Picture for Jianhuang Lai

Jianhuang Lai

GuardSplat: Efficient and Robust Watermarking for 3D Gaussian Splatting

Add code
Dec 02, 2024
Viaarxiv icon

Progressive Pretext Task Learning for Human Trajectory Prediction

Add code
Jul 16, 2024
Viaarxiv icon

View-decoupled Transformer for Person Re-identification under Aerial-ground Camera Network

Add code
Mar 21, 2024
Figure 1 for View-decoupled Transformer for Person Re-identification under Aerial-ground Camera Network
Figure 2 for View-decoupled Transformer for Person Re-identification under Aerial-ground Camera Network
Figure 3 for View-decoupled Transformer for Person Re-identification under Aerial-ground Camera Network
Figure 4 for View-decoupled Transformer for Person Re-identification under Aerial-ground Camera Network
Viaarxiv icon

Siamese Learning with Joint Alignment and Regression for Weakly-Supervised Video Paragraph Grounding

Add code
Mar 18, 2024
Viaarxiv icon

APRF: Anti-Aliasing Projection Representation Field for Inverse Problem in Imaging

Add code
Jul 11, 2023
Viaarxiv icon

CuNeRF: Cube-Based Neural Radiance Field for Zero-Shot Medical Image Arbitrary-Scale Super Resolution

Add code
Apr 09, 2023
Viaarxiv icon

Hard Nominal Example-aware Template Mutual Matching for Industrial Anomaly Detection

Add code
Apr 04, 2023
Figure 1 for Hard Nominal Example-aware Template Mutual Matching for Industrial Anomaly Detection
Figure 2 for Hard Nominal Example-aware Template Mutual Matching for Industrial Anomaly Detection
Figure 3 for Hard Nominal Example-aware Template Mutual Matching for Industrial Anomaly Detection
Figure 4 for Hard Nominal Example-aware Template Mutual Matching for Industrial Anomaly Detection
Viaarxiv icon

Adversarial Attack and Defense for Medical Image Analysis: Methods and Applications

Add code
Mar 24, 2023
Figure 1 for Adversarial Attack and Defense for Medical Image Analysis: Methods and Applications
Figure 2 for Adversarial Attack and Defense for Medical Image Analysis: Methods and Applications
Figure 3 for Adversarial Attack and Defense for Medical Image Analysis: Methods and Applications
Figure 4 for Adversarial Attack and Defense for Medical Image Analysis: Methods and Applications
Viaarxiv icon

The Enemy of My Enemy is My Friend: Exploring Inverse Adversaries for Improving Adversarial Training

Add code
Nov 01, 2022
Figure 1 for The Enemy of My Enemy is My Friend: Exploring Inverse Adversaries for Improving Adversarial Training
Figure 2 for The Enemy of My Enemy is My Friend: Exploring Inverse Adversaries for Improving Adversarial Training
Figure 3 for The Enemy of My Enemy is My Friend: Exploring Inverse Adversaries for Improving Adversarial Training
Figure 4 for The Enemy of My Enemy is My Friend: Exploring Inverse Adversaries for Improving Adversarial Training
Viaarxiv icon

Understanding Weight Similarity of Neural Networks via Chain Normalization Rule and Hypothesis-Training-Testing

Add code
Aug 08, 2022
Figure 1 for Understanding Weight Similarity of Neural Networks via Chain Normalization Rule and Hypothesis-Training-Testing
Figure 2 for Understanding Weight Similarity of Neural Networks via Chain Normalization Rule and Hypothesis-Training-Testing
Figure 3 for Understanding Weight Similarity of Neural Networks via Chain Normalization Rule and Hypothesis-Training-Testing
Figure 4 for Understanding Weight Similarity of Neural Networks via Chain Normalization Rule and Hypothesis-Training-Testing
Viaarxiv icon