Search Results for author: Guanhong Wang

Found 12 papers, 7 papers with code

Solving the Catastrophic Forgetting Problem in Generalized Category Discovery

1 code implementation CVPR 2024 Xinzi Cao, Xiawu Zheng, Guanhong Wang, Weijiang Yu, Yunhang Shen, Ke Li, Yutong Lu, Yonghong Tian

The LER optimizes the distribution of potential known class samples in unlabeled data thus ensuring the preservation of knowledge related to known categories while learning novel classes.

Sam-Guided Enhanced Fine-Grained Encoding with Mixed Semantic Learning for Medical Image Captioning

1 code implementation2 Nov 2023 Zhenyu Zhang, Benlu Wang, Weijie Liang, Yizhi Li, Xuechen Guo, Guanhong Wang, Shiyan Li, Gaoang Wang

With the development of multimodality and large language models, the deep learning-based technique for medical image captioning holds the potential to offer valuable diagnostic recommendations.

Image Captioning

A Survey of Deep Learning in Sports Applications: Perception, Comprehension, and Decision

no code implementations7 Jul 2023 Zhonghan Zhao, Wenhao Chai, Shengyu Hao, Wenhao Hu, Guanhong Wang, Shidong Cao, Mingli Song, Jenq-Neng Hwang, Gaoang Wang

Deep learning has the potential to revolutionize sports performance, with applications ranging from perception and comprehension to decision.

Deep Learning Survey

Answering Private Linear Queries Adaptively using the Common Mechanism

1 code implementation30 Nov 2022 Yingtai Xiao, Guanhong Wang, Danfeng Zhang, Daniel Kifer

Since M* will be used no matter what, the analyst can use its output to decide whether to subsequently run M1'(thus recreating the analysis supported by M1) or M2'(recreating the analysis supported by M2), without wasting privacy loss budget.

Proving Differential Privacy with Shadow Execution

1 code implementation28 Mar 2019 Yuxin Wang, Zeyu Ding, Guanhong Wang, Daniel Kifer, Danfeng Zhang

Sometimes, combining those two requires substantial changes to program logics: one recent paper is able to verify Report Noisy Max automatically, but it involves a complex verification system using customized program logics and verifiers.

Programming Languages D.2.4

Toward Detecting Violations of Differential Privacy

2 code implementations25 May 2018 Ding Ding, Yuxin Wang, Guanhong Wang, Danfeng Zhang, Daniel Kifer

The widespread acceptance of differential privacy has led to the publication of many sophisticated algorithms for protecting privacy.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.