This paper focuses on the recently popular task of point cloud completio...
Plant leaf identification is crucial for biodiversity protection and
con...
Human pose transfer aims to synthesize a new view of a person under a gi...
The goal of attribute manipulation is to control specified attribute(s) ...
Recent works have demonstrated that transformer can achieve promising
pe...
Different from other deep scalable architecture based NAS approaches, Br...
Currently, an increasing number of model pruning methods are proposed to...
For a typical Scene Graph Generation (SGG) method, there is often a larg...
Recently, Tensor Ring Networks (TRNs) have been applied in deep networks...
In order to further improve the search efficiency of Neural Architecture...
Constructing adversarial examples in a black-box threat model injures th...
Adversarial learning has shown its advances in generating natural and di...
Efficient Neural Architecture Search (ENAS) achieves novel efficiency fo...
Deep reinforcement learning (DRL) has made great achievements since prop...
Video anomaly detection under weak labels is formulated as a typical
mul...
Despite tremendous progress achieved in temporal action detection,
state...
Weakly supervised temporal action detection is a Herculean task in
under...
We develop a novel cross-modality generation framework that learns to
ge...
Existing action detection algorithms usually generate action proposals
t...
In this paper, we address the problem of searching action proposals in
u...