Picture for Ruonan Zhang

Ruonan Zhang

Robust Trajectory and Offloading for Energy-Efficient UAV Edge Computing in Industrial Internet of Things

Add code
Mar 08, 2023
Viaarxiv icon

Frequency-Aware Self-Supervised Monocular Depth Estimation

Add code
Oct 11, 2022
Figure 1 for Frequency-Aware Self-Supervised Monocular Depth Estimation
Figure 2 for Frequency-Aware Self-Supervised Monocular Depth Estimation
Figure 3 for Frequency-Aware Self-Supervised Monocular Depth Estimation
Figure 4 for Frequency-Aware Self-Supervised Monocular Depth Estimation
Viaarxiv icon

Self-Supervised Monocular Depth Estimation: Solving the Edge-Fattening Problem

Add code
Oct 04, 2022
Figure 1 for Self-Supervised Monocular Depth Estimation: Solving the Edge-Fattening Problem
Figure 2 for Self-Supervised Monocular Depth Estimation: Solving the Edge-Fattening Problem
Figure 3 for Self-Supervised Monocular Depth Estimation: Solving the Edge-Fattening Problem
Figure 4 for Self-Supervised Monocular Depth Estimation: Solving the Edge-Fattening Problem
Viaarxiv icon

A Personalized Diagnostic Generation Framework Based on Multi-source Heterogeneous Data

Add code
Oct 26, 2021
Figure 1 for A Personalized Diagnostic Generation Framework Based on Multi-source Heterogeneous Data
Figure 2 for A Personalized Diagnostic Generation Framework Based on Multi-source Heterogeneous Data
Figure 3 for A Personalized Diagnostic Generation Framework Based on Multi-source Heterogeneous Data
Figure 4 for A Personalized Diagnostic Generation Framework Based on Multi-source Heterogeneous Data
Viaarxiv icon

StructureFlow: Image Inpainting via Structure-aware Appearance Flow

Add code
Aug 11, 2019
Figure 1 for StructureFlow: Image Inpainting via Structure-aware Appearance Flow
Figure 2 for StructureFlow: Image Inpainting via Structure-aware Appearance Flow
Figure 3 for StructureFlow: Image Inpainting via Structure-aware Appearance Flow
Figure 4 for StructureFlow: Image Inpainting via Structure-aware Appearance Flow
Viaarxiv icon

Video Manipulation Techniques for the Protection of Privacy in Remote Presence Systems

Add code
Jan 13, 2015
Figure 1 for Video Manipulation Techniques for the Protection of Privacy in Remote Presence Systems
Figure 2 for Video Manipulation Techniques for the Protection of Privacy in Remote Presence Systems
Figure 3 for Video Manipulation Techniques for the Protection of Privacy in Remote Presence Systems
Figure 4 for Video Manipulation Techniques for the Protection of Privacy in Remote Presence Systems
Viaarxiv icon