Zhang, Yu Lin, Gaoang Wang, Hongwei Wang

Viaarxiv icon

Double-Flow-based Steganography without Embedding for Image-to-Image Hiding

Add code
Bookmark button
Alert button
Nov 25, 2023
Bingbing Song, Derui Wang, Tianwei Zhang, Renyang Liu, Yu Lin, Wei Zhou

Figure 1 for Double-Flow-based Steganography without Embedding for Image-to-Image Hiding
Figure 2 for Double-Flow-based Steganography without Embedding for Image-to-Image Hiding
Figure 3 for Double-Flow-based Steganography without Embedding for Image-to-Image Hiding
Figure 4 for Double-Flow-based Steganography without Embedding for Image-to-Image Hiding
Viaarxiv icon

PrivateLoRA For Efficient Privacy Preserving LLM

Add code
Bookmark button
Alert button
Nov 23, 2023
Yiming Wang, Yu Lin, Xiaodong Zeng, Guannan Zhang

Figure 1 for PrivateLoRA For Efficient Privacy Preserving LLM
Figure 2 for PrivateLoRA For Efficient Privacy Preserving LLM
Figure 3 for PrivateLoRA For Efficient Privacy Preserving LLM
Figure 4 for PrivateLoRA For Efficient Privacy Preserving LLM
Viaarxiv icon

MultiLoRA: Democratizing LoRA for Better Multi-Task Learning

Add code
Bookmark button
Alert button
Nov 20, 2023
Yiming Wang, Yu Lin, Xiaodong Zeng, Guannan Zhang

Figure 1 for MultiLoRA: Democratizing LoRA for Better Multi-Task Learning
Figure 2 for MultiLoRA: Democratizing LoRA for Better Multi-Task Learning
Figure 3 for MultiLoRA: Democratizing LoRA for Better Multi-Task Learning
Figure 4 for MultiLoRA: Democratizing LoRA for Better Multi-Task Learning
Viaarxiv icon

An LSTM-Based Predictive Monitoring Method for Data with Time-varying Variability

Add code
Bookmark button
Alert button
Sep 05, 2023
Jiaqi Qiu, Yu Lin, Inez Zwetsloot

Figure 1 for An LSTM-Based Predictive Monitoring Method for Data with Time-varying Variability
Figure 2 for An LSTM-Based Predictive Monitoring Method for Data with Time-varying Variability
Figure 3 for An LSTM-Based Predictive Monitoring Method for Data with Time-varying Variability
Figure 4 for An LSTM-Based Predictive Monitoring Method for Data with Time-varying Variability
Viaarxiv icon

Motion-to-Matching: A Mixed Paradigm for 3D Single Object Tracking

Add code
Bookmark button
Alert button
Aug 23, 2023
Zhiheng Li, Yu Lin, Yubo Cui, Shuo Li, Zheng Fang

Figure 1 for Motion-to-Matching: A Mixed Paradigm for 3D Single Object Tracking
Figure 2 for Motion-to-Matching: A Mixed Paradigm for 3D Single Object Tracking
Figure 3 for Motion-to-Matching: A Mixed Paradigm for 3D Single Object Tracking
Figure 4 for Motion-to-Matching: A Mixed Paradigm for 3D Single Object Tracking
Viaarxiv icon

Controllable Fake Document Infilling for Cyber Deception

Add code
Bookmark button
Alert button
Oct 18, 2022
Yibo Hu, Yu Lin, Erick Skorupa Parolin, Latifur Khan, Kevin Hamlen

Figure 1 for Controllable Fake Document Infilling for Cyber Deception
Figure 2 for Controllable Fake Document Infilling for Cyber Deception
Figure 3 for Controllable Fake Document Infilling for Cyber Deception
Figure 4 for Controllable Fake Document Infilling for Cyber Deception
Viaarxiv icon

DBE-KT22: A Knowledge Tracing Dataset Based on Online Student Evaluation

Add code
Bookmark button
Alert button
Aug 19, 2022
Ghodai Abdelrahman, Sherif Abdelfattah, Qing Wang, Yu Lin

Figure 1 for DBE-KT22: A Knowledge Tracing Dataset Based on Online Student Evaluation
Figure 2 for DBE-KT22: A Knowledge Tracing Dataset Based on Online Student Evaluation
Figure 3 for DBE-KT22: A Knowledge Tracing Dataset Based on Online Student Evaluation
Figure 4 for DBE-KT22: A Knowledge Tracing Dataset Based on Online Student Evaluation
Viaarxiv icon