Picture for Chenchen Zhao

Chenchen Zhao

Multichannel consecutive data cross-extraction with 1DCNN-attention for diagnosis of power transformer

Add code
Oct 11, 2023
Viaarxiv icon

DiffGuard: Semantic Mismatch-Guided Out-of-Distribution Detection using Pre-trained Diffusion Models

Add code
Aug 16, 2023
Viaarxiv icon

HumanSD: A Native Skeleton-Guided Diffusion Model for Human Image Generation

Add code
Apr 09, 2023
Viaarxiv icon

Blurring Fools the Network -- Adversarial Attacks by Feature Peak Suppression and Gaussian Blurring

Add code
Dec 21, 2020
Figure 1 for Blurring Fools the Network -- Adversarial Attacks by Feature Peak Suppression and Gaussian Blurring
Figure 2 for Blurring Fools the Network -- Adversarial Attacks by Feature Peak Suppression and Gaussian Blurring
Figure 3 for Blurring Fools the Network -- Adversarial Attacks by Feature Peak Suppression and Gaussian Blurring
Figure 4 for Blurring Fools the Network -- Adversarial Attacks by Feature Peak Suppression and Gaussian Blurring
Viaarxiv icon

Amplifying the Anterior-Posterior Difference via Data Enhancement -- A More Robust Deep Monocular Orientation Estimation Solution

Add code
Dec 21, 2020
Figure 1 for Amplifying the Anterior-Posterior Difference via Data Enhancement -- A More Robust Deep Monocular Orientation Estimation Solution
Figure 2 for Amplifying the Anterior-Posterior Difference via Data Enhancement -- A More Robust Deep Monocular Orientation Estimation Solution
Figure 3 for Amplifying the Anterior-Posterior Difference via Data Enhancement -- A More Robust Deep Monocular Orientation Estimation Solution
Figure 4 for Amplifying the Anterior-Posterior Difference via Data Enhancement -- A More Robust Deep Monocular Orientation Estimation Solution
Viaarxiv icon

Exploiting Vulnerability of Pooling in Convolutional Neural Networks by Strict Layer-Output Manipulation for Adversarial Attacks

Add code
Dec 21, 2020
Figure 1 for Exploiting Vulnerability of Pooling in Convolutional Neural Networks by Strict Layer-Output Manipulation for Adversarial Attacks
Figure 2 for Exploiting Vulnerability of Pooling in Convolutional Neural Networks by Strict Layer-Output Manipulation for Adversarial Attacks
Figure 3 for Exploiting Vulnerability of Pooling in Convolutional Neural Networks by Strict Layer-Output Manipulation for Adversarial Attacks
Figure 4 for Exploiting Vulnerability of Pooling in Convolutional Neural Networks by Strict Layer-Output Manipulation for Adversarial Attacks
Viaarxiv icon

Monocular Pedestrian Orientation Estimation Based on Deep 2D-3D Feedforward

Add code
Sep 24, 2019
Figure 1 for Monocular Pedestrian Orientation Estimation Based on Deep 2D-3D Feedforward
Figure 2 for Monocular Pedestrian Orientation Estimation Based on Deep 2D-3D Feedforward
Figure 3 for Monocular Pedestrian Orientation Estimation Based on Deep 2D-3D Feedforward
Figure 4 for Monocular Pedestrian Orientation Estimation Based on Deep 2D-3D Feedforward
Viaarxiv icon