Picture for Yuanlong Yu

Yuanlong Yu

An Internal Covariate Shift Bounding Algorithm for Deep Neural Networks by Unitizing Layers' Outputs

Add code
Jan 09, 2020
Figure 1 for An Internal Covariate Shift Bounding Algorithm for Deep Neural Networks by Unitizing Layers' Outputs
Figure 2 for An Internal Covariate Shift Bounding Algorithm for Deep Neural Networks by Unitizing Layers' Outputs
Figure 3 for An Internal Covariate Shift Bounding Algorithm for Deep Neural Networks by Unitizing Layers' Outputs
Figure 4 for An Internal Covariate Shift Bounding Algorithm for Deep Neural Networks by Unitizing Layers' Outputs
Viaarxiv icon

Visualizing the Invisible: Occluded Vehicle Segmentation and Recovery

Add code
Jul 22, 2019
Figure 1 for Visualizing the Invisible: Occluded Vehicle Segmentation and Recovery
Figure 2 for Visualizing the Invisible: Occluded Vehicle Segmentation and Recovery
Figure 3 for Visualizing the Invisible: Occluded Vehicle Segmentation and Recovery
Figure 4 for Visualizing the Invisible: Occluded Vehicle Segmentation and Recovery
Viaarxiv icon

Enhancement Mask for Hippocampus Detection and Segmentation

Add code
Feb 12, 2019
Figure 1 for Enhancement Mask for Hippocampus Detection and Segmentation
Figure 2 for Enhancement Mask for Hippocampus Detection and Segmentation
Figure 3 for Enhancement Mask for Hippocampus Detection and Segmentation
Figure 4 for Enhancement Mask for Hippocampus Detection and Segmentation
Viaarxiv icon

Deformable Object Tracking with Gated Fusion

Add code
Sep 27, 2018
Figure 1 for Deformable Object Tracking with Gated Fusion
Figure 2 for Deformable Object Tracking with Gated Fusion
Figure 3 for Deformable Object Tracking with Gated Fusion
Figure 4 for Deformable Object Tracking with Gated Fusion
Viaarxiv icon

An Intelligent Extraversion Analysis Scheme from Crowd Trajectories for Surveillance

Add code
Sep 27, 2018
Figure 1 for An Intelligent Extraversion Analysis Scheme from Crowd Trajectories for Surveillance
Figure 2 for An Intelligent Extraversion Analysis Scheme from Crowd Trajectories for Surveillance
Figure 3 for An Intelligent Extraversion Analysis Scheme from Crowd Trajectories for Surveillance
Figure 4 for An Intelligent Extraversion Analysis Scheme from Crowd Trajectories for Surveillance
Viaarxiv icon