no code implementations • 21 Apr 2024 • Hongyu Zhu, Sichu Liang, Wentao Hu, Fangqi Li, Ju Jia, Shilin Wang
With the rise of Machine Learning as a Service (MLaaS) platforms, safeguarding the intellectual property of deep learning models is becoming paramount.
1 code implementation • 29 Nov 2023 • Ziqiao Peng, Wentao Hu, Yue Shi, Xiangyu Zhu, Xiaomei Zhang, Hao Zhao, Jun He, Hongyan Liu, Zhaoxin Fan
A lifelike talking head requires synchronized coordination of subject identity, lip movements, facial expressions, and head poses.
no code implementations • 20 Oct 2023 • Jiarun Liu, Wentao Hu, Chunhong Zhang
Large Language Models (LLMs) have emerged as promising agents for web navigation tasks, interpreting objectives and interacting with web pages.
no code implementations • 17 Sep 2023 • Wentao Hu, Hui Fang
To the best of our knowledge, we are the first to achieve differential privacy in sequential recommendation with dependent interactions.
1 code implementation • 16 Sep 2023 • Hongyu Zhu, Sichu Liang, Wentao Hu, Fang-Qi Li, Yali Yuan, Shi-Lin Wang, Guang Cheng
As a modern ensemble technique, Deep Forest (DF) employs a cascading structure to construct deep models, providing stronger representational power compared to traditional decision forests.
no code implementations • 31 Aug 2023 • Aleksy Leeuwenkamp, Wentao Hu
To show practical utility, we use these measures on high-frequency stock return data around market distress events such as the 2010 Flash Crash and during the GFC.
1 code implementation • ICCV 2023 • Wentao Hu, Jia Zheng, Zixin Zhang, Xiaojun Yuan, Jian Yin, Zihan Zhou
In this paper, we develop a new method to automatically convert 2D line drawings from three orthographic views into 3D CAD models.
no code implementations • 14 May 2023 • Wentao Hu, Xiurong Jiang, Jiarun Liu, YuQi Yang, Hui Tian
In the field of few-shot learning (FSL), extensive research has focused on improving network structures and training strategies.
Few-Shot Learning Unsupervised Few-Shot Image Classification
no code implementations • 1 Dec 2022 • Wentao Hu, Hui Fang
Existing differentially private matrix factorization methods either assume the recommender is trusted, or can only provide a uniform level of privacy protection for all users and items with untrusted recommender.