Picture for Zhaoyan Ming

Zhaoyan Ming

Skeleton-Guided Instance Separation for Fine-Grained Segmentation in Microscopy

Add code
Jan 19, 2024
Viaarxiv icon

CatchBackdoor: Backdoor Testing by Critical Trojan Neural Path Identification via Differential Fuzzing

Add code
Dec 24, 2021
Figure 1 for CatchBackdoor: Backdoor Testing by Critical Trojan Neural Path Identification via Differential Fuzzing
Figure 2 for CatchBackdoor: Backdoor Testing by Critical Trojan Neural Path Identification via Differential Fuzzing
Figure 3 for CatchBackdoor: Backdoor Testing by Critical Trojan Neural Path Identification via Differential Fuzzing
Figure 4 for CatchBackdoor: Backdoor Testing by Critical Trojan Neural Path Identification via Differential Fuzzing
Viaarxiv icon

FDA-GAN: Flow-based Dual Attention GAN for Human Pose Transfer

Add code
Dec 01, 2021
Figure 1 for FDA-GAN: Flow-based Dual Attention GAN for Human Pose Transfer
Figure 2 for FDA-GAN: Flow-based Dual Attention GAN for Human Pose Transfer
Figure 3 for FDA-GAN: Flow-based Dual Attention GAN for Human Pose Transfer
Figure 4 for FDA-GAN: Flow-based Dual Attention GAN for Human Pose Transfer
Viaarxiv icon

EGC2: Enhanced Graph Classification with Easy Graph Compression

Add code
Jul 16, 2021
Figure 1 for EGC2: Enhanced Graph Classification with Easy Graph Compression
Figure 2 for EGC2: Enhanced Graph Classification with Easy Graph Compression
Figure 3 for EGC2: Enhanced Graph Classification with Easy Graph Compression
Figure 4 for EGC2: Enhanced Graph Classification with Easy Graph Compression
Viaarxiv icon

Salient Feature Extractor for Adversarial Defense on Deep Neural Networks

Add code
May 14, 2021
Figure 1 for Salient Feature Extractor for Adversarial Defense on Deep Neural Networks
Figure 2 for Salient Feature Extractor for Adversarial Defense on Deep Neural Networks
Figure 3 for Salient Feature Extractor for Adversarial Defense on Deep Neural Networks
Figure 4 for Salient Feature Extractor for Adversarial Defense on Deep Neural Networks
Viaarxiv icon

MASS: Multi-task Anthropomorphic Speech Synthesis Framework

Add code
May 10, 2021
Figure 1 for MASS: Multi-task Anthropomorphic Speech Synthesis Framework
Figure 2 for MASS: Multi-task Anthropomorphic Speech Synthesis Framework
Figure 3 for MASS: Multi-task Anthropomorphic Speech Synthesis Framework
Figure 4 for MASS: Multi-task Anthropomorphic Speech Synthesis Framework
Viaarxiv icon

GraphAttacker: A General Multi-Task GraphAttack Framework

Add code
Jan 18, 2021
Figure 1 for GraphAttacker: A General Multi-Task GraphAttack Framework
Figure 2 for GraphAttacker: A General Multi-Task GraphAttack Framework
Figure 3 for GraphAttacker: A General Multi-Task GraphAttack Framework
Figure 4 for GraphAttacker: A General Multi-Task GraphAttack Framework
Viaarxiv icon

DeepPoison: Feature Transfer Based Stealthy Poisoning Attack

Add code
Jan 08, 2021
Figure 1 for DeepPoison: Feature Transfer Based Stealthy Poisoning Attack
Figure 2 for DeepPoison: Feature Transfer Based Stealthy Poisoning Attack
Figure 3 for DeepPoison: Feature Transfer Based Stealthy Poisoning Attack
Figure 4 for DeepPoison: Feature Transfer Based Stealthy Poisoning Attack
Viaarxiv icon

ROBY: Evaluating the Robustness of a Deep Model by its Decision Boundaries

Add code
Dec 18, 2020
Figure 1 for ROBY: Evaluating the Robustness of a Deep Model by its Decision Boundaries
Figure 2 for ROBY: Evaluating the Robustness of a Deep Model by its Decision Boundaries
Figure 3 for ROBY: Evaluating the Robustness of a Deep Model by its Decision Boundaries
Figure 4 for ROBY: Evaluating the Robustness of a Deep Model by its Decision Boundaries
Viaarxiv icon