Search

Your search keyword '"Zhang, Xiangyu"' showing total 620 results

Search Constraints

Start Over You searched for: Author "Zhang, Xiangyu" Remove constraint Author: "Zhang, Xiangyu" Publication Year Range This year Remove constraint Publication Year Range: This year
620 results on '"Zhang, Xiangyu"'

Search Results

1. Continual LLaVA: Continual Instruction Tuning in Large Vision-Language Models

2. Dust extinction-curve variation in the translucent interstellar medium is driven by PAH growth

3. Less is More: DocString Compression in Code Generation

4. The Dust Extinction Curve: Beyond R(V)

5. High-Throughput Information Storage in An Intelligent Response Phosphor

6. m-weak group MP inverse

7. Enhancement of piezoelectric response in V doped LiNbO3 films deposited by RF magnetron sputtering

8. Quantum Phonon Dynamics Induced Spontaneous Spin-Orbit Coupling

9. Reconstructive Visual Instruction Tuning

10. ASPIRER: Bypassing System Prompts With Permutation-based Backdoors in LLMs

11. DIGIMON: Diagnosis and Mitigation of Sampling Skew for Reinforcement Learning based Meta-Planner in Robot Navigation

12. Auto-Landmark: Acoustic Landmark Dataset and Open-Source Toolkit for Landmark Extraction

13. ROCAS: Root Cause Analysis of Autonomous Driving Accidents via Cyber-Physical Co-mutation

14. Rethinking Mamba in Speech Processing by Self-Supervised Models

15. Detection of False Data Injection Attacks (FDIA) on Power Dynamical Systems With a State Prediction Method

16. An Explicit Wavefunction of the Interacting Non-Hermitian Spin-1/2 1D System

17. General OCR Theory: Towards OCR-2.0 via a Unified End-to-end Model

18. Discovery of False Data Injection Schemes on Frequency Controllers with Reinforcement Learning

19. Panacea+: Panoramic and Controllable Video Generation for Autonomous Driving

20. XNN: Paradigm Shift in Mitigating Identity Leakage within Cloud-Enabled Deep Learning

21. Poisoning with A Pill: Circumventing Detection in Federated Learning

22. Unveiling the Milky Way dust extinction curve in 3D

23. An Empirical Extinction Curve Revealed by Gaia XP Spectra and LAMOST

24. UNIT: Backdoor Mitigation via Automated Neural Distribution Tightening

25. DeCE: Deceptive Cross-Entropy Loss Designed for Defending Backdoor Attacks

26. DreamBench++: A Human-Aligned Benchmark for Personalized Image Generation

27. Binaural Selective Attention Model for Target Speaker Extraction

28. RL-JACK: Reinforcement Learning-powered Black-box Jailbreaking Attack against LLMs

29. When LLM Meets DRL: Advancing Jailbreaking Efficiency via DRL-guided Search

30. CodeScore-R: An Automated Robustness Metric for Assessing the FunctionalCorrectness of Code Synthesis

31. Self-supervised Adversarial Training of Monocular Depth Estimation against Physical-World Attacks

32. Mutual Information Guided Backdoor Mitigation for Pre-trained Encoders

33. Source Code Foundation Models are Transferable Binary Analysis Knowledge Bases

34. Is a 3D-Tokenized LLM the Key to Reliable Autonomous Driving?

35. Reflected Flow Matching

36. Focus Anywhere for Fine-grained Multi-page Document Understanding

37. Mamba in Speech: Towards an Alternative to Self-Attention

38. Striking a Balance between Classical and Deep Learning Approaches in Natural Language Processing Pedagogy

39. Music Emotion Prediction Using Recurrent Neural Networks

40. Self-Supervised Visual Preference Alignment

41. Threat Behavior Textual Search by Attention Graph Isomorphism

42. OneChart: Purify the Chart Structural Extraction via One Auxiliary Token

43. BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks

44. SubjectDrive: Scaling Generative Data in Autonomous Driving via Subject Control

45. LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning

46. Aligning Speech to Languages to Enhance Code-switching Speech Recognition

Catalog

Books, media, physical & digital resources