Picture for Min Du

Min Du

FACTS About Building Retrieval Augmented Generation-based Chatbots

Add code
Jul 10, 2024
Viaarxiv icon

Temporal-Spatial Entropy Balancing for Causal Continuous Treatment-Effect Estimation

Add code
Dec 19, 2023
Viaarxiv icon

Pseudo Label-Guided Data Fusion and Output Consistency for Semi-Supervised Medical Image Segmentation

Add code
Nov 17, 2023
Viaarxiv icon

PCDAL: A Perturbation Consistency-Driven Active Learning Approach for Medical Image Segmentation and Classification

Add code
Jun 29, 2023
Viaarxiv icon

Contrastive Credibility Propagation for Reliable Semi-Supervised Learning

Add code
Nov 17, 2022
Viaarxiv icon

Learning Heatmap-Style Jigsaw Puzzles Provides Good Pretraining for 2D Human Pose Estimation

Add code
Dec 13, 2020
Figure 1 for Learning Heatmap-Style Jigsaw Puzzles Provides Good Pretraining for 2D Human Pose Estimation
Figure 2 for Learning Heatmap-Style Jigsaw Puzzles Provides Good Pretraining for 2D Human Pose Estimation
Figure 3 for Learning Heatmap-Style Jigsaw Puzzles Provides Good Pretraining for 2D Human Pose Estimation
Figure 4 for Learning Heatmap-Style Jigsaw Puzzles Provides Good Pretraining for 2D Human Pose Estimation
Viaarxiv icon

Free-riders in Federated Learning: Attacks and Defenses

Add code
Nov 28, 2019
Figure 1 for Free-riders in Federated Learning: Attacks and Defenses
Figure 2 for Free-riders in Federated Learning: Attacks and Defenses
Figure 3 for Free-riders in Federated Learning: Attacks and Defenses
Figure 4 for Free-riders in Federated Learning: Attacks and Defenses
Viaarxiv icon

Time-aware Gradient Attack on Dynamic Network Link Prediction

Add code
Nov 24, 2019
Figure 1 for Time-aware Gradient Attack on Dynamic Network Link Prediction
Figure 2 for Time-aware Gradient Attack on Dynamic Network Link Prediction
Figure 3 for Time-aware Gradient Attack on Dynamic Network Link Prediction
Figure 4 for Time-aware Gradient Attack on Dynamic Network Link Prediction
Viaarxiv icon

Robust Anomaly Detection and Backdoor Attack Detection Via Differential Privacy

Add code
Nov 16, 2019
Figure 1 for Robust Anomaly Detection and Backdoor Attack Detection Via Differential Privacy
Figure 2 for Robust Anomaly Detection and Backdoor Attack Detection Via Differential Privacy
Figure 3 for Robust Anomaly Detection and Backdoor Attack Detection Via Differential Privacy
Figure 4 for Robust Anomaly Detection and Backdoor Attack Detection Via Differential Privacy
Viaarxiv icon

Stain Style Transfer using Transitive Adversarial Networks

Add code
Oct 23, 2019
Figure 1 for Stain Style Transfer using Transitive Adversarial Networks
Figure 2 for Stain Style Transfer using Transitive Adversarial Networks
Figure 3 for Stain Style Transfer using Transitive Adversarial Networks
Figure 4 for Stain Style Transfer using Transitive Adversarial Networks
Viaarxiv icon