Search

Your search keyword '"Xia, Shu"' showing total 2,064 results

Search Constraints

Start Over You searched for: Author "Xia, Shu" Remove constraint Author: "Xia, Shu"
2,064 results on '"Xia, Shu"'

Search Results

1. 3D-GP-LMVIC: Learning-based Multi-View Image Coding with 3D Gaussian Geometric Priors

2. Anno-incomplete Multi-dataset Detection

3. Large Point-to-Gaussian Model for Image-to-3D Generation

4. A Closer Look at GAN Priors: Exploiting Intermediate Features for Enhanced Model Inversion Attacks

5. CLIP-Guided Networks for Transferable Targeted Attacks

6. Pre-training Point Cloud Compact Model with Partial-aware Reconstruction

7. Parameter-Efficient and Memory-Efficient Tuning for Vision Transformer: A Disentangled Approach

8. Video Watermarking: Safeguarding Your Video from (Unauthorized) Annotations by Video-based LLMs

9. DreamBench++: A Human-Aligned Benchmark for Personalized Image Generation

10. Hierarchical Features Matter: A Deep Exploration of GAN Priors for Improved Dataset Distillation

11. GI-NAS: Boosting Gradient Inversion Attacks through Adaptive Neural Architecture Search

12. LCM: Locally Constrained Compact Point Cloud Model for Masked Point Modeling

13. Pre-Trained Vision-Language Models as Partial Annotators

14. GMMFormer v2: An Uncertainty-aware Framework for Partially Relevant Video Retrieval

15. Not All Prompts Are Secure: A Switchable Backdoor Attack Against Pre-trained Vision Transformers

16. Adversarial Robustness for Visual Grounding of Multimodal Large Language Models

17. Invertible Residual Rescaling Models

18. Boundary-aware Decoupled Flow Networks for Realistic Extreme Rescaling

19. Energy-Latency Manipulation of Multi-modal Large Language Models via Verbose Samples

20. Weakly Supervised Deep Hyperspherical Quantization for Image Retrieval

21. Some bounds on the cardinality of the $b$-symbol weight spectrum of codes

22. RAT: Retrieval-Augmented Transformer for Click-Through Rate Prediction

23. FMM-Attack: A Flow-based Multi-modal Adversarial Attack on Video-based LLMs

24. CALF: Aligning LLMs for Time Series Forecasting via Cross-modal Fine-Tuning

25. MambaIR: A Simple Baseline for Image Restoration with State-Space Model

26. Privacy Leakage on DNNs: A Survey of Model Inversion Attacks and Defenses

27. An Efficient Implicit Neural Representation Image Codec Based on Mixed Autoregressive Model for Low-Complexity Decoding

28. Inducing High Energy-Latency of Large Vision-Language Models with Verbose Images

29. MB-RACS: Measurement-Bounds-based Rate-Adaptive Image Compressed Sensing Network

32. Towards Compact 3D Representations via Point Feature Enhancement Masked Autoencoders

33. AdaptIR: Parameter Efficient Multi-task Adaptation for Pre-trained Image Restoration Models

34. Towards Sample-specific Backdoor Attack with Clean Labels via Attribute Trigger

35. BadCLIP: Trigger-Aware Prompt Learning for Backdoor Attacks on CLIP

36. Progressive Learning with Visual Prompt Tuning for Variable-Rate Image Compression

37. Editable-DeepSC: Cross-Modal Editable Semantic Communication Systems

38. Domain Watermark: Effective and Harmless Dataset Copyright Protection is Closed at Hand

39. GMMFormer: Gaussian-Mixture-Model Based Transformer for Efficient Partially Relevant Video Retrieval

41. WFTNet: Exploiting Global and Local Periodicity in Long-term Time Series Forecasting

42. Towards Robust Model Watermark via Reducing Parametric Vulnerability

43. MISSRec: Pre-training and Transferring Multi-modal Interest-aware Sequence Representation for Recommendation

44. One-bit Flip is All You Need: When Bit-flip Attack Meets Model Training

45. GIFD: A Generative Gradient Inversion Method with Feature Domain Optimization

46. One-stage Low-resolution Text Recognition with High-resolution Knowledge Transfer

47. Towards Robust Scene Text Image Super-resolution via Explicit Location Enhancement

48. TVTSv2: Learning Out-of-the-box Spatiotemporal Visual Representations at Scale

49. Vision-Language Pre-training with Object Contrastive Learning for 3D Scene Understanding

50. Backdoor Attack with Sparse and Invisible Trigger

Catalog

Books, media, physical & digital resources