Alert button
Picture for Ziqi Zhang

Ziqi Zhang

Alert button

Channel-wise Topology Refinement Graph Convolution for Skeleton-Based Action Recognition

Aug 23, 2021
Yuxin Chen, Ziqi Zhang, Chunfeng Yuan, Bing Li, Ying Deng, Weiming Hu

Figure 1 for Channel-wise Topology Refinement Graph Convolution for Skeleton-Based Action Recognition
Figure 2 for Channel-wise Topology Refinement Graph Convolution for Skeleton-Based Action Recognition
Figure 3 for Channel-wise Topology Refinement Graph Convolution for Skeleton-Based Action Recognition
Figure 4 for Channel-wise Topology Refinement Graph Convolution for Skeleton-Based Action Recognition
Viaarxiv icon

ModelDiff: Testing-Based DNN Similarity Comparison for Model Reuse Detection

Jun 11, 2021
Yuanchun Li, Ziqi Zhang, Bingyan Liu, Ziyue Yang, Yunxin Liu

Figure 1 for ModelDiff: Testing-Based DNN Similarity Comparison for Model Reuse Detection
Figure 2 for ModelDiff: Testing-Based DNN Similarity Comparison for Model Reuse Detection
Figure 3 for ModelDiff: Testing-Based DNN Similarity Comparison for Model Reuse Detection
Figure 4 for ModelDiff: Testing-Based DNN Similarity Comparison for Model Reuse Detection
Viaarxiv icon

PDNet: Towards Better One-stage Object Detection with Prediction Decoupling

Apr 28, 2021
Li Yang, Yan Xu, Shaoru Wang, Chunfeng Yuan, Ziqi Zhang, Bing Li, Weiming Hu

Figure 1 for PDNet: Towards Better One-stage Object Detection with Prediction Decoupling
Figure 2 for PDNet: Towards Better One-stage Object Detection with Prediction Decoupling
Figure 3 for PDNet: Towards Better One-stage Object Detection with Prediction Decoupling
Figure 4 for PDNet: Towards Better One-stage Object Detection with Prediction Decoupling
Viaarxiv icon

Blending Knowledge in Deep Recurrent Networks for Adverse Event Prediction at Hospital Discharge

Apr 09, 2021
Prithwish Chakraborty, James Codella, Piyush Madan, Ying Li, Hu Huang, Yoonyoung Park, Chao Yan, Ziqi Zhang, Cheng Gao, Steve Nyemba, Xu Min, Sanjib Basak, Mohamed Ghalwash, Zach Shahn, Parthasararathy Suryanarayanan, Italo Buleje, Shannon Harrer, Sarah Miller, Amol Rajmane, Colin Walsh, Jonathan Wanderer, Gigi Yuen Reed, Kenney Ng, Daby Sow, Bradley A. Malin

Figure 1 for Blending Knowledge in Deep Recurrent Networks for Adverse Event Prediction at Hospital Discharge
Figure 2 for Blending Knowledge in Deep Recurrent Networks for Adverse Event Prediction at Hospital Discharge
Figure 3 for Blending Knowledge in Deep Recurrent Networks for Adverse Event Prediction at Hospital Discharge
Figure 4 for Blending Knowledge in Deep Recurrent Networks for Adverse Event Prediction at Hospital Discharge
Viaarxiv icon

Open-book Video Captioning with Retrieve-Copy-Generate Network

Mar 09, 2021
Ziqi Zhang, Zhongang Qi, Chunfeng Yuan, Ying Shan, Bing Li, Ying Deng, Weiming Hu

Figure 1 for Open-book Video Captioning with Retrieve-Copy-Generate Network
Figure 2 for Open-book Video Captioning with Retrieve-Copy-Generate Network
Figure 3 for Open-book Video Captioning with Retrieve-Copy-Generate Network
Figure 4 for Open-book Video Captioning with Retrieve-Copy-Generate Network
Viaarxiv icon

A generalized model for data science

Nov 02, 2020
Ziqi Zhang, Chuanxu Zhao

Figure 1 for A generalized model for data science
Figure 2 for A generalized model for data science
Figure 3 for A generalized model for data science
Figure 4 for A generalized model for data science
Viaarxiv icon

Backdoor Attack against Speaker Verification

Oct 25, 2020
Tongqing Zhai, Yiming Li, Ziqi Zhang, Baoyuan Wu, Yong Jiang, Shu-Tao Xia

Figure 1 for Backdoor Attack against Speaker Verification
Figure 2 for Backdoor Attack against Speaker Verification
Figure 3 for Backdoor Attack against Speaker Verification
Viaarxiv icon

Open-sourced Dataset Protection via Backdoor Watermarking

Oct 12, 2020
Yiming Li, Ziqi Zhang, Jiawang Bai, Baoyuan Wu, Yong Jiang, Shu-Tao Xia

Figure 1 for Open-sourced Dataset Protection via Backdoor Watermarking
Figure 2 for Open-sourced Dataset Protection via Backdoor Watermarking
Figure 3 for Open-sourced Dataset Protection via Backdoor Watermarking
Figure 4 for Open-sourced Dataset Protection via Backdoor Watermarking
Viaarxiv icon