Search

Your search keyword '"Sun, Ke"' showing total 6,101 results

Search Constraints

Start Over You searched for: Author "Sun, Ke" Remove constraint Author: "Sun, Ke"
6,101 results on '"Sun, Ke"'

Search Results

2. AI-Powered Reconstruction of Dark Matter Velocity Fields from Redshift-Space Halo Distribution

3. EveGuard: Defeating Vibration-based Side-Channel Eavesdropping with Audio Adversarial Perturbations

4. DiffusionFake: Enhancing Generalization in Deepfake Detection via Guided Stable Diffusion

5. Security Attacks on LLM-based Code Completion Tools

6. StealthDiffusion: Towards Evading Diffusion Forensic Detection through Diffusion Model

7. Optimal Treatment Allocation Strategies for A/B Testing in Partially Observable Time Series Experiments

8. Few-Shot, Robust Calibration of Single Qubit Gates Using Bayesian Robust Phase Estimation

9. OutfitAnyone: Ultra-high Quality Virtual Try-On for Any Clothing and Any Person

10. DVPE: Divided View Position Embedding for Multi-View 3D Object Detection

11. Mistral-C2F: Coarse to Fine Actor for Analytical and Reasoning Enhancement in RLHF and Effective-Merged LLMs

12. Quantum Simulation of Spin-Boson Models with Structured Bath

13. DiffusionFace: Towards a Comprehensive Dataset for Diffusion-Based Face Forgery Analysis

14. Balancing Enhancement, Harmlessness, and General Capabilities: Enhancing Conversational LLMs with Direct RLHF

18. Metabolic Heterogeneity and Potential Immunotherapeutic Responses Revealed by Single-Cell Transcriptomics of Breast Cancer

20. SISSA: Real-time Monitoring of Hardware Functional Safety and Cybersecurity with In-vehicle SOME/IP Ethernet Traffic

21. Trade-Offs of Diagonal Fisher Information Matrix Estimators

22. ICE-GRT: Instruction Context Enhancement by Generative Reinforcement based Transformers

23. Enhancing Tampered Text Detection Through Frequency Feature Fusion and Decomposition

27. Animate Anyone: Consistent and Controllable Image-to-Video Synthesis for Character Animation

28. Magmaw: Modality-Agnostic Adversarial Attacks on Machine Learning-Based Wireless Communication Systems

29. Balancing Specialized and General Skills in LLMs: The Impact of Modern Tuning and Data Strategy

31. Research on optimal scheduling of an IEGS considering the flexibility of gas turbine units

32. Continual Face Forgery Detection via Historical Distribution Preserving

33. Cloth2Tex: A Customized Cloth Texture Generation Pipeline for 3D Virtual Try-On

34. Towards General Visual-Linguistic Face Forgery Detection

35. Uncovering Software-Based Power Side-Channel Attacks on Apple M1/M2 Systems

36. Hydrophobically gated memristive nanopores for neuromorphic applications

Catalog

Books, media, physical & digital resources