Search

Your search keyword '"Sun, Ke"' showing total 6,050 results

Search Constraints

Start Over You searched for: Author "Sun, Ke" Remove constraint Author: "Sun, Ke" Search Limiters Academic (Peer-Reviewed) Journals Remove constraint Search Limiters: Academic (Peer-Reviewed) Journals
6,050 results on '"Sun, Ke"'

Search Results

2. Security Attacks on LLM-based Code Completion Tools

3. StealthDiffusion: Towards Evading Diffusion Forensic Detection through Diffusion Model

4. Optimal Treatment Allocation Strategies for A/B Testing in Partially Observable Time Series Experiments

5. Few-Shot, Robust Calibration of Single Qubit Gates Using Bayesian Robust Phase Estimation

6. OutfitAnyone: Ultra-high Quality Virtual Try-On for Any Clothing and Any Person

7. DVPE: Divided View Position Embedding for Multi-View 3D Object Detection

8. Mistral-C2F: Coarse to Fine Actor for Analytical and Reasoning Enhancement in RLHF and Effective-Merged LLMs

9. Quantum Simulation of Spin-Boson Models with Structured Bath

10. DiffusionFace: Towards a Comprehensive Dataset for Diffusion-Based Face Forgery Analysis

11. Balancing Enhancement, Harmlessness, and General Capabilities: Enhancing Conversational LLMs with Direct RLHF

12. SISSA: Real-time Monitoring of Hardware Functional Safety and Cybersecurity with In-vehicle SOME/IP Ethernet Traffic

13. Tradeoffs of Diagonal Fisher Information Matrix Estimators

14. Metabolic Heterogeneity and Potential Immunotherapeutic Responses Revealed by Single-Cell Transcriptomics of Breast Cancer

17. ICE-GRT: Instruction Context Enhancement by Generative Reinforcement based Transformers

18. Animate Anyone: Consistent and Controllable Image-to-Video Synthesis for Character Animation

23. Magmaw: Modality-Agnostic Adversarial Attacks on Machine Learning-Based Wireless Communication Systems

24. Balancing Specialized and General Skills in LLMs: The Impact of Modern Tuning and Data Strategy

25. Continual Face Forgery Detection via Historical Distribution Preserving

26. Cloth2Tex: A Customized Cloth Texture Generation Pipeline for 3D Virtual Try-On

27. Towards General Visual-Linguistic Face Forgery Detection

28. The Power of Telemetry: Uncovering Software-Based Side-Channel Attacks on Apple M1/M2 Systems

29. Hydrophobically gated memristive nanopores for neuromorphic applications

30. CamoDiffusion: Camouflaged Object Detection via Conditional Diffusion Models

31. Gloss-Free End-to-End Sign Language Translation

32. Seeking a quantum advantage with trapped-ion quantum simulations of condensed-phase chemical dynamics

50. Quantum Simulation of Polarized Light-induced Electron Transfer with A Trapped-ion Qutrit System

Catalog

Books, media, physical & digital resources