Search

Your search keyword '"Sun, Ke"' showing total 2,305 results

Search Constraints

Start Over You searched for: Author "Sun, Ke" Remove constraint Author: "Sun, Ke" Search Limiters Full Text Remove constraint Search Limiters: Full Text
2,305 results on '"Sun, Ke"'

Search Results

1. While GitHub Copilot Excels at Coding, Does It Ensure Responsible Output?

2. StealthDiffusion: Towards Evading Diffusion Forensic Detection through Diffusion Model

3. Optimal Treatment Allocation Strategies for A/B Testing in Partially Observable Time Series Experiments

4. Few-Shot, Robust Calibration of Single Qubit Gates Using Bayesian Robust Phase Estimation

5. OutfitAnyone: Ultra-high Quality Virtual Try-On for Any Clothing and Any Person

6. DVPE: Divided View Position Embedding for Multi-View 3D Object Detection

7. Mistral-C2F: Coarse to Fine Actor for Analytical and Reasoning Enhancement in RLHF and Effective-Merged LLMs

8. Quantum Simulation of Spin-Boson Models with Structured Bath

9. DiffusionFace: Towards a Comprehensive Dataset for Diffusion-Based Face Forgery Analysis

10. Balancing Enhancement, Harmlessness, and General Capabilities: Enhancing Conversational LLMs with Direct RLHF

11. SISSA: Real-time Monitoring of Hardware Functional Safety and Cybersecurity with In-vehicle SOME/IP Ethernet Traffic

12. Tradeoffs of Diagonal Fisher Information Matrix Estimators

13. ICE-GRT: Instruction Context Enhancement by Generative Reinforcement based Transformers

14. Animate Anyone: Consistent and Controllable Image-to-Video Synthesis for Character Animation

15. Magmaw: Modality-Agnostic Adversarial Attacks on Machine Learning-Based Wireless Communication Systems

16. Balancing Specialized and General Skills in LLMs: The Impact of Modern Tuning and Data Strategy

17. Continual Face Forgery Detection via Historical Distribution Preserving

18. Cloth2Tex: A Customized Cloth Texture Generation Pipeline for 3D Virtual Try-On

19. Towards General Visual-Linguistic Face Forgery Detection

20. The Power of Telemetry: Uncovering Software-Based Side-Channel Attacks on Apple M1/M2 Systems

21. Hydrophobically gated memristive nanopores for neuromorphic applications

22. CamoDiffusion: Camouflaged Object Detection via Conditional Diffusion Models

23. Gloss-Free End-to-End Sign Language Translation

24. Seeking a quantum advantage with trapped-ion quantum simulations of condensed-phase chemical dynamics

25. Quantum Simulation of Polarized Light-induced Electron Transfer with A Trapped-ion Qutrit System

26. InterFormer: Real-time Interactive Image Segmentation

37. FineIBT: Fine-grain Control-flow Enforcement with Indirect Branch Tracking

38. Mathematical Challenges in Deep Learning

39. Transformed Distribution Matching for Missing Value Imputation

40. Realization of Scalable Cirac-Zoller Multi-Qubit Gates

41. Rare top quark decays in the minimal R-symmetric supersymmetric standard model

42. Some Properties of the Nash Equilibrium in $2 \times 2$ Zero-Sum Games

43. $2 \times 2$ Zero-Sum Games with Commitments and Noisy Observations

44. Identification, Amplification and Measurement: A bridge to Gaussian Differential Privacy

45. Angle-robust Two-Qubit Gates in a Linear Ion Crystal

46. How Does Value Distribution in Distributional Reinforcement Learning Help Optimization?

47. Differential Analysis of Disability in Different Settings in China: Based on a Survey of 23 922 Older Adults

48. The lepton flavor violating decays of vector mesons in the MRSSM

49. An adaptive model checking test for functional linear model

Catalog

Books, media, physical & digital resources