Picture for Ziang Yan

Ziang Yan

TimeSuite: Improving MLLMs for Long Video Understanding via Grounded Tuning

Add code
Oct 25, 2024
Viaarxiv icon

An End-to-End Framework for Marketing Effectiveness Optimization under Budget Constraint

Add code
Feb 09, 2023
Viaarxiv icon

Sill-Net: Feature Augmentation with Separated Illumination Representation

Add code
Feb 06, 2021
Figure 1 for Sill-Net: Feature Augmentation with Separated Illumination Representation
Figure 2 for Sill-Net: Feature Augmentation with Separated Illumination Representation
Figure 3 for Sill-Net: Feature Augmentation with Separated Illumination Representation
Figure 4 for Sill-Net: Feature Augmentation with Separated Illumination Representation
Viaarxiv icon

Learning Fast Approximations of Sparse Nonlinear Regression

Add code
Oct 26, 2020
Figure 1 for Learning Fast Approximations of Sparse Nonlinear Regression
Figure 2 for Learning Fast Approximations of Sparse Nonlinear Regression
Figure 3 for Learning Fast Approximations of Sparse Nonlinear Regression
Viaarxiv icon

FMA-ETA: Estimating Travel Time Entirely Based on FFN With Attention

Add code
Jun 07, 2020
Figure 1 for FMA-ETA: Estimating Travel Time Entirely Based on FFN With Attention
Figure 2 for FMA-ETA: Estimating Travel Time Entirely Based on FFN With Attention
Figure 3 for FMA-ETA: Estimating Travel Time Entirely Based on FFN With Attention
Figure 4 for FMA-ETA: Estimating Travel Time Entirely Based on FFN With Attention
Viaarxiv icon

Adversarial Margin Maximization Networks

Add code
Nov 14, 2019
Figure 1 for Adversarial Margin Maximization Networks
Figure 2 for Adversarial Margin Maximization Networks
Figure 3 for Adversarial Margin Maximization Networks
Figure 4 for Adversarial Margin Maximization Networks
Viaarxiv icon

Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks

Add code
Jun 11, 2019
Figure 1 for Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks
Figure 2 for Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks
Figure 3 for Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks
Figure 4 for Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks
Viaarxiv icon

Deep Defense: Training DNNs with Improved Adversarial Robustness

Add code
May 30, 2018
Figure 1 for Deep Defense: Training DNNs with Improved Adversarial Robustness
Figure 2 for Deep Defense: Training DNNs with Improved Adversarial Robustness
Figure 3 for Deep Defense: Training DNNs with Improved Adversarial Robustness
Figure 4 for Deep Defense: Training DNNs with Improved Adversarial Robustness
Viaarxiv icon

Optimizing Recurrent Neural Networks Architectures under Time Constraints

Add code
Feb 21, 2018
Figure 1 for Optimizing Recurrent Neural Networks Architectures under Time Constraints
Figure 2 for Optimizing Recurrent Neural Networks Architectures under Time Constraints
Figure 3 for Optimizing Recurrent Neural Networks Architectures under Time Constraints
Figure 4 for Optimizing Recurrent Neural Networks Architectures under Time Constraints
Viaarxiv icon

Neural Network Architecture Optimization through Submodularity and Supermodularity

Add code
Feb 21, 2018
Figure 1 for Neural Network Architecture Optimization through Submodularity and Supermodularity
Figure 2 for Neural Network Architecture Optimization through Submodularity and Supermodularity
Figure 3 for Neural Network Architecture Optimization through Submodularity and Supermodularity
Figure 4 for Neural Network Architecture Optimization through Submodularity and Supermodularity
Viaarxiv icon