α
Research
Alpha Leak
Conferences
Topics
Top Authors
Rankings
Browse All
EN
中
Home
/
Authors
/
Ning Yu
Ning Yu
20
papers
1,349
total citations
papers (20)
Artificial Fingerprinting for Generative Models: Rooting Deepfake Attribution in Training Data
ICCV 2021
arXiv
277
citations
UniControl: A Unified Diffusion Model for Controllable Visual Generation In the Wild
NEURIPS 2023
arXiv
202
citations
ULIP-2: Towards Scalable Multimodal Pre-training for 3D Understanding
CVPR 2024
arXiv
198
citations
HIVE: Harnessing Human Feedback for Instructional Visual Editing
CVPR 2024
arXiv
168
citations
Dual Contrastive Loss and Attention for GANs
ICCV 2021
arXiv
69
citations
Inclusive GAN: Improving Data and Minority Coverage in Generative Models
ECCV 2020
arXiv
67
citations
RigorLLM: Resilient Guardrails for Large Language Models against Undesired Content
ICML 2024
arXiv
67
citations
Go-with-the-Flow: Motion-Controllable Video Diffusion Models Using Real-Time Warped Noise
CVPR 2025
arXiv
62
citations
Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image Encoders
CVPR 2023
arXiv
46
citations
RepMix: Representation Mixing for Robust Attribution of Synthesized Images
ECCV 2022
arXiv
46
citations
C-RAG: Certified Generation Risks for Retrieval-Augmented Language Models
ICML 2024
arXiv
31
citations
Hijack-GAN: Unintended-Use of Pretrained, Black-Box GANs
CVPR 2021
arXiv
31
citations
GlueGen: Plug and Play Multi-modal Encoders for X-to-image Generation
ICCV 2023
arXiv
27
citations
Mask-Free OVIS: Open-Vocabulary Instance Segmentation Without Manual Mask Annotations
CVPR 2023
arXiv
19
citations
Lux Post Facto: Learning Portrait Performance Relighting with Conditional Video Diffusion and a Hybrid Dataset
CVPR 2025
arXiv
17
citations
Reference-Based 3D-Aware Image Editing with Triplanes
CVPR 2025
arXiv
7
citations
X-InstructBLIP: A Framework for Aligning Image, 3D, Audio, Video to LLMs and its Emergent Cross-modal Reasoning
ECCV 2024
6
citations
FlashDepth: Real-time Streaming Video Depth Estimation at 2K Resolution
ICCV 2025
arXiv
6
citations
Detecting Adversarial Data Using Perturbation Forgery
CVPR 2025
arXiv
3
citations
Text2Data: Low-Resource Data Generation with Textual Control
AAAI 2025
arXiv
0
citations