Search

Your search keyword '"Wang, Jiachen"' showing total 782 results

Search Constraints

Start Over You searched for: Author "Wang, Jiachen" Remove constraint Author: "Wang, Jiachen" Search Limiters Full Text Remove constraint Search Limiters: Full Text
782 results on '"Wang, Jiachen"'

Search Results

1. StuGPTViz: A Visual Analytics Approach to Understand Student-ChatGPT Interactions

2. Data Shapley in One Training Run

3. Rethinking Data Shapley for Data Selection Tasks: Misleads and Merits

4. A Survey on Industrial Internet of Things (IIoT) Testbeds for Connectivity Research

5. An Economic Solution to Copyright Challenges of Generative AI

6. Language Models as Science Tutors

7. Efficient Data Shapley for Weighted Nearest Neighbor Algorithms

8. DP-OPT: Make Large Language Model Your Privacy-Preserving Prompt Engineer

9. Threshold KNN-Shapley: A Linear-Time and Privacy-Friendly Approach to Data Valuation

10. BaDExpert: Extracting Backdoor Functionality for Accurate Backdoor Input Detection

11. Time-Sensitive Networking (TSN) for Industrial Automation: Current Advances and Future Directions

12. Privacy-Preserving In-Context Learning for Large Language Models

17. LAVA: Data Valuation without Pre-Specified Learning Algorithms

18. A Randomized Approach for Tight Privacy Accounting

19. Effects of 3 MeV Proton Irradiation on Superconductivity and CDW in 2H-NbSe2 Single Crystals

20. A Note on 'Efficient Task-Specific Data Valuation for Nearest Neighbor Algorithms'

21. A Note on 'Towards Efficient Data Valuation Based on the Shapley Value'

22. Uncovering Adversarial Risks of Test-Time Adaptation

23. Therapeutic potential of arginine deprivation therapy for gliomas: a systematic review of the existing literature

24. Renyi Differential Privacy of Propose-Test-Release and Applications to Private and Robust Machine Learning

25. Turning a Curse into a Blessing: Enabling In-Distribution-Data-Free Backdoor Removal via Stabilized Model Inversion

26. Data Banzhaf: A Robust Data Valuation Framework for Machine Learning

27. Towards A Proactive ML Approach for Detecting Backdoor Poison Samples

31. Accelerating Representation Learning with View-Consistent Dynamics in Data-Efficient Reinforcement Learning

32. ModelPred: A Framework for Predicting Trained Model from Training Data

33. Denoised Internal Models: a Brain-Inspired Autoencoder against Adversarial Attacks

48. Polyjuice: High-Performance Transactions via Learned Concurrency Control

Catalog

Books, media, physical & digital resources