Picture for Zhiying Li

Zhiying Li

HieroAction: Hierarchically Guided VLM for Fine-Grained Action Analysis

Add code
Aug 23, 2025
Viaarxiv icon

Undress to Redress: A Training-Free Framework for Virtual Try-On

Add code
Aug 11, 2025
Viaarxiv icon

Black-box Adversaries from Latent Space: Unnoticeable Attacks on Human Pose and Shape Estimation

Add code
May 17, 2025
Figure 1 for Black-box Adversaries from Latent Space: Unnoticeable Attacks on Human Pose and Shape Estimation
Figure 2 for Black-box Adversaries from Latent Space: Unnoticeable Attacks on Human Pose and Shape Estimation
Figure 3 for Black-box Adversaries from Latent Space: Unnoticeable Attacks on Human Pose and Shape Estimation
Figure 4 for Black-box Adversaries from Latent Space: Unnoticeable Attacks on Human Pose and Shape Estimation
Viaarxiv icon

Unveiling Hidden Vulnerabilities in Digital Human Generation via Adversarial Attacks

Add code
Apr 24, 2025
Figure 1 for Unveiling Hidden Vulnerabilities in Digital Human Generation via Adversarial Attacks
Figure 2 for Unveiling Hidden Vulnerabilities in Digital Human Generation via Adversarial Attacks
Figure 3 for Unveiling Hidden Vulnerabilities in Digital Human Generation via Adversarial Attacks
Figure 4 for Unveiling Hidden Vulnerabilities in Digital Human Generation via Adversarial Attacks
Viaarxiv icon

Twin Trigger Generative Networks for Backdoor Attacks against Object Detection

Add code
Nov 23, 2024
Figure 1 for Twin Trigger Generative Networks for Backdoor Attacks against Object Detection
Figure 2 for Twin Trigger Generative Networks for Backdoor Attacks against Object Detection
Figure 3 for Twin Trigger Generative Networks for Backdoor Attacks against Object Detection
Figure 4 for Twin Trigger Generative Networks for Backdoor Attacks against Object Detection
Viaarxiv icon