default search action
Kam Woh Ng
Person information
- affiliation: University of Surrey, UK
- affiliation: WeBank AI Lab, Shenzhen, China
- affiliation: University of Malaya, Center of Image and Signal Processing, Kuala Lumpur, Malaysia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c9]Kam Woh Ng, Xiatian Zhu, Yi-Zhe Song, Tao Xiang:
ConceptHash: Interpretable Fine-Grained Hashing via Concept Discovery. CVPR Workshops 2024: 1211-1223 - [c8]Kam Woh Ng, Xiatian Zhu, Yi-Zhe Song, Tao Xiang:
PartCraft: Crafting Creative Objects by Parts. ECCV (9) 2024: 420-437 - [i15]Kam Woh Ng, Xiatian Zhu, Yi-Zhe Song, Tao Xiang:
ConceptHash: Interpretable Fine-Grained Hashing via Concept Discovery. CoRR abs/2406.08457 (2024) - [i14]Kam Woh Ng, Xiatian Zhu, Yi-Zhe Song, Tao Xiang:
PartCraft: Crafting Creative Objects by Parts. CoRR abs/2407.04604 (2024) - [i13]Zijian Zhou, Shikun Liu, Xiao Han, Haozhe Liu, Kam Woh Ng, Tian Xie, Yuren Cong, Hang Li, Mengmeng Xu, Juan-Manuel Pérez-Rúa, Aditya Patel, Tao Xiang, Miaojing Shi, Sen He:
Learning Flow Fields in Attention for Controllable Person Image Generation. CoRR abs/2412.08486 (2024) - 2023
- [j3]Qiang Yang, Anbu Huang, Lixin Fan, Chee Seng Chan, Jian Han Lim, Kam Woh Ng, Ding Sheng Ong, Bowen Li:
Federated Learning with Privacy-preserving and Model IP-right-protection. Int. J. Autom. Comput. 20(1): 19-37 (2023) - [c7]Kam Woh Ng, Xiatian Zhu, Jiun Tian Hoe, Chee Seng Chan, Tianyu Zhang, Yi-Zhe Song, Tao Xiang:
Unsupervised Hashing with Similarity Distribution Calibration. BMVC 2023: 53-69 - [i12]Kam Woh Ng, Xiatian Zhu, Jiun Tian Hoe, Chee Seng Chan, Tianyu Zhang, Yi-Zhe Song, Tao Xiang:
Unsupervised Hashing via Similarity Distribution Calibration. CoRR abs/2302.07669 (2023) - [i11]Kam Woh Ng, Xiatian Zhu, Yi-Zhe Song, Tao Xiang:
DreamCreature: Crafting Photorealistic Virtual Creatures from Imagination. CoRR abs/2311.15477 (2023) - 2022
- [j2]Lixin Fan, Kam Woh Ng, Chee Seng Chan, Qiang Yang:
DeepIPR: Deep Neural Network Ownership Verification With Passports. IEEE Trans. Pattern Anal. Mach. Intell. 44(10): 6122-6139 (2022) - [j1]Jian Han Lim, Chee Seng Chan, Kam Woh Ng, Lixin Fan, Qiang Yang:
Protect, show, attend and tell: Empowering image captioning models with ownership protection. Pattern Recognit. 122: 108285 (2022) - [c6]Jack Min Ong, Sze Jue Yang, Kam Woh Ng, Chee Seng Chan:
Image-based plant identification with taxonomy aware architecture. CLEF (Working Notes) 2022: 2168-2174 - [c5]Jing Chong Beh, Kam Woh Ng, Jie-Long Kew, Che-Tsung Lin, Chee Seng Chan, Shang-Hong Lai, Christopher Zach:
CyEDA: Cycle-Object Edge Consistency Domain Adaptation. ICIP 2022: 2986-2990 - [i10]Xiao Han, Kam Woh Ng, Sauradip Nag, Zhiyu Qu:
Large-Scale Product Retrieval with Weakly Supervised Representation Learning. CoRR abs/2208.00955 (2022) - 2021
- [c4]Ding Sheng Ong, Chee Seng Chan, Kam Woh Ng, Lixin Fan, Qiang Yang:
Protecting Intellectual Property of Generative Adversarial Networks From Ambiguity Attacks. CVPR 2021: 3630-3639 - [c3]Jiun Tian Hoe, Kam Woh Ng, Tianyu Zhang, Chee Seng Chan, Yi-Zhe Song, Tao Xiang:
One Loss for All: Deep Hashing with a Single Cosine Similarity based Learning Objective. NeurIPS 2021: 24286-24298 - [i9]Ding Sheng Ong, Chee Seng Chan, Kam Woh Ng, Lixin Fan, Qiang Yang:
Protecting Intellectual Property of Generative Adversarial Networks from Ambiguity Attack. CoRR abs/2102.04362 (2021) - [i8]Chang Liu, Lixin Fan, Kam Woh Ng, Yilun Jin, Ce Ju, Tianyu Zhang, Chee Seng Chan, Qiang Yang:
Ternary Hashing. CoRR abs/2103.09173 (2021) - [i7]Jiun Tian Hoe, Kam Woh Ng, Tianyu Zhang, Chee Seng Chan, Yi-Zhe Song, Tao Xiang:
One Loss for All: Deep Hashing with a Single Cosine Similarity based Learning Objective. CoRR abs/2109.14449 (2021) - 2020
- [c2]Lixin Fan, Kam Woh Ng, Ce Ju, Tianyu Zhang, Chee Seng Chan:
Deep Polarized Network for Supervised Learning of Accurate Binary Hashing Codes. IJCAI 2020: 825-831 - [p1]Lixin Fan, Kam Woh Ng, Ce Ju, Tianyu Zhang, Chang Liu, Chee Seng Chan, Qiang Yang:
Rethinking Privacy Preserving Deep Learning: How to Evaluate and Thwart Privacy Attacks. Federated Learning 2020: 32-50 - [i6]Lixin Fan, Kam Woh Ng, Ce Ju, Tianyu Zhang, Chang Liu, Chee Seng Chan, Qiang Yang:
Rethinking Privacy Preserving Deep Learning: How to Evaluate and Thwart Privacy Attacks. CoRR abs/2006.11601 (2020) - [i5]Jian Han Lim, Chee Seng Chan, Kam Woh Ng, Lixin Fan, Qiang Yang:
Protect, Show, Attend and Tell: Image Captioning Model with Ownership Protection. CoRR abs/2008.11009 (2020) - [i4]Yilun Jin, Lixin Fan, Kam Woh Ng, Ce Ju, Qiang Yang:
Rethinking Uncertainty in Deep Learning: Whether and How it Improves Robustness. CoRR abs/2011.13538 (2020)
2010 – 2019
- 2019
- [c1]Lixin Fan, Kam Woh Ng, Chee Seng Chan:
Rethinking Deep Neural Network Ownership Verification: Embedding Passports to Defeat Ambiguity Attacks. NeurIPS 2019: 4716-4725 - [i3]Kam Woh Ng, Lixin Fan, Chee Seng Chan:
A Universal Logic Operator for Interpretable Deep Convolution Networks. CoRR abs/1901.08551 (2019) - [i2]Lixin Fan, Kam Woh Ng, Chee Seng Chan:
Digital Passport: A Novel Technological Strategy for Intellectual Property Protection of Convolutional Neural Networks. CoRR abs/1905.04368 (2019) - [i1]Lixin Fan, Kam Woh Ng, Chee Seng Chan:
Rethinking Deep Neural Network Ownership Verification: Embedding Passports to Defeat Ambiguity Attacks. CoRR abs/1909.07830 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-22 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint