Search Results for author: Yangyu Huang

Found 10 papers, 6 papers with code

WaveCoder: Widespread And Versatile Enhanced Instruction Tuning with Refined Data Generation

no code implementations20 Dec 2023 Zhaojian Yu, Xin Zhang, Ning Shang, Yangyu Huang, Can Xu, Yishujie Zhao, Wenxiang Hu, Qiufeng Yin

This paper thus offers a significant contribution to the field of instruction data generation and fine-tuning models, providing new insights and tools for enhancing performance in code-related tasks.

Code Generation

General Facial Representation Learning in a Visual-Linguistic Manner

2 code implementations CVPR 2022 Yinglin Zheng, Hao Yang, Ting Zhang, Jianmin Bao, Dongdong Chen, Yangyu Huang, Lu Yuan, Dong Chen, Ming Zeng, Fang Wen

In this paper, we study the transfer performance of pre-trained models on face analysis tasks and introduce a framework, called FaRL, for general Facial Representation Learning in a visual-linguistic manner.

 Ranked #1 on Face Parsing on CelebAMask-HQ (using extra training data)

Face Alignment Face Parsing +1

ADNet: Leveraging Error-Bias Towards Normal Direction in Face Alignment

1 code implementation ICCV 2021 Yangyu Huang, Hao Yang, Chong Li, Jongyoo Kim, Fangyun Wei

On the other hand, AAM is an attention module which can get anisotropic attention mask focusing on the region of point and its local edge connected by adjacent points, it has a stronger response in tangent than in normal, which means relaxed constraints in the tangent.

Face Alignment

P-DIFF: Learning Classifier with Noisy Labels based on Probability Difference Distributions

1 code implementation14 Sep 2020 Wei Hu, QiHao Zhao, Yangyu Huang, Fan Zhang

Learning deep neural network (DNN) classifier with noisy labels is a challenging task because the DNN can easily over-fit on these noisy labels due to its high capability.

A $p/2$ Adversary Power Resistant Blockchain Sharding Approach

no code implementations9 Apr 2020 Yibin Xu, Yangyu Huang, Jianhua Shao, George Theodorakopoulos

First, in a non-sharding blockchain, nodes can have different weight (power or stake) to create a consensus, and as such an adversary needs to control half of the overall weight in order to manipulate the system ($p/2$ security level).

Distributed, Parallel, and Cluster Computing Cryptography and Security

An n/2 Byzantine node tolerate Blockchain Sharding approach

no code implementations15 Jan 2020 Yibin Xu, Yangyu Huang

Traditional Blockchain Sharding approaches can only tolerate up to n/3 of nodes being adversary because they rely on the hypergeometric distribution to make a failure (an adversary does not have n/3 of nodes globally but can manipulate the consensus of a Shard) hard to happen.

Cryptography and Security Distributed, Parallel, and Cluster Computing 68M12

Noise-Tolerant Paradigm for Training Face Recognition CNNs

2 code implementations CVPR 2019 Wei Hu, Yangyu Huang, Fan Zhang, Ruirui Li

Benefit from large-scale training datasets, deep Convolutional Neural Networks(CNNs) have achieved impressive results in face recognition(FR).

Face Recognition

SeqFace: Make full use of sequence information for face recognition

1 code implementation17 Mar 2018 Wei Hu, Yangyu Huang, Fan Zhang, Ruirui Li, Wei Li, Guodong Yuan

Deep convolutional neural networks (CNNs) have greatly improved the Face Recognition (FR) performance in recent years.

Face Recognition Face Verification

Cannot find the paper you are looking for? You can Submit a new open access paper.