Search

Your search keyword '"WANG Haoyu"' showing total 6,098 results

Search Constraints

Start Over You searched for: Author "WANG Haoyu" Remove constraint Author: "WANG Haoyu"
6,098 results on '"WANG Haoyu"'

Search Results

1. Two-layer optimal scheduling of park integrated energy system considering the charging and discharging willingness of electric vehicles

2. Collaborative Computing of Food Supply Chain Privacy Data Elements Based on Federated Learning

3. Geochemical Characteristics and Environmental Risk Assessment of Heavy Metals in Weathering Profiles of Alkali-enriched Porphyry in Central Yunnan

4. Corn and Soybean Futures Price Intelligent Forecasting Based on Deep Learning

5. Numerical simulation on temperature field and residual stress field in thermite welding of pipelines

6. Tumor mineralization-based cancer diagnosis and therapy

7. Vibrations of a dual-rotor system in aero-engine induced by the support misalignment

8. Preparation of cationic starch acrylamide flocculant by aqueous solution polymerization

9. CommitShield: Tracking Vulnerability Introduction and Fix in Version Control Systems

10. Acceleration and Parallelization Methods for ISRS EGN Model

11. Unbiased General Annotated Dataset Generation

12. YingSound: Video-Guided Sound Effects Generation with Multi-modal Chain-of-Thought Controls

13. Model-Editing-Based Jailbreak against Safety-aligned Large Language Models

14. Evaluating Hallucination in Text-to-Image Diffusion Models with Scene-Graph based Question-Answering Agent

15. Dual-view X-ray Detection: Can AI Detect Prohibited Items from Dual-view X-ray Images like Humans?

16. Dual-Level Boost Network for Long-Tail Prohibited Items Detection in X-ray Security Inspection

17. Non-Reciprocal Reconfigurable Intelligent Surfaces

18. SegBook: A Simple Baseline and Cookbook for Volumetric Medical Image Segmentation

19. Interactive Medical Image Segmentation: A Benchmark Dataset and Baseline

20. CKGFuzzer: LLM-Based Fuzz Driver Generation Enhanced By Code Knowledge Graph

21. LLM App Squatting and Cloning

22. GPT-4o System Card

23. Efficient and Effective Universal Adversarial Attack against Vision-Language Pre-training Models

24. EFILN: The Electric Field Inversion-Localization Network for High-Precision Underwater Positioning

25. LLM$\times$MapReduce: Simplified Long-Sequence Processing using Large Language Models

26. Decoding Secret Memorization in Code LLMs Through Token-Level Characterization

27. A Benchmark on Directed Graph Representation Learning in Hardware Designs

28. NEAT: Nonlinear Parameter-efficient Adaptation of Pre-trained Models

29. Melody-Guided Music Generation

30. Energy-Efficient Computation with DVFS using Deep Reinforcement Learning for Multi-Task Systems in Edge Computing

31. Cross-video Identity Correlating for Person Re-identification Pre-training

32. EmoPro: A Prompt Selection Strategy for Emotional Expression in LM-based Speech Synthesis

33. PathSeeker: Exploring LLM Security Vulnerabilities with a Reinforcement Learning-Based Jailbreak Approach

34. Bridging Design and Development with Automated Declarative UI Code Generation

35. Models Are Codes: Towards Measuring Malicious Code Poisoning Attacks on Pre-trained Model Hubs

36. Towards Robust Detection of Open Source Software Supply Chain Poisoning Attacks in Industry Environments

37. VoiceWukong: Benchmarking Deepfake Voice Detection

38. CanCal: Towards Real-time and Lightweight Ransomware Detection and Response in Industrial Environments

39. Investigating Coverage Criteria in Large Language Models: An In-Depth Study Through Jailbreak Attacks

40. Revisit the Partial Coloring Method: Prefix Spencer and Sampling

41. Automatic Dataset Construction (ADC): Sample Collection, Data Curation, and Beyond

42. Probing the Safety Response Boundary of Large Language Models via Unsafe Decoding Path Generation

43. SeeWasm: An Efficient and Fully-Functional Symbolic Execution Engine for WebAssembly Binaries

44. GlitchProber: Advancing Effective Detection and Mitigation of Glitch Tokens in Large Language Models

45. Semantic-Enhanced Indirect Call Analysis with Large Language Models

46. Beyond App Markets: Demystifying Underground Mobile App Distribution Via Telegram

47. Voices from the Frontier: A Comprehensive Analysis of the OpenAI Developer Forum

48. Introduction to Retrosynthesis: Strategies and Approaches

49. US and China pharmaceutical sector reaction to the COVID-19 pandemic

50. What Are Good Positional Encodings for Directed Graphs?

Catalog

Books, media, physical & digital resources