Zobrazeno 1 - 10
of 1 278
pro vyhledávání: '"Li, Yujun"'
Attractor neural networks consider that neural information is stored as stationary states of a dynamical system formed by a large number of interconnected neurons. The attractor property empowers a neural system to encode information robustly, but it
Externí odkaz:
http://arxiv.org/abs/2410.06517
Fine-tuning large-scale pre-trained models is prohibitively expensive in terms of computational and memory costs. Low-Rank Adaptation (LoRA), a popular Parameter-Efficient Fine-Tuning (PEFT) method, provides an efficient way to fine-tune models by op
Externí odkaz:
http://arxiv.org/abs/2409.14396
As AIGC has impacted our society profoundly in the past years, ethical issues have received tremendous attention. The most urgent one is the AIGC copyright dilemma, which can immensely stifle the development of AIGC and greatly cost the entire societ
Externí odkaz:
http://arxiv.org/abs/2402.12216
Autor:
Wang, Wei, Lin, Yujie, Ren, Pengjie, Chen, Zhumin, Mine, Tsunenori, Zhao, Jianli, Zhao, Qiang, Zhang, Moyan, Ben, Xianye, Li, Yujun
Sequential recommendation has attracted a lot of attention from both academia and industry, however the privacy risks associated to gathering and transferring users' personal interaction data are often underestimated or ignored. Existing privacy-pres
Externí odkaz:
http://arxiv.org/abs/2401.04423
Automatic theorem proving with deep learning methods has attracted attentions recently. In this paper, we construct an automatic proof system for trigonometric identities. We define the normalized form of trigonometric identities, design a set of rul
Externí odkaz:
http://arxiv.org/abs/2207.06679
Autor:
Liu, Jiao, Wang, Yuewei, Wang, Xin, Li, Yunxia, Jiang, Yanxia, Li, Yujun, Zhang, Wei, Yu, Wenjuan
Publikováno v:
In Pathology - Research and Practice September 2024 261
Publikováno v:
In Computers and Electrical Engineering September 2024 118 Part B
Autor:
Hou, Jie, Chen, LiYuan, Wang, JinZe, Wang, LiXi, Han, BingJun, Li, YuJun, Yu, Lu, Liu, WenXin
Publikováno v:
In Journal of Hazardous Materials 5 February 2025 483
With the continuous extension of the Industrial Internet, cyber incidents caused by software vulnerabilities have been increasing in recent years. However, software vulnerabilities detection is still heavily relying on code review done by experts, an
Externí odkaz:
http://arxiv.org/abs/2202.02501
Publikováno v:
In International Journal of Electrical Power and Energy Systems December 2024 163