359 results on '"Haoyu Wang"'
Search Results
2. Music Emotion Classification with Source Separation Based MSB-Conformer.
3. BacktrackSTL: Ultra-Fast Online Seasonal-Trend Decomposition with Backtrack Technique.
4. PAIL: Performance based Adversarial Imitation Learning Engine for Carbon Neutral Optimization.
5. UltraLink: An Open-Source Knowledge-Enhanced Multilingual Supervised Fine-tuning Dataset.
6. Effective In-Context Example Selection through Data Compression.
7. ConFuzz: Towards Large Scale Fuzz Testing of Smart Contracts in Ethereum.
8. Contactless Radar Heart Rate Variability Monitoring Via Deep Spatio-Temporal Modeling.
9. Subequivariant Reinforcement Learning Framework for Coordinated Motion Control.
10. Ospreys-inspired Self-takeoff Strategy of An Eagle-scale Flapping-wing Robot: System Design and Flight Experiments.
11. MalCertain: Enhancing Deep Neural Network Based Android Malware Detection by Tackling Prediction Uncertainty.
12. EVMBT: A Binary Translation Scheme for Upgrading EVM Smart Contracts to WASM.
13. Logic Rules as Explanations for Legal Case Retrieval.
14. ChatGPT Chats Decoded: Uncovering Prompt Patterns for Superior Solutions in Software Development Lifecycle.
15. Global Prosperity or Local Monopoly? Understanding the Geography of App Popularity.
16. LightLT: A Lightweight Representation Quantization Framework for Long-Tail Data.
17. Don't Bite Off More than You Can Chew: Investigating Excessive Permission Requests in Trigger-Action Integrations.
18. Federated Heterogeneous Graph Neural Network for Privacy-preserving Recommendation.
19. Is It Safe to Share Your Files? An Empirical Security Analysis of Google Workspace.
20. Unveiling the Paradox of NFT Prosperity.
21. Event Semantic Classification in Context.
22. MeTMaP: Metamorphic Testing for Detecting False Vector Matching Problems in LLM Augmented Generation.
23. NNCTC: Physical Layer Cross-Technology Communication via Neural Networks.
24. ByteCard: Enhancing ByteDance's Data Warehouse with Learned Cardinality Estimation.
25. Easy Planting with Distributed Cellular Plant Factory*.
26. Credit Default of P2P Online Loans Based on Logistic Regression Model Under Factor Space Theory Risk Prediction Research.
27. Towards Poisoning Fair Representations.
28. Self-Supervised High Dynamic Range Imaging with Multi-Exposure Images in Dynamic Scenes.
29. All Your Tokens are Belong to Us: Demystifying Address Verification Vulnerabilities in Solidity Smart Contracts.
30. Exploring Covert Third-party Identifiers through External Storage in the Android New Era.
31. Decoding Web3: In-depth Analysis of the Third-Party Package Supply Chain.
32. Demo Abstract: An Interpretable and Trainable CTC Framework.
33. Miracle or Mirage? A Measurement Study of NFT Rug Pulls.
34. Are All Steps Equally Important? Benchmarking Essentiality Detection in Event Processes.
35. Macedon: Minimizing Representation Coding Rate Reduction for Cross-Lingual Natural Language Understanding.
36. HadSkip: Homotopic and Adaptive Layer Skipping of Pre-trained Language Models for Efficient Inference.
37. Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps.
38. Research on Unmanned Aircraft Environment Perception Methods in Urban Low Altitude Complex Backgrounds.
39. DistilALHuBERT: A Distilled Parameter Sharing Audio Representation Model.
40. Learnable Sparsity Structured Pruning for Acoustic Pre-trained Models.
41. Master-Slave Control Strategy Applied in Microsurgical Robot.
42. Magnetic Microrobot Control Based on a Designed Nonlinear Disturbance Observer.
43. Task-Agnostic Structured Pruning of Speech Representation Models.
44. Extremely Low Bit Quantization for Mobile Speaker Verification Systems Under 1MB Memory.
45. DistilXLSR: A Light Weight Cross-Lingual Speech Representation Model.
46. Adaptive Neural Network Quantization For Lightweight Speaker Verification.
47. Fine-grained Lung Function Sensing based on Millimeter-Wave Radar.
48. Are Mobile Advertisements in Compliance with App's Age Group?
49. Glocal Energy-based Learning for Few-Shot Open-Set Recognition.
50. Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.