Picture for Kaiyuan Xu

Kaiyuan Xu

Comparison of Centralized and Decentralized Approaches in Cooperative Coverage Problems with Energy-Constrained Agents

Add code
Aug 26, 2020
Figure 1 for Comparison of Centralized and Decentralized Approaches in Cooperative Coverage Problems with Energy-Constrained Agents
Figure 2 for Comparison of Centralized and Decentralized Approaches in Cooperative Coverage Problems with Energy-Constrained Agents
Figure 3 for Comparison of Centralized and Decentralized Approaches in Cooperative Coverage Problems with Energy-Constrained Agents
Figure 4 for Comparison of Centralized and Decentralized Approaches in Cooperative Coverage Problems with Energy-Constrained Agents
Viaarxiv icon

Adaptive Adversarial Logits Pairing

Add code
May 25, 2020
Figure 1 for Adaptive Adversarial Logits Pairing
Figure 2 for Adaptive Adversarial Logits Pairing
Figure 3 for Adaptive Adversarial Logits Pairing
Figure 4 for Adaptive Adversarial Logits Pairing
Viaarxiv icon

Butterfly detection and classification based on integrated YOLO algorithm

Add code
Jan 02, 2020
Figure 1 for Butterfly detection and classification based on integrated YOLO algorithm
Figure 2 for Butterfly detection and classification based on integrated YOLO algorithm
Figure 3 for Butterfly detection and classification based on integrated YOLO algorithm
Figure 4 for Butterfly detection and classification based on integrated YOLO algorithm
Viaarxiv icon

blessing in disguise: Designing Robust Turing Test by Employing Algorithm Unrobustness

Add code
Apr 22, 2019
Figure 1 for blessing in disguise: Designing Robust Turing Test by Employing Algorithm Unrobustness
Figure 2 for blessing in disguise: Designing Robust Turing Test by Employing Algorithm Unrobustness
Figure 3 for blessing in disguise: Designing Robust Turing Test by Employing Algorithm Unrobustness
Figure 4 for blessing in disguise: Designing Robust Turing Test by Employing Algorithm Unrobustness
Viaarxiv icon

Attention, Please! Adversarial Defense via Attention Rectification and Preservation

Add code
Nov 24, 2018
Figure 1 for Attention, Please! Adversarial Defense via Attention Rectification and Preservation
Figure 2 for Attention, Please! Adversarial Defense via Attention Rectification and Preservation
Figure 3 for Attention, Please! Adversarial Defense via Attention Rectification and Preservation
Figure 4 for Attention, Please! Adversarial Defense via Attention Rectification and Preservation
Viaarxiv icon

Deep neural network based i-vector mapping for speaker verification using short utterances

Add code
Oct 16, 2018
Figure 1 for Deep neural network based i-vector mapping for speaker verification using short utterances
Figure 2 for Deep neural network based i-vector mapping for speaker verification using short utterances
Figure 3 for Deep neural network based i-vector mapping for speaker verification using short utterances
Figure 4 for Deep neural network based i-vector mapping for speaker verification using short utterances
Viaarxiv icon