Picture for Jianhuang Lai

Jianhuang Lai

GuardSplat: Efficient and Robust Watermarking for 3D Gaussian Splatting

Add code
Dec 02, 2024
Figure 1 for GuardSplat: Efficient and Robust Watermarking for 3D Gaussian Splatting
Figure 2 for GuardSplat: Efficient and Robust Watermarking for 3D Gaussian Splatting
Figure 3 for GuardSplat: Efficient and Robust Watermarking for 3D Gaussian Splatting
Figure 4 for GuardSplat: Efficient and Robust Watermarking for 3D Gaussian Splatting
Viaarxiv icon

Progressive Pretext Task Learning for Human Trajectory Prediction

Add code
Jul 16, 2024
Viaarxiv icon

View-decoupled Transformer for Person Re-identification under Aerial-ground Camera Network

Add code
Mar 21, 2024
Figure 1 for View-decoupled Transformer for Person Re-identification under Aerial-ground Camera Network
Figure 2 for View-decoupled Transformer for Person Re-identification under Aerial-ground Camera Network
Figure 3 for View-decoupled Transformer for Person Re-identification under Aerial-ground Camera Network
Figure 4 for View-decoupled Transformer for Person Re-identification under Aerial-ground Camera Network
Viaarxiv icon

Siamese Learning with Joint Alignment and Regression for Weakly-Supervised Video Paragraph Grounding

Add code
Mar 18, 2024
Viaarxiv icon

APRF: Anti-Aliasing Projection Representation Field for Inverse Problem in Imaging

Add code
Jul 11, 2023
Viaarxiv icon

CuNeRF: Cube-Based Neural Radiance Field for Zero-Shot Medical Image Arbitrary-Scale Super Resolution

Add code
Apr 09, 2023
Viaarxiv icon

Hard Nominal Example-aware Template Mutual Matching for Industrial Anomaly Detection

Add code
Apr 04, 2023
Figure 1 for Hard Nominal Example-aware Template Mutual Matching for Industrial Anomaly Detection
Figure 2 for Hard Nominal Example-aware Template Mutual Matching for Industrial Anomaly Detection
Figure 3 for Hard Nominal Example-aware Template Mutual Matching for Industrial Anomaly Detection
Figure 4 for Hard Nominal Example-aware Template Mutual Matching for Industrial Anomaly Detection
Viaarxiv icon

Adversarial Attack and Defense for Medical Image Analysis: Methods and Applications

Add code
Mar 24, 2023
Figure 1 for Adversarial Attack and Defense for Medical Image Analysis: Methods and Applications
Figure 2 for Adversarial Attack and Defense for Medical Image Analysis: Methods and Applications
Figure 3 for Adversarial Attack and Defense for Medical Image Analysis: Methods and Applications
Figure 4 for Adversarial Attack and Defense for Medical Image Analysis: Methods and Applications
Viaarxiv icon

The Enemy of My Enemy is My Friend: Exploring Inverse Adversaries for Improving Adversarial Training

Add code
Nov 01, 2022
Figure 1 for The Enemy of My Enemy is My Friend: Exploring Inverse Adversaries for Improving Adversarial Training
Figure 2 for The Enemy of My Enemy is My Friend: Exploring Inverse Adversaries for Improving Adversarial Training
Figure 3 for The Enemy of My Enemy is My Friend: Exploring Inverse Adversaries for Improving Adversarial Training
Figure 4 for The Enemy of My Enemy is My Friend: Exploring Inverse Adversaries for Improving Adversarial Training
Viaarxiv icon

Understanding Weight Similarity of Neural Networks via Chain Normalization Rule and Hypothesis-Training-Testing

Add code
Aug 08, 2022
Figure 1 for Understanding Weight Similarity of Neural Networks via Chain Normalization Rule and Hypothesis-Training-Testing
Figure 2 for Understanding Weight Similarity of Neural Networks via Chain Normalization Rule and Hypothesis-Training-Testing
Figure 3 for Understanding Weight Similarity of Neural Networks via Chain Normalization Rule and Hypothesis-Training-Testing
Figure 4 for Understanding Weight Similarity of Neural Networks via Chain Normalization Rule and Hypothesis-Training-Testing
Viaarxiv icon