Weifeng Chen

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2024
OOTDiffusion: Outfitting Fusion based Latent Diffusion for Controllable Virtual Try-on.
CoRR, 2024

ViGoR: Improving Visual Grounding of Large Vision Language Models with Fine-Grained Reward Modeling.
CoRR, 2024

DiffusionGPT: LLM-Driven Text-to-Image Generation System.
CoRR, 2024

AffordanceLLM: Grounding Affordance from Vision Language Models.
CoRR, 2024

2023
Contrastive Transformer Learning with Proximity Data Generation for Text-Based Person Search.
CoRR, 2023

Control-A-Video: Controllable Text-to-Video Generation with Diffusion Models.
CoRR, 2023

Enhanced moving finite element method based on error geometric estimation for simultaneous trajectory optimization.
Autom., 2023

MSRL: Distributed Reinforcement Learning with Dataflow Fragments.
Proceedings of the 2023 USENIX Annual Technical Conference, 2023

MixerSR: A New Feature Extraction Paradigm for Single Image Super-Resolution.
Proceedings of the 15th International Conference on Digital Image Processing, 2023

Element-Wise Layer Normalization for Continuous Signal Representation.
Proceedings of the 15th International Conference on Digital Image Processing, 2023

2022
SLAM Overview: From Single Sensor to Heterogeneous Fusion.
Remote. Sens., December, 2022

An Overview on Visual SLAM: From Tradition to Semantic.
Remote. Sens., 2022

Visual analytics of genealogy with attribute-enhanced topological clustering.
J. Vis., 2022

Fengshenbang 1.0: Being the Foundation of Chinese Cognitive Intelligence.
CoRR, 2022

Parameter estimation with improved model prediction for over-parametrized nonlinear systems.
Comput. Chem. Eng., 2022

Phase-MLP for Generalizable Implicit Neural Representations.
Proceedings of the 4th International Conference on Advanced Information Science and System, 2022

2021
A surface and interior material identification technology based on dual-mode sensor.
Proceedings of the 16th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2021

Humble Teachers Teach Better Students for Semi-Supervised Object Detection.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Learning to Sit: Synthesizing Human-Chair Interactions via Hierarchical Control.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Learning Single-Image 3D from the Internet.
PhD thesis, 2020

Introducing <i>KIPET</i>: A novel open-source software package for kinetic parameter estimation from experimental datasets including spectra.
Comput. Chem. Eng., 2020

OASIS: A Large-Scale Dataset for Single Image 3D in the Wild.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

2019
The influence of transformed government on citizen trust: insights from Bahrain.
Inf. Technol. Dev., 2019

Learning Single-Image Depth From Videos Using Quality Assessment Networks.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

Blockchain - Can It Solve the Security Issues and Fraud Expenses for Credit Card Commerce?
Proceedings of the 5th IEEE International Conference on Big Data Security on Cloud, 2019

2018
Cluster-aware arrangement of the parallel coordinate plots.
J. Vis. Lang. Comput., 2018

Learning Single-Image Depth from Videos using Quality Assessment Networks.
CoRR, 2018

2017
An Improved Privacy Protection Security Protocol Based on NFC.
Int. J. Netw. Secur., 2017

Surface Normals in the Wild.
Proceedings of the IEEE International Conference on Computer Vision, 2017

2016
Trajectory optimization for lunar soft landing with a Hamiltonian-based adaptive mesh refinement strategy.
Adv. Eng. Softw., 2016

A unified trajectory optimization framework for lunar ascent.
Adv. Eng. Softw., 2016

Single-Image Depth Perception in the Wild.
Proceedings of the Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, 2016

2015
VFA: A Variable-Factor Authentication Framework for Mobile Users.
J. Commun., 2015

Mobile OS security: Current situation and future directions.
Proceedings of the IEEE International Conference on Electro/Information Technology, 2015

An examination of distributed denial of service attacks.
Proceedings of the IEEE International Conference on Electro/Information Technology, 2015

2014
Privacy-assured substructure similarity query over encrypted graph-structured data in cloud.
Secur. Commun. Networks, 2014

2013
INCOME: Practical land monitoring in precision agriculture with sensor networks.
Comput. Commun., 2013

COCA: Constructing optimal clustering architecture to maximize sensor network lifetime.
Comput. Commun., 2013

Privacy-Assured Similarity Query over Graph-Structured Data in Mobile Cloud.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

Sensitivity embedded homotopy-based backtracking method for chemical process simulation.
Proceedings of the 10th IEEE International Conference on Control and Automation, 2013

2011
Two Birds With One Stone: Wireless Access Point Deployment for Both Coverage and Localization.
IEEE Trans. Veh. Technol., 2011

Poster: collaborative policy administration.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Wireless Access Point Deployment for Both Coverage and Localization.
Proceedings of the Fifth International Conference on Networking, Architecture, and Storage, 2010

A modified mnemonic enhancement optimization method for solving parametric nonlinear programming problems.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010

2008
Modelling Threshold Secret Sharing Schemes in Ad Hoc Networks.
Proceedings of The 2008 IEEE International Conference on Networking, 2008

2007
A Soft Constraint Privacy Model based on Identifiability.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

2006
HPtaa database-potential target genes for clinical diagnosis and immunotherapy of human carcinoma.
Nucleic Acids Res., 2006

2004
Agent-Based Data Mining Approach for the Prediction of UK and Irish Companies Performance.
Proceedings of the Key Technologies for Data Management, 2004

2003
Recommendations in Using Group Key Management Algorithms.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

2002
Performance Comparison of Stateful and Stateless Group Rekeying Algorithms.
Proceedings of the Networked Group Communication, Fourth International COST264 Workshop, 2002


  Loading...