Search Results for author: Jun-Hai Yong

Found 10 papers, 8 papers with code

Hyper-YOLO: When Visual Object Detection Meets Hypergraph Computation

1 code implementation9 Aug 2024 Yifan Feng, Jiangang Huang, Shaoyi Du, Shihui Ying, Jun-Hai Yong, Yipeng Li, Guiguang Ding, Rongrong Ji, Yue Gao

We introduce Hyper-YOLO, a new object detection method that integrates hypergraph computations to capture the complex high-order correlations among visual features.

object-detection Object Detection

Distribution-Aware Data Expansion with Diffusion Models

1 code implementation11 Mar 2024 Haowei Zhu, Ling Yang, Jun-Hai Yong, Hongzhi Yin, Jiawei Jiang, Meng Xiao, Wentao Zhang, Bin Wang

In this paper, we propose DistDiff, a training-free data expansion framework based on the distribution-aware diffusion model.

Image Generation Informativeness

Relightable and Animatable Neural Avatars from Videos

no code implementations20 Dec 2023 Wenbin Lin, Chengwei Zheng, Jun-Hai Yong, Feng Xu

To solve this ill-posed problem, we propose novel techniques to better model the geometry and shadow changes.

Physical Interaction: Reconstructing Hand-object Interactions with Physics

1 code implementation22 Sep 2022 Haoyu Hu, Xinyu Yi, Hao Zhang, Jun-Hai Yong, Feng Xu

Single view-based reconstruction of hand-object interaction is challenging due to the severe observation missing caused by occlusions.

Object

OcclusionFusion: Occlusion-aware Motion Estimation for Real-time Dynamic 3D Reconstruction

1 code implementation CVPR 2022 Wenbin Lin, Chengwei Zheng, Jun-Hai Yong, Feng Xu

In our technique, the motion of visible regions is first estimated and combined with temporal information to infer the motion of the occluded regions through an LSTM-involved graph neural network.

3D Reconstruction Graph Neural Network +1

Finding Optimal Tangent Points for Reducing Distortions of Hard-label Attacks

1 code implementation NeurIPS 2021 Chen Ma, Xiangyu Guo, Li Chen, Jun-Hai Yong, Yisen Wang

In this paper, we propose a novel geometric-based approach called Tangent Attack (TA), which identifies an optimal tangent point of a virtual hemisphere located on the decision boundary to reduce the distortion of the attack.

Hard-label Attack

Simulating Unknown Target Models for Query-Efficient Black-box Attacks

1 code implementation CVPR 2021 Chen Ma, Li Chen, Jun-Hai Yong

The meta-gradients of this loss are then computed and accumulated from multiple tasks to update the Simulator and subsequently improve generalization.

Knowledge Distillation Meta-Learning

Cannot find the paper you are looking for? You can Submit a new open access paper.