Picture for Jihong Wang

Jihong Wang

Disentangled Noisy Correspondence Learning

Add code
Aug 10, 2024
Figure 1 for Disentangled Noisy Correspondence Learning
Figure 2 for Disentangled Noisy Correspondence Learning
Figure 3 for Disentangled Noisy Correspondence Learning
Figure 4 for Disentangled Noisy Correspondence Learning
Viaarxiv icon

Disentangled Representation Learning with Transmitted Information Bottleneck

Add code
Nov 03, 2023
Viaarxiv icon

Disentangled Generation with Information Bottleneck for Few-Shot Learning

Add code
Nov 29, 2022
Figure 1 for Disentangled Generation with Information Bottleneck for Few-Shot Learning
Figure 2 for Disentangled Generation with Information Bottleneck for Few-Shot Learning
Figure 3 for Disentangled Generation with Information Bottleneck for Few-Shot Learning
Figure 4 for Disentangled Generation with Information Bottleneck for Few-Shot Learning
Viaarxiv icon

Towards Explanation for Unsupervised Graph-Level Representation Learning

Add code
May 20, 2022
Figure 1 for Towards Explanation for Unsupervised Graph-Level Representation Learning
Figure 2 for Towards Explanation for Unsupervised Graph-Level Representation Learning
Figure 3 for Towards Explanation for Unsupervised Graph-Level Representation Learning
Figure 4 for Towards Explanation for Unsupervised Graph-Level Representation Learning
Viaarxiv icon

Robust Unsupervised Graph Representation Learning via Mutual Information Maximization

Add code
Jan 21, 2022
Figure 1 for Robust Unsupervised Graph Representation Learning via Mutual Information Maximization
Figure 2 for Robust Unsupervised Graph Representation Learning via Mutual Information Maximization
Figure 3 for Robust Unsupervised Graph Representation Learning via Mutual Information Maximization
Figure 4 for Robust Unsupervised Graph Representation Learning via Mutual Information Maximization
Viaarxiv icon

Scalable Attack on Graph Data by Injecting Vicious Nodes

Add code
Apr 22, 2020
Figure 1 for Scalable Attack on Graph Data by Injecting Vicious Nodes
Figure 2 for Scalable Attack on Graph Data by Injecting Vicious Nodes
Figure 3 for Scalable Attack on Graph Data by Injecting Vicious Nodes
Figure 4 for Scalable Attack on Graph Data by Injecting Vicious Nodes
Viaarxiv icon