Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
Deeply-Supervised Nets
- Chen-Yu Lee, Saining Xie, P. W. Gallagher, Z. Zhang, Zhuowen Tu
- Computer Science, Mathematics
- AISTATS
- 17 September 2014
TLDR
GradNorm: Gradient Normalization for Adaptive Loss Balancing in Deep Multitask Networks
- Z. Chen, Vijay Badrinarayanan, Chen-Yu Lee, Andrew Rabinovich
- Computer Science
- ICML
- 7 November 2017
TLDR
Recursive Recurrent Nets with Attention Modeling for OCR in the Wild
- Chen-Yu Lee, Simon Osindero
- Computer Science
- IEEE Conference on Computer Vision and Pattern…
- 9 March 2016
TLDR
Generalizing Pooling Functions in Convolutional Neural Networks: Mixed, Gated, and Tree
- Chen-Yu Lee, P. W. Gallagher, Zhuowen Tu
- Computer Science, Mathematics
- AISTATS
- 30 September 2015
TLDR
Sliced Wasserstein Discrepancy for Unsupervised Domain Adaptation
- Chen-Yu Lee, Tanmay Batra, M. H. Baig, D. Ulbricht
- Computer Science, Mathematics
- IEEE/CVF Conference on Computer Vision and…
- 10 March 2019
TLDR
RoomNet: End-to-End Room Layout Estimation
- Chen-Yu Lee, Vijay Badrinarayanan, Tomasz Malisiewicz, Andrew Rabinovich
- Computer Science
- IEEE International Conference on Computer Vision…
- 18 March 2017
TLDR
Training Deeper Convolutional Networks with Deep Supervision
- Liwei Wang, Chen-Yu Lee, Zhuowen Tu, S. Lazebnik
- Computer Science
- ArXiv
- 11 May 2015
TLDR
An O(log n) Parallel Algorithm for Constructing a Spanning Tree on Permutation Graphs
- Yue-Li Wang, Hon-Chan Chen, Chen-Yu Lee
- Mathematics, Computer Science
- Inf. Process. Lett.
- 27 October 1995
TLDR
Removing rain and snow in a single image using saturation and visibility features
- S. Pei, Yu-Tai Tsai, Chen-Yu Lee
- Computer Science
- IEEE International Conference on Multimedia and…
- 14 July 2014
TLDR
Comments on Saeednia's improved scheme for the hill cipher
- Chu-Hsing Lin, C. Lee, Chen-Yu Lee
- Mathematics
- 1 July 2004
Abstract In 2000, Saeednia proposed a new scheme to make the Hill cipher secure. The author makes use of permutations of columns and rows of a matrix to get a different key for encrypting each… Expand