Alert button
Picture for Zhaoyan Ming

Zhaoyan Ming

Alert button

Skeleton-Guided Instance Separation for Fine-Grained Segmentation in Microscopy

Add code
Bookmark button
Alert button
Jan 19, 2024
Jun Wang, Chengfeng Zhou, Zhaoyan Ming, Lina Wei, Xudong Jiang, Dahong Qian

Viaarxiv icon

CatchBackdoor: Backdoor Testing by Critical Trojan Neural Path Identification via Differential Fuzzing

Add code
Bookmark button
Alert button
Dec 24, 2021
Haibo Jin, Ruoxi Chen, Jinyin Chen, Yao Cheng, Chong Fu, Ting Wang, Yue Yu, Zhaoyan Ming

Figure 1 for CatchBackdoor: Backdoor Testing by Critical Trojan Neural Path Identification via Differential Fuzzing
Figure 2 for CatchBackdoor: Backdoor Testing by Critical Trojan Neural Path Identification via Differential Fuzzing
Figure 3 for CatchBackdoor: Backdoor Testing by Critical Trojan Neural Path Identification via Differential Fuzzing
Figure 4 for CatchBackdoor: Backdoor Testing by Critical Trojan Neural Path Identification via Differential Fuzzing
Viaarxiv icon

FDA-GAN: Flow-based Dual Attention GAN for Human Pose Transfer

Add code
Bookmark button
Alert button
Dec 01, 2021
Liyuan Ma, Kejie Huang, Dongxu Wei, Zhaoyan Ming, Haibin Shen

Figure 1 for FDA-GAN: Flow-based Dual Attention GAN for Human Pose Transfer
Figure 2 for FDA-GAN: Flow-based Dual Attention GAN for Human Pose Transfer
Figure 3 for FDA-GAN: Flow-based Dual Attention GAN for Human Pose Transfer
Figure 4 for FDA-GAN: Flow-based Dual Attention GAN for Human Pose Transfer
Viaarxiv icon

EGC2: Enhanced Graph Classification with Easy Graph Compression

Add code
Bookmark button
Alert button
Jul 16, 2021
Jinyin Chen, Dunjie Zhang, Zhaoyan Ming, Mingwei Jia, Yi Liu

Figure 1 for EGC2: Enhanced Graph Classification with Easy Graph Compression
Figure 2 for EGC2: Enhanced Graph Classification with Easy Graph Compression
Figure 3 for EGC2: Enhanced Graph Classification with Easy Graph Compression
Figure 4 for EGC2: Enhanced Graph Classification with Easy Graph Compression
Viaarxiv icon

Salient Feature Extractor for Adversarial Defense on Deep Neural Networks

Add code
Bookmark button
Alert button
May 14, 2021
Jinyin Chen, Ruoxi Chen, Haibin Zheng, Zhaoyan Ming, Wenrong Jiang, Chen Cui

Figure 1 for Salient Feature Extractor for Adversarial Defense on Deep Neural Networks
Figure 2 for Salient Feature Extractor for Adversarial Defense on Deep Neural Networks
Figure 3 for Salient Feature Extractor for Adversarial Defense on Deep Neural Networks
Figure 4 for Salient Feature Extractor for Adversarial Defense on Deep Neural Networks
Viaarxiv icon

MASS: Multi-task Anthropomorphic Speech Synthesis Framework

Add code
Bookmark button
Alert button
May 10, 2021
Jinyin Chen, Linhui Ye, Zhaoyan Ming

Figure 1 for MASS: Multi-task Anthropomorphic Speech Synthesis Framework
Figure 2 for MASS: Multi-task Anthropomorphic Speech Synthesis Framework
Figure 3 for MASS: Multi-task Anthropomorphic Speech Synthesis Framework
Figure 4 for MASS: Multi-task Anthropomorphic Speech Synthesis Framework
Viaarxiv icon

GraphAttacker: A General Multi-Task GraphAttack Framework

Add code
Bookmark button
Alert button
Jan 18, 2021
Jinyin Chen, Dunjie Zhang, Zhaoyan Ming, Kejie Huang

Figure 1 for GraphAttacker: A General Multi-Task GraphAttack Framework
Figure 2 for GraphAttacker: A General Multi-Task GraphAttack Framework
Figure 3 for GraphAttacker: A General Multi-Task GraphAttack Framework
Figure 4 for GraphAttacker: A General Multi-Task GraphAttack Framework
Viaarxiv icon

DeepPoison: Feature Transfer Based Stealthy Poisoning Attack

Add code
Bookmark button
Alert button
Jan 08, 2021
Jinyin Chen, Longyuan Zhang, Haibin Zheng, Xueke Wang, Zhaoyan Ming

Figure 1 for DeepPoison: Feature Transfer Based Stealthy Poisoning Attack
Figure 2 for DeepPoison: Feature Transfer Based Stealthy Poisoning Attack
Figure 3 for DeepPoison: Feature Transfer Based Stealthy Poisoning Attack
Figure 4 for DeepPoison: Feature Transfer Based Stealthy Poisoning Attack
Viaarxiv icon

ROBY: Evaluating the Robustness of a Deep Model by its Decision Boundaries

Add code
Bookmark button
Alert button
Dec 18, 2020
Jinyin Chen, Zhen Wang, Haibin Zheng, Jun Xiao, Zhaoyan Ming

Figure 1 for ROBY: Evaluating the Robustness of a Deep Model by its Decision Boundaries
Figure 2 for ROBY: Evaluating the Robustness of a Deep Model by its Decision Boundaries
Figure 3 for ROBY: Evaluating the Robustness of a Deep Model by its Decision Boundaries
Figure 4 for ROBY: Evaluating the Robustness of a Deep Model by its Decision Boundaries
Viaarxiv icon