Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Picture for Wei Jiang

Wei Jiang

Department of Control Science and Engineering, Zhejiang University, China

GameIR: A Large-Scale Synthesized Ground-Truth Dataset for Image Restoration over Gaming Content

Add code
Aug 29, 2024
Figure 1 for GameIR: A Large-Scale Synthesized Ground-Truth Dataset for Image Restoration over Gaming Content
Figure 2 for GameIR: A Large-Scale Synthesized Ground-Truth Dataset for Image Restoration over Gaming Content
Figure 3 for GameIR: A Large-Scale Synthesized Ground-Truth Dataset for Image Restoration over Gaming Content
Figure 4 for GameIR: A Large-Scale Synthesized Ground-Truth Dataset for Image Restoration over Gaming Content
Viaarxiv icon

A Survey of Trojan Attacks and Defenses to Deep Neural Networks

Add code
Aug 15, 2024
Viaarxiv icon

Heterogeneous System Design for Cell-Free Massive MIMO in Wideband Communications

Add code
Aug 15, 2024
Viaarxiv icon

Physics-guided Active Sample Reweighting for Urban Flow Prediction

Add code
Jul 18, 2024
Figure 1 for Physics-guided Active Sample Reweighting for Urban Flow Prediction
Figure 2 for Physics-guided Active Sample Reweighting for Urban Flow Prediction
Figure 3 for Physics-guided Active Sample Reweighting for Urban Flow Prediction
Figure 4 for Physics-guided Active Sample Reweighting for Urban Flow Prediction
Viaarxiv icon

Exposure Completing for Temporally Consistent Neural High Dynamic Range Video Rendering

Add code
Jul 18, 2024
Figure 1 for Exposure Completing for Temporally Consistent Neural High Dynamic Range Video Rendering
Figure 2 for Exposure Completing for Temporally Consistent Neural High Dynamic Range Video Rendering
Figure 3 for Exposure Completing for Temporally Consistent Neural High Dynamic Range Video Rendering
Figure 4 for Exposure Completing for Temporally Consistent Neural High Dynamic Range Video Rendering
Viaarxiv icon

Hacking Encrypted Wireless Power: Cyber-Security of Dynamic Charging

Add code
Jun 17, 2024
Figure 1 for Hacking Encrypted Wireless Power: Cyber-Security of Dynamic Charging
Figure 2 for Hacking Encrypted Wireless Power: Cyber-Security of Dynamic Charging
Figure 3 for Hacking Encrypted Wireless Power: Cyber-Security of Dynamic Charging
Figure 4 for Hacking Encrypted Wireless Power: Cyber-Security of Dynamic Charging
Viaarxiv icon

Projection-Free Variance Reduction Methods for Stochastic Constrained Multi-Level Compositional Optimization

Add code
Jun 06, 2024
Viaarxiv icon

Adaptive Variance Reduction for Stochastic Optimization under Weaker Assumptions

Add code
Jun 04, 2024
Viaarxiv icon

Efficient Sign-Based Optimization: Accelerating Convergence via Variance Reduction

Add code
Jun 01, 2024
Viaarxiv icon

Cost-Effectiveness Analysis and Design of Cost-Efficient Cell-Free Massive MIMO Systems

Add code
Jun 01, 2024
Viaarxiv icon