Search Results for author: Wen Zhou

Found 12 papers, 3 papers with code

Spec-Gaussian: Anisotropic View-Dependent Appearance for 3D Gaussian Splatting

no code implementations24 Feb 2024 ZiYi Yang, Xinyu Gao, Yangtian Sun, Yihua Huang, Xiaoyang Lyu, Wen Zhou, Shaohui Jiao, Xiaojuan Qi, Xiaogang Jin

The recent advancements in 3D Gaussian splatting (3D-GS) have not only facilitated real-time rendering through modern GPU rasterization pipelines but have also attained state-of-the-art rendering quality.

Deformable 3D Gaussians for High-Fidelity Monocular Dynamic Scene Reconstruction

1 code implementation22 Sep 2023 ZiYi Yang, Xinyu Gao, Wen Zhou, Shaohui Jiao, Yuqing Zhang, Xiaogang Jin

Implicit neural representation has paved the way for new approaches to dynamic scene reconstruction and rendering.

Neural Rendering Novel View Synthesis

VMCDL: Vulnerability Mining Based on Cascaded Deep Learning Under Source Control Flow

no code implementations13 Mar 2023 Wen Zhou

In this paper, we mainly use the c/c++ source code data of the SARD dataset, process the source code of CWE476, CWE469, CWE516 and CWE570 vulnerability types, test the Joern vulnerability scanning function of the cutting-edge tool, and propose a new cascading deep learning model VMCDL based on source code control flow to effectively detect vulnerabilities.

Binary Classification

Based on particle swarm optimization support vector machine model of the electric car sales strategy research

no code implementations29 Nov 2022 Wen Zhou

From the perspective of constructing the classification model, this paper uses the weight coefficient (influencing factors) in the model to analyze the sales impact on different brands of electric vehicles, and optimizes the existing sales strategy.

DCDetector: An IoT terminal vulnerability mining system based on distributed deep ensemble learning under source code representation

no code implementations29 Nov 2022 Wen Zhou

This enables us to propose a code representation of sensitive sentence-related slices of source code, and to detect vulnerabilities by designing a distributed deep ensemble learning model.

Ensemble Learning Sentence +1

A Temporal Densely Connected Recurrent Network for Event-based Human Pose Estimation

1 code implementation15 Sep 2022 Zhanpeng Shao, Wen Zhou, Wuzhen Wang, Jianyu Yang, Youfu Li

By this recurrent architecture, we can explicitly model not only the sequential but also non-sequential geometric consistency across time steps to accumulate information from previous frames to recover the entire human bodies, achieving a stable and accurate human pose estimation from event data.

Pose Estimation

Improving Code Autocompletion with Transfer Learning

no code implementations12 May 2021 Wen Zhou, Seohyun Kim, Vijayaraghavan Murali, Gareth Ari Aye

Software language models have achieved promising results predicting code completion usages, and several industry studies have described successful IDE integrations.

Code Completion Transfer Learning

BEAUTY Powered BEAST

no code implementations1 Mar 2021 Kai Zhang, Zhigen Zhao, Wen Zhou

To approach this oracle power, we devise the BEAST through a regularized resampling approximation of the oracle test.

Transferable Adversarial Perturbations

no code implementations ECCV 2018 Wen Zhou, Xin Hou, Yongjun Chen, Mengyun Tang, Xiangqi Huang, Xiang Gan, Yong Yang

We first show that maximizing distance between natural images and their adversarial examples in the intermediate feature maps can improve both white-box attacks (with knowledge of the model parameters) and black-box attacks.

Cross-View Action Recognition via a Continuous Virtual Path

no code implementations CVPR 2013 Zhong Zhang, Chunheng Wang, Baihua Xiao, Wen Zhou, Shuang Liu, Cunzhao Shi

In this paper, we propose a novel method for cross-view action recognition via a continuous virtual path which connects the source view and the target view.

Action Recognition Temporal Action Localization

Cannot find the paper you are looking for? You can Submit a new open access paper.