Search

Your search keyword '"Sun, Ke"' showing total 157 results

Search Constraints

Start Over You searched for: Author "Sun, Ke" Remove constraint Author: "Sun, Ke" Publication Type Reports Remove constraint Publication Type: Reports
157 results on '"Sun, Ke"'

Search Results

1. Security Attacks on LLM-based Code Completion Tools

2. StealthDiffusion: Towards Evading Diffusion Forensic Detection through Diffusion Model

3. Optimal Treatment Allocation Strategies for A/B Testing in Partially Observable Time Series Experiments

4. Few-Shot, Robust Calibration of Single Qubit Gates Using Bayesian Robust Phase Estimation

5. OutfitAnyone: Ultra-high Quality Virtual Try-On for Any Clothing and Any Person

6. DVPE: Divided View Position Embedding for Multi-View 3D Object Detection

7. Mistral-C2F: Coarse to Fine Actor for Analytical and Reasoning Enhancement in RLHF and Effective-Merged LLMs

8. Quantum Simulation of Spin-Boson Models with Structured Bath

9. DiffusionFace: Towards a Comprehensive Dataset for Diffusion-Based Face Forgery Analysis

10. Balancing Enhancement, Harmlessness, and General Capabilities: Enhancing Conversational LLMs with Direct RLHF

11. SISSA: Real-time Monitoring of Hardware Functional Safety and Cybersecurity with In-vehicle SOME/IP Ethernet Traffic

12. Tradeoffs of Diagonal Fisher Information Matrix Estimators

13. ICE-GRT: Instruction Context Enhancement by Generative Reinforcement based Transformers

14. Animate Anyone: Consistent and Controllable Image-to-Video Synthesis for Character Animation

15. Magmaw: Modality-Agnostic Adversarial Attacks on Machine Learning-Based Wireless Communication Systems

16. Balancing Specialized and General Skills in LLMs: The Impact of Modern Tuning and Data Strategy

17. Continual Face Forgery Detection via Historical Distribution Preserving

18. Cloth2Tex: A Customized Cloth Texture Generation Pipeline for 3D Virtual Try-On

19. Towards General Visual-Linguistic Face Forgery Detection

20. The Power of Telemetry: Uncovering Software-Based Side-Channel Attacks on Apple M1/M2 Systems

21. Hydrophobically gated memristive nanopores for neuromorphic applications

22. CamoDiffusion: Camouflaged Object Detection via Conditional Diffusion Models

23. Gloss-Free End-to-End Sign Language Translation

24. Seeking a quantum advantage with trapped-ion quantum simulations of condensed-phase chemical dynamics

25. Quantum Simulation of Polarized Light-induced Electron Transfer with A Trapped-ion Qutrit System

26. InterFormer: Real-time Interactive Image Segmentation

27. FineIBT: Fine-grain Control-flow Enforcement with Indirect Branch Tracking

28. Mathematical Challenges in Deep Learning

29. Transformed Distribution Matching for Missing Value Imputation

30. Realization of Scalable Cirac-Zoller Multi-Qubit Gates

31. Rare top quark decays in the minimal R-symmetric supersymmetric standard model

32. Some Properties of the Nash Equilibrium in $2 \times 2$ Zero-Sum Games

33. $2 \times 2$ Zero-Sum Games with Commitments and Noisy Observations

34. Identification, Amplification and Measurement: A bridge to Gaussian Differential Privacy

35. Angle-robust Two-Qubit Gates in a Linear Ion Crystal

36. How Does Return Distribution in Distributional Reinforcement Learning Help Optimization?

37. The lepton flavor violating decays of vector mesons in the MRSSM

38. An adaptive model checking test for functional linear model

39. Idea and Theory of Particle Access

40. Non-linear Embeddings in Hilbert Simplex Geometry

41. You Cannot Always Win the Race: Analyzing the LFENCE/JMP Mitigation for Branch Target Injection

42. RTGNN: A Novel Approach to Model Stochastic Traffic Dynamics

43. Distributional Reinforcement Learning by Sinkhorn Divergence

44. Fair Wrapping for Black-box Predictions

45. Contrastive Laplacian Eigenmaps

46. Dual Contrastive Learning for General Face Forgery Detection

47. Asymptotic Learning Requirements for Stealth Attacks on Linearized State Estimation

48. Pareto Adversarial Robustness: Balancing Spatial Robustness and Sensitivity-based Robustness

49. Damped Anderson Mixing for Deep Reinforcement Learning: Acceleration, Convergence, and Stabilization

50. High-order Tensor Pooling with Attention for Action Recognition

Catalog

Books, media, physical & digital resources