Picture for Chai Kiat Yeo

Chai Kiat Yeo

QuadBEV: An Efficient Quadruple-Task Perception Framework via Bird's-Eye-View Representation

Add code
Oct 09, 2024
Figure 1 for QuadBEV: An Efficient Quadruple-Task Perception Framework via Bird's-Eye-View Representation
Figure 2 for QuadBEV: An Efficient Quadruple-Task Perception Framework via Bird's-Eye-View Representation
Figure 3 for QuadBEV: An Efficient Quadruple-Task Perception Framework via Bird's-Eye-View Representation
Figure 4 for QuadBEV: An Efficient Quadruple-Task Perception Framework via Bird's-Eye-View Representation
Viaarxiv icon

Learning Content-Aware Multi-Modal Joint Input Pruning via Bird's-Eye-View Representation

Add code
Oct 09, 2024
Figure 1 for Learning Content-Aware Multi-Modal Joint Input Pruning via Bird's-Eye-View Representation
Figure 2 for Learning Content-Aware Multi-Modal Joint Input Pruning via Bird's-Eye-View Representation
Figure 3 for Learning Content-Aware Multi-Modal Joint Input Pruning via Bird's-Eye-View Representation
Figure 4 for Learning Content-Aware Multi-Modal Joint Input Pruning via Bird's-Eye-View Representation
Viaarxiv icon

Transferability of Representations Learned using Supervised Contrastive Learning Trained on a Multi-Domain Dataset

Add code
Sep 27, 2023
Viaarxiv icon

DeformToon3D: Deformable 3D Toonification from Neural Radiance Fields

Add code
Sep 08, 2023
Viaarxiv icon

Abductive Action Inference

Add code
Oct 24, 2022
Viaarxiv icon

Monocular 3D Object Reconstruction with GAN Inversion

Add code
Jul 20, 2022
Figure 1 for Monocular 3D Object Reconstruction with GAN Inversion
Figure 2 for Monocular 3D Object Reconstruction with GAN Inversion
Figure 3 for Monocular 3D Object Reconstruction with GAN Inversion
Figure 4 for Monocular 3D Object Reconstruction with GAN Inversion
Viaarxiv icon

NSGZero: Efficiently Learning Non-Exploitable Policy in Large-Scale Network Security Games with Neural Monte Carlo Tree Search

Add code
Jan 17, 2022
Figure 1 for NSGZero: Efficiently Learning Non-Exploitable Policy in Large-Scale Network Security Games with Neural Monte Carlo Tree Search
Figure 2 for NSGZero: Efficiently Learning Non-Exploitable Policy in Large-Scale Network Security Games with Neural Monte Carlo Tree Search
Figure 3 for NSGZero: Efficiently Learning Non-Exploitable Policy in Large-Scale Network Security Games with Neural Monte Carlo Tree Search
Figure 4 for NSGZero: Efficiently Learning Non-Exploitable Policy in Large-Scale Network Security Games with Neural Monte Carlo Tree Search
Viaarxiv icon

Mis-spoke or mis-lead: Achieving Robustness in Multi-Agent Communicative Reinforcement Learning

Add code
Aug 09, 2021
Figure 1 for Mis-spoke or mis-lead: Achieving Robustness in Multi-Agent Communicative Reinforcement Learning
Figure 2 for Mis-spoke or mis-lead: Achieving Robustness in Multi-Agent Communicative Reinforcement Learning
Figure 3 for Mis-spoke or mis-lead: Achieving Robustness in Multi-Agent Communicative Reinforcement Learning
Figure 4 for Mis-spoke or mis-lead: Achieving Robustness in Multi-Agent Communicative Reinforcement Learning
Viaarxiv icon

Solving Large-Scale Extensive-Form Network Security Games via Neural Fictitious Self-Play

Add code
Jun 02, 2021
Figure 1 for Solving Large-Scale Extensive-Form Network Security Games via Neural Fictitious Self-Play
Figure 2 for Solving Large-Scale Extensive-Form Network Security Games via Neural Fictitious Self-Play
Figure 3 for Solving Large-Scale Extensive-Form Network Security Games via Neural Fictitious Self-Play
Figure 4 for Solving Large-Scale Extensive-Form Network Security Games via Neural Fictitious Self-Play
Viaarxiv icon

Unsupervised 3D Shape Completion through GAN Inversion

Add code
Apr 29, 2021
Figure 1 for Unsupervised 3D Shape Completion through GAN Inversion
Figure 2 for Unsupervised 3D Shape Completion through GAN Inversion
Figure 3 for Unsupervised 3D Shape Completion through GAN Inversion
Figure 4 for Unsupervised 3D Shape Completion through GAN Inversion
Viaarxiv icon