Zobrazeno 1 - 10
of 135 426
pro vyhledávání: '"Kwok A."'
Autor:
Chen, Kai, Gou, Yunhao, Huang, Runhui, Liu, Zhili, Tan, Daxin, Xu, Jing, Wang, Chunwei, Zhu, Yi, Zeng, Yihan, Yang, Kuo, Wang, Dingdong, Xiang, Kun, Li, Haoyuan, Bai, Haoli, Han, Jianhua, Li, Xiaohui, Jin, Weike, Xie, Nian, Zhang, Yu, Kwok, James T., Zhao, Hengshuang, Liang, Xiaodan, Yeung, Dit-Yan, Chen, Xiao, Li, Zhenguo, Zhang, Wei, Liu, Qun, Hong, Lanqing, Hou, Lu, Xu, Hang
GPT-4o, an omni-modal model that enables vocal conversations with diverse emotions and tones, marks a milestone for omni-modal foundation models. However, empowering Large Language Models to perceive and generate images, texts, and speeches end-to-en
Externí odkaz:
http://arxiv.org/abs/2409.18042
Autor:
Jiang, Chengze, Wang, Junkai, Dong, Minjing, Gui, Jie, Shi, Xinli, Cao, Yuan, Tang, Yuan Yan, Kwok, James Tin-Yau
Adversarial training has achieved remarkable advancements in defending against adversarial attacks. Among them, fast adversarial training (FAT) is gaining attention for its ability to achieve competitive robustness with fewer computing resources. Exi
Externí odkaz:
http://arxiv.org/abs/2409.17589
Autor:
Gong, Xueluan, Li, Mingzhe, Zhang, Yilin, Ran, Fengyuan, Chen, Chen, Chen, Yanjiao, Wang, Qian, Lam, Kwok-Yan
Large Language Models (LLMs) have excelled in various tasks but are still vulnerable to jailbreaking attacks, where attackers create jailbreak prompts to mislead the model to produce harmful or offensive content. Current jailbreak methods either rely
Externí odkaz:
http://arxiv.org/abs/2409.14866
Publikováno v:
in IEEE Transactions on Information Forensics and Security, vol. 19, pp. 7810-7823, 2024
Finger vein recognition technology has become one of the primary solutions for high-security identification systems. However, it still has information leakage problems, which seriously jeopardizes users privacy and anonymity and cause great security
Externí odkaz:
http://arxiv.org/abs/2409.14774
Autor:
Pate, Samuel E., Wang, Bin, Zhang, Yang, Shen, Bing, Liu, Enke, Martin, Ivar, Jiang, J. Samuel, Zhou, Xiuquan, Chung, Duck Young, Kanatzidis, Mercouri G., Welp, Ulrich, Kwok, Wai-Kwong, Xiao, Zhi-Li
Publikováno v:
Adv. Sci. 11, 2406882 (2024)
Emerging from the intricate interplay of topology and magnetism, the giant anomalous Hall effect (AHE) is the most known topological property of the recently discovered kagome ferromagnetic Weyl semimetal Co_3Sn_2S_2 with the magnetic Co atoms arrang
Externí odkaz:
http://arxiv.org/abs/2409.13558
This paper presents a system for enabling real-time synthesis of whole-body locomotion and manipulation policies for real-world legged robots. Motivated by recent advancements in robot simulation, we leverage the efficient parallelization capabilitie
Externí odkaz:
http://arxiv.org/abs/2409.10469
Autor:
Ather, Hammad, Berkman, Sophie, Cerati, Giuseppe, Kortelainen, Matti, Kwok, Ka Hei Martin, Lantz, Steven, Lee, Seyong, Norris, Boyana, Reid, Michael, Hall, Allison Reinsvold, Riley, Daniel, Strelchenko, Alexei, Wang, Cong
Traditionally, high energy physics (HEP) experiments have relied on x86 CPUs for the majority of their significant computing needs. As the field looks ahead to the next generation of experiments such as DUNE and the High-Luminosity LHC, the computing
Externí odkaz:
http://arxiv.org/abs/2409.09228
Publikováno v:
Pattern Recognition, 2025, 158:110986
Color image restoration methods typically represent images as vectors in Euclidean space or combinations of three monochrome channels. However, they often overlook the correlation between these channels, leading to color distortion and artifacts in t
Externí odkaz:
http://arxiv.org/abs/2409.07797
Autor:
Liu, Buhua, Shao, Shitong, Li, Bao, Bai, Lichen, Xu, Zhiqiang, Xiong, Haoyi, Kwok, James, Helal, Sumi, Xie, Zeke
Diffusion models have emerged as the leading paradigm in generative modeling, excelling in various applications. Despite their success, these models often misalign with human intentions, generating outputs that may not match text prompts or possess d
Externí odkaz:
http://arxiv.org/abs/2409.07253
Autor:
Zhai, Siyu, He, Zhibo, Cong, Xiaofeng, Hou, Junming, Gui, Jie, You, Jian Wei, Gong, Xin, Kwok, James Tin-Yau, Tang, Yuan Yan
Learning-based methods for underwater image enhancement (UWIE) have undergone extensive exploration. However, learning-based models are usually vulnerable to adversarial examples so as the UWIE models. To the best of our knowledge, there is no compre
Externí odkaz:
http://arxiv.org/abs/2409.06420