Recently, digital humans for interpersonal interaction in virtual
enviro...
As their size increases, Large Languages Models (LLMs) are natural candi...
Backdoor inversion, the process of finding a backdoor trigger inserted i...
Referring Expression Segmentation (RES), which is aimed at localizing an...
Test-time adaptation (TTA) refers to adapting neural networks to distrib...
In this paper, we are tackling the weakly-supervised referring expressio...
In this paper, we are tackling the proposal-free referring expression
gr...
Recent evidence shows that convolutional neural networks (CNNs) are bias...
Under a commonly-studied "backdoor" poisoning attack against classificat...
In this paper, the main task we aim to tackle is the multi-instance
semi...
We present a method for provably defending any pretrained image classifi...
Weakly supervised semantic segmentation is a challenging task as it only...
In this paper, we aim to tackle the one-shot person re-identification pr...
In this paper, we aim to tackle the task of semi-supervised video object...
Deep reinforcement learning (DRL) has achieved great success in various
...
Unsupervised node embedding methods (e.g., DeepWalk, LINE, and node2vec)...
Network pruning is widely used for reducing the heavy computational cost...