Picture for Heng Li

Heng Li

HA-VLN: A Benchmark for Human-Aware Navigation in Discrete-Continuous Environments with Dynamic Multi-Human Interactions, Real-World Validation, and an Open Leaderboard

Add code
Mar 18, 2025
Viaarxiv icon

OG-Gaussian: Occupancy Based Street Gaussians for Autonomous Driving

Add code
Feb 20, 2025
Viaarxiv icon

MaxSup: Overcoming Representation Collapse in Label Smoothing

Add code
Feb 18, 2025
Viaarxiv icon

Fundus Image Quality Assessment and Enhancement: a Systematic Review

Add code
Jan 20, 2025
Viaarxiv icon

GaussianAvatar-Editor: Photorealistic Animatable Gaussian Head Avatar Editor

Add code
Jan 17, 2025
Viaarxiv icon

Universal Features Guided Zero-Shot Category-Level Object Pose Estimation

Add code
Jan 06, 2025
Viaarxiv icon

COph100: A comprehensive fundus image registration dataset from infants constituting the "RIDIRP" database

Add code
Jan 06, 2025
Viaarxiv icon

AIF-SFDA: Autonomous Information Filter-driven Source-Free Domain Adaptation for Medical Image Segmentation

Add code
Jan 06, 2025
Figure 1 for AIF-SFDA: Autonomous Information Filter-driven Source-Free Domain Adaptation for Medical Image Segmentation
Figure 2 for AIF-SFDA: Autonomous Information Filter-driven Source-Free Domain Adaptation for Medical Image Segmentation
Figure 3 for AIF-SFDA: Autonomous Information Filter-driven Source-Free Domain Adaptation for Medical Image Segmentation
Figure 4 for AIF-SFDA: Autonomous Information Filter-driven Source-Free Domain Adaptation for Medical Image Segmentation
Viaarxiv icon

An Efficient Model Maintenance Approach for MLOps

Add code
Dec 05, 2024
Viaarxiv icon

What Information Contributes to Log-based Anomaly Detection? Insights from a Configurable Transformer-Based Approach

Add code
Sep 30, 2024
Figure 1 for What Information Contributes to Log-based Anomaly Detection? Insights from a Configurable Transformer-Based Approach
Figure 2 for What Information Contributes to Log-based Anomaly Detection? Insights from a Configurable Transformer-Based Approach
Figure 3 for What Information Contributes to Log-based Anomaly Detection? Insights from a Configurable Transformer-Based Approach
Figure 4 for What Information Contributes to Log-based Anomaly Detection? Insights from a Configurable Transformer-Based Approach
Viaarxiv icon