Alert button
Picture for Zhichao Huang

Zhichao Huang

Alert button

EDDA: A Encoder-Decoder Data Augmentation Framework for Zero-Shot Stance Detection

Add code
Bookmark button
Alert button
Mar 23, 2024
Daijun Ding, Li Dong, Zhichao Huang, Guangning Xu, Xu Huang, Bo Liu, Liwen Jing, Bowen Zhang

Viaarxiv icon

Speech Translation with Large Language Models: An Industrial Practice

Add code
Bookmark button
Alert button
Dec 21, 2023
Zhichao Huang, Rong Ye, Tom Ko, Qianqian Dong, Shanbo Cheng, Mingxuan Wang, Hang Li

Viaarxiv icon

RepCodec: A Speech Representation Codec for Speech Tokenization

Add code
Bookmark button
Alert button
Aug 31, 2023
Zhichao Huang, Chutong Meng, Tom Ko

Figure 1 for RepCodec: A Speech Representation Codec for Speech Tokenization
Figure 2 for RepCodec: A Speech Representation Codec for Speech Tokenization
Figure 3 for RepCodec: A Speech Representation Codec for Speech Tokenization
Figure 4 for RepCodec: A Speech Representation Codec for Speech Tokenization
Viaarxiv icon

Fast Adversarial Training with Adaptive Step Size

Add code
Bookmark button
Alert button
Jun 06, 2022
Zhichao Huang, Yanbo Fan, Chen Liu, Weizhong Zhang, Yong Zhang, Mathieu Salzmann, Sabine Süsstrunk, Jue Wang

Figure 1 for Fast Adversarial Training with Adaptive Step Size
Figure 2 for Fast Adversarial Training with Adaptive Step Size
Figure 3 for Fast Adversarial Training with Adaptive Step Size
Figure 4 for Fast Adversarial Training with Adaptive Step Size
Viaarxiv icon

Black-box Prompt Learning for Pre-trained Language Models

Add code
Bookmark button
Alert button
Jan 21, 2022
Shizhe Diao, Xuechun Li, Yong Lin, Zhichao Huang, Tong Zhang

Figure 1 for Black-box Prompt Learning for Pre-trained Language Models
Figure 2 for Black-box Prompt Learning for Pre-trained Language Models
Figure 3 for Black-box Prompt Learning for Pre-trained Language Models
Figure 4 for Black-box Prompt Learning for Pre-trained Language Models
Viaarxiv icon

On the Impact of Hard Adversarial Instances on Overfitting in Adversarial Training

Add code
Bookmark button
Alert button
Dec 14, 2021
Chen Liu, Zhichao Huang, Mathieu Salzmann, Tong Zhang, Sabine Süsstrunk

Figure 1 for On the Impact of Hard Adversarial Instances on Overfitting in Adversarial Training
Figure 2 for On the Impact of Hard Adversarial Instances on Overfitting in Adversarial Training
Figure 3 for On the Impact of Hard Adversarial Instances on Overfitting in Adversarial Training
Figure 4 for On the Impact of Hard Adversarial Instances on Overfitting in Adversarial Training
Viaarxiv icon

Few-Shot Human Motion Transfer by Personalized Geometry and Texture Modeling

Add code
Bookmark button
Alert button
Mar 26, 2021
Zhichao Huang, Xintong Han, Jia Xu, Tong Zhang

Figure 1 for Few-Shot Human Motion Transfer by Personalized Geometry and Texture Modeling
Figure 2 for Few-Shot Human Motion Transfer by Personalized Geometry and Texture Modeling
Figure 3 for Few-Shot Human Motion Transfer by Personalized Geometry and Texture Modeling
Figure 4 for Few-Shot Human Motion Transfer by Personalized Geometry and Texture Modeling
Viaarxiv icon

CorrAttack: Black-box Adversarial Attack with Structured Search

Add code
Bookmark button
Alert button
Oct 03, 2020
Zhichao Huang, Yaowei Huang, Tong Zhang

Figure 1 for CorrAttack: Black-box Adversarial Attack with Structured Search
Figure 2 for CorrAttack: Black-box Adversarial Attack with Structured Search
Figure 3 for CorrAttack: Black-box Adversarial Attack with Structured Search
Figure 4 for CorrAttack: Black-box Adversarial Attack with Structured Search
Viaarxiv icon

Prototype Completion with Primitive Knowledge for Few-Shot Learning

Add code
Bookmark button
Alert button
Sep 12, 2020
Baoquan Zhang, Xutao Li, Yunming Ye, Zhichao Huang, Lisai Zhang

Figure 1 for Prototype Completion with Primitive Knowledge for Few-Shot Learning
Figure 2 for Prototype Completion with Primitive Knowledge for Few-Shot Learning
Figure 3 for Prototype Completion with Primitive Knowledge for Few-Shot Learning
Figure 4 for Prototype Completion with Primitive Knowledge for Few-Shot Learning
Viaarxiv icon

Black-Box Adversarial Attack with Transferable Model-based Embedding

Add code
Bookmark button
Alert button
Nov 17, 2019
Zhichao Huang, Tong Zhang

Figure 1 for Black-Box Adversarial Attack with Transferable Model-based Embedding
Figure 2 for Black-Box Adversarial Attack with Transferable Model-based Embedding
Figure 3 for Black-Box Adversarial Attack with Transferable Model-based Embedding
Figure 4 for Black-Box Adversarial Attack with Transferable Model-based Embedding
Viaarxiv icon