Search

Your search keyword '"Zhou, Pan"' showing total 1,230 results

Search Constraints

Start Over You searched for: Author "Zhou, Pan" Remove constraint Author: "Zhou, Pan" Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection
1,230 results on '"Zhou, Pan"'

Search Results

1. SubZero: Random Subspace Zeroth-Order Optimization for Memory-Efficient LLM Fine-Tuning

2. Towards Natural Image Matting in the Wild via Real-Scenario Prior

3. The Impact of Large Language Models in Academia: from Writing to Speaking

4. A Deep Dive into Fairness, Bias, Threats, and Privacy in Recommender Systems: Insights and Future Research

5. LPT++: Efficient Training on Mixture of Long-tailed Experts

6. General Stacking Theory for Altermagnetism in Bilayer Systems

7. MoExtend: Tuning New Experts for Modality and Task Extension

8. Can Large Language Models Automatically Jailbreak GPT-4V?

9. A Survey of Attacks on Large Vision-Language Models: Resources, Advances, and Future Trends

10. LoCo: Low-Bit Communication Adaptor for Large-scale Model Training

11. Self-Cognition in Large Language Models: An Exploratory Study

12. Virtual Context: Enhancing Jailbreak Attacks with Special Token Injection

13. A Hopfieldian View-based Interpretation for Chain-of-Thought Reasoning

14. GUI-WORLD: A Dataset for GUI-oriented Multimodal LLM-based Agents

15. Living in the Moment: Can Large Language Models Grasp Co-Temporal Reasoning?

16. MVGamba: Unify 3D Content Generation as State Space Sequence Modeling

17. AutoJailbreak: Exploring Jailbreak Attacks and Defenses through a Dependency Lens

18. 4-bit Shampoo for Memory-Efficient Network Training

19. LOVA3: Learning to Visual Question Answering, Asking and Assessment

20. Physical Backdoor: Towards Temperature-based Backdoor Attacks in the Physical World

21. CodeIP: A Grammar-Guided Multi-Bit Watermark for Large Language Models of Code

22. Does Your Neural Code Completion Model Use My Code? A Membership Inference Approach

23. Diffusion Time-step Curriculum for One Image to 3D Generation

24. Gamba: Marry Gaussian Splatting with Mamba for single view 3D reconstruction

25. Optimization-based Prompt Injection Attack to LLM-as-a-Judge

26. Genetic Auto-prompt Learning for Pre-trained Code Intelligence Language Models

27. Friendly Sharpness-Aware Minimization

28. What Makes Good Collaborative Views? Contrastive Mutual Information Maximization for Multi-Agent Perception

29. Few-shot Learner Parameterization by Diffusion Time-steps

30. MLLM-as-a-Judge: Assessing Multimodal LLM-as-a-Judge with Vision-Language Benchmark

32. Consistent3D: Towards Consistent High-Fidelity Text-to-3D Generation with Deterministic Sampling Prior

33. The NPU-ASLP-LiAuto System Description for Visual Speech Recognition in CNVSRC 2023

34. ICMC-ASR: The ICASSP 2024 In-Car Multi-Channel Automatic Speech Recognition Challenge

35. MLCA-AVSR: Multi-Layer Cross Attention Fusion based Audio-Visual Speech Recognition

36. The Security and Privacy of Mobile Edge Computing: An Artificial Intelligence Perspective

37. U2-KWS: Unified Two-pass Open-vocabulary Keyword Spotting with Keyword Bias

38. Automatic channel selection and spatial feature integration for multi-channel speech recognition across various array topologies

39. Towards Inductive Robustness: Distilling and Fostering Wave-induced Resonance in Transductive GCNs Against Graph Adversarial Attacks

40. Genixer: Empowering Multimodal Large Language Models as a Powerful Data Generator

41. Let's Think Outside the Box: Exploring Leap-of-Thought in Large Language Models with Creative Humor Generation

42. Exploring the Robustness of Decentralized Training for Large Language Models

43. MetaCloak: Preventing Unauthorized Subject-driven Text-to-image Diffusion-based Synthesis via Meta-learning

44. Jailbreaking GPT-4V via Self-Adversarial Attacks with System Prompts

45. Instant3D: Instant Text-to-3D Generation

46. F$^2$AT: Feature-Focusing Adversarial Training via Disentanglement of Natural and Perturbed Patterns

47. ScaleLong: Towards More Stable Training of Diffusion Model via Scaling Network Long Skip Connection

48. GraphCloak: Safeguarding Task-specific Knowledge within Graph-structured Data from Unauthorized Exploitation

49. MetaTool Benchmark for Large Language Models: Deciding Whether to Use Tools and Which to Use

50. 3DHacker: Spectrum-based Decision Boundary Generation for Hard-label 3D Point Cloud Attack

Catalog

Books, media, physical & digital resources