37 results on '"Yichen Wang"'
Search Results
2. Does DetectGPT Fully Utilize Perturbation? Bridge Selective Perturbation to Fine-tuned Contrastive Learning Detector would be Better.
3. Detector Collapse: Backdooring Object Detection to Catastrophic Overload or Blindness.
4. Jump off the Bandwagon? Characterizing Bandwagon Fans' Future Loyalty in Online NBA Fan Communities.
5. Deconstructing The Ethics of Large Language Models from Long-standing Issues to New-emerging Dilemmas.
6. DarkFed: A Data-Free Backdoor Attack in Federated Learning.
7. Concentrate Attention: Towards Domain-Generalizable Prompt Optimization for Language Models.
8. Stumbling Blocks: Stress Testing the Robustness of Machine-Generated Text Detectors Under Attacks.
9. Exploring Adversarial Attacks on Neural Networks: An Explainable Approach.
10. Improving Pacing in Long-Form Story Planning.
11. Democratizing Chatbot Debugging: A Computational Framework for Evaluating and Explaining Inappropriate Chatbot Responses.
12. Dialogue for Prompting: a Policy-Gradient-Based Discrete Prompt Optimization for Few-shot Learning.
13. Score Attack: A Lower Bound Technique for Optimal Differentially Private Learning.
14. Improved Differentially Private Regression via Gradient Boosting.
15. SemStamp: A Semantic Watermark with Paraphrastic Robustness for Text Generation.
16. Dual Radar: A Multi-modal Dataset with Dual 4D Radar for Autonomous Driving.
17. Fuzzy-NMS: Improving 3D Object Detection with Fuzzy Classification in NMS.
18. CoCo: Coherence-Enhanced Machine-Generated Text Detection Under Data Limitation With Contrastive Learning.
19. Analyzing Behavioral Changes of Twitter Users After Exposure to Misinformation.
20. Jump on the Bandwagon? - Characterizing Bandwagon Phenomenon in Online NBA Fan Communities.
21. Learning unbiased zero-shot semantic segmentation networks via transductive transfer.
22. Sonic Sculpture: Activating Engagement with Head-Mounted Augmented Reality.
23. The Cost of Privacy in Generalized Linear Models: Algorithms and Minimax Lower Bounds.
24. The Cost of Privacy: Optimal Rates of Convergence for Parameter Estimation with Differential Privacy.
25. Hierarchical Temporal Convolutional Networks for Dynamic Recommender Systems.
26. BugSwarm: Mining and Continuously Growing a Dataset of Reproducible Failures and Fixes.
27. Fundamental Tradeoffs in Uplink Grant-Free Multiple Access with Protected CSI.
28. Code-Frequency Block Group Coding for Anti-Spoofing Pilot Authentication in Multi-Antenna OFDM Systems.
29. Learning to Optimize via Wasserstein Deep Inverse Optimal Control.
30. A Unifying Framework for Guiding Point Processes with Stochastic Intensity Functions.
31. Know-Evolve: Deep Reasoning in Temporal Knowledge Graphs.
32. Fast and Simple Optimization for Poisson Likelihood Models.
33. Recurrent Coevolutionary Feature Embedding Processes for Recommendation.
34. Steering Opinion Dynamics in Information Diffusion Networks.
35. COEVOLVE: A Joint Point Process Model for Information Diffusion and Network Co-evolution.
36. A Multi-Channel Diversity Based MAC Protocol for Power-Constrained Cognitive Ad Hoc Networks
37. Optimal Relay Power Allocation for Amplify-and-Forward Relay Networks with Non-linear Power Amplifiers
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.