Picture for Chee Seng Chan

Chee Seng Chan

Yuan: Yielding Unblemished Aesthetics Through A Unified Network for Visual Imperfections Removal in Generated Images

Add code
Jan 15, 2025
Viaarxiv icon

Chirpy3D: Continuous Part Latents for Creative 3D Bird Generation

Add code
Jan 07, 2025
Viaarxiv icon

Protégé: Learn and Generate Basic Makeup Styles with Generative Adversarial Networks (GANs)

Add code
Dec 29, 2024
Viaarxiv icon

A few-shot Label Unlearning in Vertical Federated Learning

Add code
Oct 14, 2024
Viaarxiv icon

Ferrari: Federated Feature Unlearning via Optimizing Feature Sensitivity

Add code
May 29, 2024
Viaarxiv icon

Text in the Dark: Extremely Low-Light Text Image Enhancement

Add code
Apr 22, 2024
Figure 1 for Text in the Dark: Extremely Low-Light Text Image Enhancement
Figure 2 for Text in the Dark: Extremely Low-Light Text Image Enhancement
Figure 3 for Text in the Dark: Extremely Low-Light Text Image Enhancement
Figure 4 for Text in the Dark: Extremely Low-Light Text Image Enhancement
Viaarxiv icon

Gorgeous: Create Your Desired Character Facial Makeup from Any Ideas

Add code
Apr 22, 2024
Figure 1 for Gorgeous: Create Your Desired Character Facial Makeup from Any Ideas
Figure 2 for Gorgeous: Create Your Desired Character Facial Makeup from Any Ideas
Figure 3 for Gorgeous: Create Your Desired Character Facial Makeup from Any Ideas
Figure 4 for Gorgeous: Create Your Desired Character Facial Makeup from Any Ideas
Viaarxiv icon

IPR-NeRF: Ownership Verification meets Neural Radiance Field

Add code
Jan 23, 2024
Viaarxiv icon

InteractDiffusion: Interaction Control in Text-to-Image Diffusion Models

Add code
Dec 10, 2023
Figure 1 for InteractDiffusion: Interaction Control in Text-to-Image Diffusion Models
Figure 2 for InteractDiffusion: Interaction Control in Text-to-Image Diffusion Models
Figure 3 for InteractDiffusion: Interaction Control in Text-to-Image Diffusion Models
Figure 4 for InteractDiffusion: Interaction Control in Text-to-Image Diffusion Models
Viaarxiv icon

Everyone Can Attack: Repurpose Lossy Compression as a Natural Backdoor Attack

Add code
Sep 03, 2023
Viaarxiv icon