Search

Your search keyword '"Zhou Pan"' showing total 167 results

Search Constraints

Start Over You searched for: Author "Zhou Pan" Remove constraint Author: "Zhou Pan" Database OAIster Remove constraint Database: OAIster
167 results on '"Zhou Pan"'

Search Results

3. Gamba: Marry Gaussian Splatting with Mamba for single view 3D reconstruction

4. Optimization-based Prompt Injection Attack to LLM-as-a-Judge

5. Genetic Auto-prompt Learning for Pre-trained Code Intelligence Language Models

6. Friendly Sharpness-Aware Minimization

7. What Makes Good Collaborative Views? Contrastive Mutual Information Maximization for Multi-Agent Perception

8. Few-shot Learner Parameterization by Diffusion Time-steps

9. MLLM-as-a-Judge: Assessing Multimodal LLM-as-a-Judge with Vision-Language Benchmark

10. Consistent3D: Towards Consistent High-Fidelity Text-to-3D Generation with Deterministic Sampling Prior

11. The NPU-ASLP-LiAuto System Description for Visual Speech Recognition in CNVSRC 2023

12. ICMC-ASR: The ICASSP 2024 In-Car Multi-Channel Automatic Speech Recognition Challenge

13. MLCA-AVSR: Multi-Layer Cross Attention Fusion based Audio-Visual Speech Recognition

14. The Security and Privacy of Mobile Edge Computing: An Artificial Intelligence Perspective

15. AutoJailbreak: Exploring Jailbreak Attacks and Defenses through a Dependency Lens

16. 4-bit Shampoo for Memory-Efficient Network Training

17. LOVA3: Learning to Visual Question Answering, Asking and Assessment

18. Diffusion Time-step Curriculum for One Image to 3D Generation

19. Physical Backdoor: Towards Temperature-based Backdoor Attacks in the Physical World

20. CodeIP: A Grammar-Guided Multi-Bit Watermark for Large Language Models of Code

21. Does Your Neural Code Completion Model Use My Code? A Membership Inference Approach

22. You Can Ground Earlier than See: An Effective and Efficient Pipeline for Temporal Sentence Grounding in Compressed Videos

23. Unlearnable Graph: Protecting Graphs from Unauthorized Exploitation

24. Jointly Visual- and Semantic-Aware Graph Memory Networks for Temporal Sentence Localization in Videos

25. Contrastive Video Question Answering via Video Graph Transformer

26. Tracking Objects and Activities with Attention for Temporal Sentence Grounding

27. Backdoor Attacks to Pre-trained Unified Foundation Models

28. STPrivacy: Spatio-Temporal Privacy-Preserving Action Recognition

29. Hypotheses Tree Building for One-Shot Temporal Sentence Localization

30. Rethinking the Video Sampling and Reasoning Strategies for Temporal Sentence Grounding

31. Transform-Equivariant Consistency Learning for Temporal Sentence Grounding

32. BadGPT: Exploring Security Vulnerabilities of ChatGPT via Backdoor Attacks to InstructGPT

33. InceptionNeXt: When Inception Meets ConvNeXt

34. MDTv2: Masked Diffusion Transformer is a Strong Image Synthesizer

35. Regulating sharing platforms in lateral exchange markets: The role of power and trust

36. Video Content Placement At the Network Edge: Centralized and Distributed Algorithms

37. U2-KWS: Unified Two-pass Open-vocabulary Keyword Spotting with Keyword Bias

38. Automatic channel selection and spatial feature integration for multi-channel speech recognition across various array topologies

39. Towards Inductive Robustness: Distilling and Fostering Wave-induced Resonance in Transductive GCNs Against Graph Adversarial Attacks

40. Genixer: Empowering Multimodal Large Language Models as a Powerful Data Generator

41. Let's Think Outside the Box: Exploring Leap-of-Thought in Large Language Models with Creative Humor Generation

42. Exploring the Robustness of Decentralized Training for Large Language Models

43. MetaCloak: Preventing Unauthorized Subject-driven Text-to-image Diffusion-based Synthesis via Meta-learning

44. Jailbreaking GPT-4V via Self-Adversarial Attacks with System Prompts

45. Instant3D: Instant Text-to-3D Generation

46. F$^2$AT: Feature-Focusing Adversarial Training via Disentanglement of Natural and Perturbed Patterns

47. ScaleLong: Towards More Stable Training of Diffusion Model via Scaling Network Long Skip Connection

48. GraphCloak: Safeguarding Task-specific Knowledge within Graph-structured Data from Unauthorized Exploitation

49. MetaTool Benchmark for Large Language Models: Deciding Whether to Use Tools and Which to Use

50. 3DHacker: Spectrum-based Decision Boundary Generation for Hard-label 3D Point Cloud Attack

Catalog

Books, media, physical & digital resources