Discovery - Top 10
By people
- 205 yiu, siu ming
- 205 yiu, siu-ming
- 205 yiu, sm
- 205 姚兆明
- 180 wu, c
- 163 lau, f
- 163 lau, fcm
- 163 lau, francis c. m.
- 163 lau, francis chi moon
- 163 劉智滿
HKU Organizations
- 2958 faculty of engineering
- 2950 school of computing and data science
- 143 hku musketeers foundation institu...
- 121 faculty of engineering
- 45 department of electrical and elec...
- 32 president's office
- 21 li ka shing faculty of medicine
- 14 faculty of science
- 12 faculty of dentistry
- 10 faculty of business and economics...
Browse
Collection's Items (Sorted by Submit Date in Descending order): 21 to 40 of 3086
Title | Author(s) | Issue Date | |
---|---|---|---|
OV-Uni3DETR: Towards Unified Open-Vocabulary 3D Object Detection via Cycle-Modality Propagation Proceeding/Conference:European Conference on Computer Vision, ECCV 2024 (29/09/2024-04/10/2024, Milan) | 29-Sep-2024 | ||
LivePhoto: Real Image Animation with Text-guided Motion Control Proceeding/Conference:European Conference on Computer Vision, ECCV 2024 (29/09/2024-04/10/2024, Milan) | 29-Sep-2024 | ||
LogoSticker: Inserting Logos into Diffusion Models for Customized Generation Proceeding/Conference:European Conference on Computer Vision, ECCV 2024 (29/09/2024-04/10/2024, Milan) | 29-Sep-2024 | ||
OpenIns3D: Snap and Lookup for 3D Open-vocabulary Instance Segmentation Proceeding/Conference:European Conference on Computer Vision, ECCV 2024 (29/09/2024-04/10/2024, Milan) | 29-Sep-2024 | ||
Mind the Interference: Retaining Pre-trained Knowledge in Parameter Efficient Continual Learning of Vision-Language Models Proceeding/Conference:European Conference on Computer Vision, ECCV 2024 (29/09/2024-04/10/2024, Milan) | 29-Sep-2024 | ||
Pixel-GS: Density Control with Pixel-aware Gradient for 3D Gaussian Splatting Proceeding/Conference:European Conference on Computer Vision, ECCV 2024 (29/09/2024-04/10/2024, Milan) | 29-Sep-2024 | ||
Preventing Model Collapse in Gaussian Process Latent Variable Models Proceeding/Conference:The Forty-first International Conference on Machine Learning (21/07/2024-27/07/2024, Vienna) | 21-Jul-2024 | ||
Visual Programming for Zero-shot Open-Vocabulary 3D Visual Grounding Proceeding/Conference:2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (17/06/2024-21/06/2024, Seattle) | 17-Jun-2024 | ||
DreamComposer: Controllable 3D Object Generation via Multi-View Conditions Proceeding/Conference:2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (17/06/2024-21/06/2024, Seattle) | 17-Jun-2024 | ||
OA-CNNs: Omni-Adaptive Sparse CNNs for 3D Semantic Segmentation Proceeding/Conference:2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (17/06/2024-21/06/2024, Seattle) | 17-Jun-2024 | ||
Stealthy Peers: Understanding Security and Privacy Risks of Peer-Assisted Video Streaming Proceeding/Conference:Proceedings - 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2024 | 2024 | ||
Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on Counterexamples Proceeding/Conference:Proceedings of the 33rd USENIX Security Symposium | 2024 | ||
Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning Proceeding/Conference:32nd USENIX Security Symposium, USENIX Security 2023 | 2023 | ||
Seeing the Forest for the Trees: Understanding Security Hazards in the 3GPP Ecosystem through Intelligent Analysis on Change Requests Proceeding/Conference:Proceedings of the 31st USENIX Security Symposium, Security 2022 | 2022 | ||
Bookworm game: Automatic discovery of LTE vulnerabilities through documentation analysis Proceeding/Conference:Proceedings - IEEE Symposium on Security and Privacy | 2021 | ||
Demystifying hidden privacy settings in mobile apps Proceeding/Conference:Proceedings - IEEE Symposium on Security and Privacy | 2019 | ||
Devils in the guidance: Predicting logic vulnerabilities in payment syndication services through automated documentation analysis Proceeding/Conference:Proceedings of the 28th USENIX Security Symposium | 2019 | ||
Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS Proceeding/Conference:Proceedings - 2016 IEEE Symposium on Security and Privacy, SP 2016 | 2016 | ||
Mass discovery of android tra‡ic imprints through instantiated partial execution Proceeding/Conference:Proceedings of the ACM Conference on Computer and Communications Security | 2017 | ||
Stealthy porn: Understanding real-world adversarial images for illicit online promotion Proceeding/Conference:Proceedings - IEEE Symposium on Security and Privacy | 2019 |
Collection's Items (Sorted by Submit Date in Descending order): 21 to 40 of 3086