Search

Your search keyword '"Zhang, Xiangyu"' showing total 5,503 results

Search Constraints

Start Over You searched for: Author "Zhang, Xiangyu" Remove constraint Author: "Zhang, Xiangyu"
5,503 results on '"Zhang, Xiangyu"'

Search Results

1. Anchor Attention, Small Cache: Code Generation with Large Language Models

2. Selective State Space Model for Monaural Speech Enhancement

3. Continual LLaVA: Continual Instruction Tuning in Large Vision-Language Models

4. Dust extinction-curve variation in the translucent interstellar medium is driven by PAH growth

5. Less is More: DocString Compression in Code Generation

6. The Dust Extinction Curve: Beyond R(V)

7. High-Throughput Information Storage in An Intelligent Response Phosphor

8. m-weak group MP inverse

9. Enhancement of piezoelectric response in V doped LiNbO3 films deposited by RF magnetron sputtering

10. Quantum Phonon Dynamics Induced Spontaneous Spin-Orbit Coupling

11. Reconstructive Visual Instruction Tuning

12. ASPIRER: Bypassing System Prompts With Permutation-based Backdoors in LLMs

13. DIGIMON: Diagnosis and Mitigation of Sampling Skew for Reinforcement Learning based Meta-Planner in Robot Navigation

14. Auto-Landmark: Acoustic Landmark Dataset and Open-Source Toolkit for Landmark Extraction

15. ROCAS: Root Cause Analysis of Autonomous Driving Accidents via Cyber-Physical Co-mutation

16. Rethinking Mamba in Speech Processing by Self-Supervised Models

17. Detection of False Data Injection Attacks (FDIA) on Power Dynamical Systems With a State Prediction Method

18. An Explicit Wavefunction of the Interacting Non-Hermitian Spin-1/2 1D System

19. General OCR Theory: Towards OCR-2.0 via a Unified End-to-end Model

20. Discovery of False Data Injection Schemes on Frequency Controllers with Reinforcement Learning

21. Panacea+: Panoramic and Controllable Video Generation for Autonomous Driving

22. XNN: Paradigm Shift in Mitigating Identity Leakage within Cloud-Enabled Deep Learning

23. Poisoning with A Pill: Circumventing Detection in Federated Learning

24. Unveiling the Milky Way dust extinction curve in 3D

25. An Empirical Extinction Curve Revealed by Gaia XP Spectra and LAMOST

26. UNIT: Backdoor Mitigation via Automated Neural Distribution Tightening

27. DeCE: Deceptive Cross-Entropy Loss Designed for Defending Backdoor Attacks

28. DreamBench++: A Human-Aligned Benchmark for Personalized Image Generation

29. Binaural Selective Attention Model for Target Speaker Extraction

30. RL-JACK: Reinforcement Learning-powered Black-box Jailbreaking Attack against LLMs

31. When LLM Meets DRL: Advancing Jailbreaking Efficiency via DRL-guided Search

32. CodeScore-R: An Automated Robustness Metric for Assessing the FunctionalCorrectness of Code Synthesis

33. Self-supervised Adversarial Training of Monocular Depth Estimation against Physical-World Attacks

34. Mutual Information Guided Backdoor Mitigation for Pre-trained Encoders

35. Source Code Foundation Models are Transferable Binary Analysis Knowledge Bases

36. Is a 3D-Tokenized LLM the Key to Reliable Autonomous Driving?

37. Reflected Flow Matching

38. Focus Anywhere for Fine-grained Multi-page Document Understanding

39. Mamba in Speech: Towards an Alternative to Self-Attention

40. Striking a Balance between Classical and Deep Learning Approaches in Natural Language Processing Pedagogy

41. Music Emotion Prediction Using Recurrent Neural Networks

42. Self-Supervised Visual Preference Alignment

43. Threat Behavior Textual Search by Attention Graph Isomorphism

44. OneChart: Purify the Chart Structural Extraction via One Auxiliary Token

45. BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks

46. SubjectDrive: Scaling Generative Data in Autonomous Driving via Subject Control

47. LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning

48. Aligning Speech to Languages to Enhance Code-switching Speech Recognition

Catalog

Books, media, physical & digital resources