Zobrazeno 1 - 10
of 1 652
pro vyhledávání: '"Liao, Yong"'
Cooperative Multi-Agent Reinforcement Learning (CMARL) strategies are well known to be vulnerable to adversarial perturbations. Previous works on adversarial attacks have primarily focused on white-box attacks that directly perturb the states or acti
Externí odkaz:
http://arxiv.org/abs/2406.17425
In many RFID-enabled applications, objects are classified into different categories, and the information associated with each object's category (called category information) is written into the attached tag, allowing the reader to access it later. Th
Externí odkaz:
http://arxiv.org/abs/2406.10347
Retrieval-Augmented Generation (RAG) is an effective solution to supplement necessary knowledge to large language models (LLMs). Targeting its bottleneck of retriever performance, "generate-then-read" pipeline is proposed to replace the retrieval sta
Externí odkaz:
http://arxiv.org/abs/2406.03963
Recent advancements in social bot detection have been driven by the adoption of Graph Neural Networks. The social graph, constructed from social network interactions, contains benign and bot accounts that influence each other. However, previous graph
Externí odkaz:
http://arxiv.org/abs/2405.11225
Autor:
He, Buyun, Yang, Yingguang, Wu, Qi, Liu, Hao, Yang, Renyu, Peng, Hao, Wang, Xiang, Liao, Yong, Zhou, Pengyuan
Detecting social bots has evolved into a pivotal yet intricate task, aimed at combating the dissemination of misinformation and preserving the authenticity of online interactions. While earlier graph-based approaches, which leverage topological struc
Externí odkaz:
http://arxiv.org/abs/2404.15070
Autor:
Li, Haoran, Shi, Haolin, Zhang, Wenli, Wu, Wenjun, Liao, Yong, Wang, Lin, Lee, Lik-hang, Zhou, Pengyuan
Text-to-3D scene generation holds immense potential for the gaming, film, and architecture sectors. Despite significant progress, existing methods struggle with maintaining high quality, consistency, and editing flexibility. In this paper, we propose
Externí odkaz:
http://arxiv.org/abs/2404.03575
Autor:
Ma, Long, Zhang, Jiajia, Deng, Hongping, Zhang, Ningyu, Guo, Qinglang, Yu, Haiyang, Liao, Yong, Zhou, Pengyuan
The escalating quality of video generated by advanced video generation methods results in new security challenges, while there have been few relevant research efforts: 1) There is no open-source dataset for generated video detection, 2) No generated
Externí odkaz:
http://arxiv.org/abs/2402.02085
Neural radiance fields (NeRF) have been proposed as an innovative 3D representation method. While attracting lots of attention, NeRF faces critical issues such as information confidentiality and security. Steganography is a technique used to embed in
Externí odkaz:
http://arxiv.org/abs/2401.01216
Recently, 3D Gaussian, as an explicit 3D representation method, has demonstrated strong competitiveness over NeRF (Neural Radiance Fields) in terms of expressing complex scenes and training duration. These advantages signal a wide range of applicatio
Externí odkaz:
http://arxiv.org/abs/2312.16047
Knowledge graph completion (KGC) aims to predict missing facts in knowledge graphs (KGs), which is crucial as modern KGs remain largely incomplete. While training KGC models on multiple aligned KGs can improve performance, previous methods that rely
Externí odkaz:
http://arxiv.org/abs/2312.10645