152 results on '"Jiawei Li"'
Search Results
2. GladCoder: Stylized QR Code Generation with Grayscale-Aware Denoising Process.
3. Bit_numeval at SemEval-2024 Task 7: Enhance Numerical Sensitivity and Reasoning Completeness for Quantitative Understanding.
4. WaveKey: Secure Mobile Ad Hoc Access to RFID-Protected Systems.
5. A Two-Stage Plan-and-Allocate Algorithm for Operation Room Scheduling Problem with Uncertainties.
6. Efficiency Meets Security: A Delegated Transport Authentication Protocol for the Cloud.
7. Fundamental Capabilities of Large Language Models and their Applications in Domain Scenarios: A Survey.
8. Center of Pressure Estimation by Analyzing Walking Videos.
9. CAGEN: Controllable Anomaly Generator using Diffusion Model.
10. Neural2speech: A Transfer Learning Framework for Neural-Driven Speech Reconstruction.
11. CGCL: A Novel Collaborative Graph Contrastive Learning Network for Chinese NER.
12. Total NP Search Problems with Abundant Solutions.
13. Adversarial Attacks on Combinatorial Multi-Armed Bandits.
14. UIHash: Detecting Similar Android UIs through Grid-Based Visual Appearance Representation.
15. DiffFit: Unlocking Transferability of Large Diffusion Models via Simple Parameter-Efficient Fine-Tuning.
16. ALIP: Adaptive Language-Image Pre-training with Synthetic Caption.
17. Unsupervised Surface Anomaly Detection with Diffusion Probabilistic Model.
18. Commit Message Matters: Investigating Impact and Evolution of Commit Message Quality.
19. Meaning-Driven Speculative Artifacts Meme-Generated Design Framework.
20. Fully Automated Interpretable Breast Ultrasound Assisted Diagnosis System.
21. Fusion of Human Cognitive Knowledge and Machine Inference for Breast Cancer Detection.
22. Pandora Box Problem with Nonobligatory Inspection: Hardness and Approximation Scheme.
23. OTFS peak-to-average power ratio suppression based on improved SLM algorithm.
24. MixUNet: Mix the 2D and 3D Models for Robust Medical Image Segmentation.
25. PhyAuth: Physical-Layer Message Authentication for ZigBee Networks.
26. Learning a Graph Neural Network with Cross Modality Interaction for Image Fusion.
27. Ask to Understand: Question Generation for Multi-hop Question Answering.
28. Incomplete Utterance Rewriting by A Two-Phase Locate-and-Fill Regime.
29. Consensus Division in an Arbitrary Ratio.
30. Test-Time Training-Free Domain Adaptation.
31. Unsupervised Anomaly Detection with Local-Sensitive VQVAE and Global-Sensitive Transformers.
32. Prediction and Analysis of Container Terminal Logistics Transportation Time Based on Simulation Interactive Modeling: A Case Study of Ningbo Port: Simulation Modeling of Container Terminal Logistics Time: Ningbo Port Case.
33. Design Futurescaping: Interweaving Storytelling and AI Generation Art in World-Building.
34. Learned Distributed Image Compression with Multi-Scale Patch Matching in Feature Domain.
35. DAMix: Exploiting Deep Autoregressive Model Zoo for Improving Lossless Compression Generalization.
36. Improving Robotic Tactile Localization Super-resolution via Spatiotemporal Continuity Learning and Overlapping Air Chambers.
37. Fair-CDA: Continuous and Directional Augmentation for Group Fairness.
38. Parallel Coregistration Algorithm For Sar Images Based On Hadoop.
39. Mixed-cell-height Placement with Minimum-Implant-Area and Drain-to-Drain Abutment Constraints.
40. PUVAR:Minimize Idle Resource SLO Violations by Uncertainty-Aware Scheduling in Cloud Platforms.
41. Cedric: A Collaborative DDoS Defense System Using Credit.
42. The Query Complexity of Local Search and Brouwer in Rounds.
43. PSP: Pre-trained Soft Prompts for Few-Shot Abstractive Summarization.
44. Reliability Analysis of Train-centric Control System and CTCS-3 using PMS Modelling Method.
45. Generating community road network from GPS trajectories via style transfer.
46. Integrating Prior Knowledge with Graph Encoder for Gene Regulatory Inference from Single-cell RNA-Seq Data.
47. MUI-VB: Malicious URL Identification Model Combining VGG and Bi-LSTM.
48. RCID: Fingerprinting Passive RFID Tags via Wideband Backscatter.
49. Dynamic Texture Recognition Using PDV Hashing and Dictionary Learning on Multi-Scale Volume Local Binary Pattern.
50. An Improved Ant Colony Approach for the Competitive Traveling Salesmen Problem.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.