Search Results for author: Wentao Zhao

Found 9 papers, 6 papers with code

PLGSLAM: Progressive Neural Scene Represenation with Local to Global Bundle Adjustment

no code implementations15 Dec 2023 Tianchen Deng, Guole Shen, Tong Qin, Jianyu Wang, Wentao Zhao, Jingchuan Wang, Danwei Wang, Weidong Chen

To this end, we introduce PLGSLAM, a neural visual SLAM system capable of high-fidelity surface reconstruction and robust camera tracking in real-time.

Surface Reconstruction

GraphGLOW: Universal and Generalizable Structure Learning for Graph Neural Networks

1 code implementation20 Jun 2023 Wentao Zhao, Qitian Wu, Chenxiao Yang, Junchi Yan

Graph structure learning is a well-established problem that aims at optimizing graph structures adaptive to specific graph datasets to help message passing neural networks (i. e., GNNs) to yield effective and robust node embeddings.

Graph structure learning

NodeFormer: A Scalable Graph Structure Learning Transformer for Node Classification

1 code implementation14 Jun 2023 Qitian Wu, Wentao Zhao, Zenan Li, David Wipf, Junchi Yan

In this paper, we introduce a novel all-pair message passing scheme for efficiently propagating node signals between arbitrary nodes, as an important building block for a pioneering Transformer-style network for node classification on large graphs, dubbed as \textsc{NodeFormer}.

Graph structure learning Image Classification

DIFFormer: Scalable (Graph) Transformers Induced by Energy Constrained Diffusion

1 code implementation23 Jan 2023 Qitian Wu, Chenxiao Yang, Wentao Zhao, Yixuan He, David Wipf, Junchi Yan

Real-world data generation often involves complex inter-dependencies among instances, violating the IID-data hypothesis of standard learning paradigms and posing a challenge for uncovering the geometric structures for learning desired instance representations.

Image-text Classification Node Classification +2

Imperceptible Adversarial Attack via Invertible Neural Networks

1 code implementation28 Nov 2022 Zihan Chen, Ziyue Wang, JunJie Huang, Wentao Zhao, Xiao Liu, Dejian Guan

Adding perturbations via utilizing auxiliary gradient information or discarding existing details of the benign images are two common approaches for generating adversarial examples.

Adversarial Attack

DURRNet: Deep Unfolded Single Image Reflection Removal Network

no code implementations12 Mar 2022 Jun-Jie Huang, Tianrui Liu, Zhixiong Yang, Shaojing Fu, Wentao Zhao, Pier Luigi Dragotti

With the deep unrolling technique, we build the DURRNet with ProxNets to model natural image priors and ProxInvNets which are constructed with invertible networks to impose the exclusion prior.

blind source separation Reflection Removal +1

A pipeline for fair comparison of graph neural networks in node classification tasks

1 code implementation19 Dec 2020 Wentao Zhao, Dalin Zhou, Xinguo Qiu, Wei Jiang

We introduce a standard, reproducible benchmark to which the same training settings can be applied for node classification.

Data Augmentation General Classification +1

BEBP: An Poisoning Method Against Machine Learning Based IDSs

no code implementations11 Mar 2018 Pan Li, Qiang Liu, Wentao Zhao, Dongxu Wang, Siqi Wang

In this paper, we adopt the Edge Pattern Detection (EPD) algorithm to design a novel poisoning method that attack against several machine learning algorithms used in IDSs.

BIG-bench Machine Learning Intrusion Detection

Cannot find the paper you are looking for? You can Submit a new open access paper.