Follow
Xiaoyu (Grace) Chu
Xiaoyu (Grace) Chu
Staff Software Engineer at Google Research
Verified email at google.com
Title
Cited by
Cited by
Year
Searching for mobilenetv3
A Howard, M Sandler, G Chu, LC Chen, B Chen, M Tan, W Wang, Y Zhu, ...
Proceedings of the IEEE/CVF international conference on computer vision …, 2019
92492019
Can weight sharing outperform random architecture search? an investigation with tunas
G Bender, H Liu, B Chen, G Chu, S Cheng, PJ Kindermans, QV Le
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2020
1602020
Searching for mobilenetv3. arXiv 2019
A Howard, M Sandler, G Chu, LC Chen, B Chen, M Tan, W Wang, Y Zhu, ...
arXiv preprint arXiv:1905.02244, 1905
861905
Geo-Aware Networks for Fine Grained Recognition
G Chu, B Potetz, W Wang, A Howard, Y Song, F Brucher, T Leung, ...
International Conference on Computer Vision 2019 Workshop, 2019
832019
Searching for mobilenetV3. 2019
A Howard, M Sandler, G Chu, LC Chen, B Chen, M Tan, W Wang, Y Zhu, ...
arXiv preprint arXiv:1905.02244, 1905
541905
Optimal multicast capacity and delay tradeoffs in MANETs: A global perspective
Y Wang, X Chu, X Wang, Y Cheng
2011 Proceedings IEEE INFOCOM, 640-648, 2011
442011
Forensically determining the order of signal processing operations
MC Stamm, X Chu, KJR Liu
2013 IEEE International Workshop on Information Forensics and Security (WIFS …, 2013
382013
Discovering multi-hardware mobile models via architecture search
G Chu, O Arikan, G Bender, W Wang, A Brighton, PJ Kindermans, H Liu, ...
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021
322021
Optimal multicast capacity and delaytradeoffs in MANETs
J Zhang, X Wang, X Tian, Y Wang, X Chu, Y Cheng
IEEE Transactions on Mobile Computing 13 (5), 1104-1117, 2013
282013
Detectability of the order of operations: An information theoretic approach
X Chu, Y Chen, KJR Liu
IEEE Transactions on Information Forensics and Security 11 (4), 823-836, 2015
222015
On antiforensic concealability with rate-distortion tradeoff
X Chu, MC Stamm, Y Chen, KJR Liu
IEEE Transactions on Image Processing 24 (3), 1087-1100, 2015
172015
Compressive sensing forensics
X Chu, MC Stamm, KJR Liu
IEEE Transactions on Information Forensics and Security 10 (7), 1416-1431, 2015
152015
Searching for mobilenetv3. CoRR abs/1905.02244 (2019)
A Howard, M Sandler, G Chu, L Chen, B Chen, M Tan, W Wang, Y Zhu, ...
arXiv preprint arXiv:1905.02244, 1905
141905
Forensic identification of compressively sensed images
X Chu, MC Stamm, WS Lin, KJR Liu
2012 IEEE International Conference on Acoustics, Speech and Signal …, 2012
132012
Multi-path neural networks for on-device multi-domain visual classification
Q Wang, J Ke, J Greaves, G Chu, G Bender, L Sbaiz, A Go, A Howard, ...
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer …, 2021
102021
Information theoretical limit of media forensics: The forensicability
X Chu, Y Chen, MC Stamm, KJR Liu
IEEE Transactions on Information Forensics and Security 11 (4), 774-788, 2015
102015
Information theoretical limit of compression forensics
X Chu, Y Chen, MC Stamm, KJR Liu
2014 IEEE International Conference on Acoustics, Speech and Signal …, 2014
102014
Concealability-rate-distortion tradeoff in image compression anti-forensics
X Chu, MC Stamm, Y Chen, KJR Liu
2013 IEEE International Conference on Acoustics, Speech and Signal …, 2013
82013
An information theoretic framework for order of operations forensics
X Chu, Y Chen, KJR Liu
2016 IEEE International Conference on Acoustics, Speech and Signal …, 2016
42016
Forensic identification of compressively sensed signals
X Chu, MC Stamm, KJR Liu
2012 19th IEEE International Conference on Image Processing, 257-260, 2012
42012
The system can't perform the operation now. Try again later.
Articles 1–20