Picture for Shangyu Chen

Shangyu Chen

PaRa: Personalizing Text-to-Image Diffusion via Parameter Rank Reduction

Add code
Jun 09, 2024
Viaarxiv icon

Apollonion: Profile-centric Dialog Agent

Add code
Apr 10, 2024
Figure 1 for Apollonion: Profile-centric Dialog Agent
Figure 2 for Apollonion: Profile-centric Dialog Agent
Figure 3 for Apollonion: Profile-centric Dialog Agent
Figure 4 for Apollonion: Profile-centric Dialog Agent
Viaarxiv icon

Adversarial Defense by Latent Style Transformations

Add code
Jun 17, 2020
Figure 1 for Adversarial Defense by Latent Style Transformations
Figure 2 for Adversarial Defense by Latent Style Transformations
Figure 3 for Adversarial Defense by Latent Style Transformations
Figure 4 for Adversarial Defense by Latent Style Transformations
Viaarxiv icon

Defending Adversarial Attacks via Semantic Feature Manipulation

Add code
Feb 03, 2020
Figure 1 for Defending Adversarial Attacks via Semantic Feature Manipulation
Figure 2 for Defending Adversarial Attacks via Semantic Feature Manipulation
Figure 3 for Defending Adversarial Attacks via Semantic Feature Manipulation
Figure 4 for Defending Adversarial Attacks via Semantic Feature Manipulation
Viaarxiv icon

OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning

Add code
Jan 18, 2020
Figure 1 for OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning
Figure 2 for OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning
Figure 3 for OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning
Figure 4 for OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning
Viaarxiv icon

Backdoor Attacks against Transfer Learning with Pre-trained Deep Learning Models

Add code
Jan 10, 2020
Figure 1 for Backdoor Attacks against Transfer Learning with Pre-trained Deep Learning Models
Figure 2 for Backdoor Attacks against Transfer Learning with Pre-trained Deep Learning Models
Figure 3 for Backdoor Attacks against Transfer Learning with Pre-trained Deep Learning Models
Figure 4 for Backdoor Attacks against Transfer Learning with Pre-trained Deep Learning Models
Viaarxiv icon

Generating Semantic Adversarial Examples via Feature Manipulation

Add code
Jan 06, 2020
Figure 1 for Generating Semantic Adversarial Examples via Feature Manipulation
Figure 2 for Generating Semantic Adversarial Examples via Feature Manipulation
Figure 3 for Generating Semantic Adversarial Examples via Feature Manipulation
Figure 4 for Generating Semantic Adversarial Examples via Feature Manipulation
Viaarxiv icon

Learning to Prune Deep Neural Networks via Layer-wise Optimal Brain Surgeon

Add code
Nov 09, 2017
Figure 1 for Learning to Prune Deep Neural Networks via Layer-wise Optimal Brain Surgeon
Figure 2 for Learning to Prune Deep Neural Networks via Layer-wise Optimal Brain Surgeon
Figure 3 for Learning to Prune Deep Neural Networks via Layer-wise Optimal Brain Surgeon
Figure 4 for Learning to Prune Deep Neural Networks via Layer-wise Optimal Brain Surgeon
Viaarxiv icon