Zobrazeno 1 - 10
of 7 072
pro vyhledávání: '"PHAM Van-The"'
Continual Event Detection (CED) poses a formidable challenge due to the catastrophic forgetting phenomenon, where learning new tasks (with new coming event types) hampers performance on previous ones. In this paper, we introduce a novel approach, Lif
Externí odkaz:
http://arxiv.org/abs/2410.08905
Autor:
Pham, Van Khanh, Le, Duc Minh
In the times we live in today, humanity faces unprecedented environmental challenges. The emergence of artificial intelligence (AI) has opened new doors in our collective efforts to address our planet's pressing problems; however, many have doubts on
Externí odkaz:
http://arxiv.org/abs/2410.06501
Autor:
Vuong, Tuan-Cuong, Nguyen, Cong Chi, Pham, Van-Cuong, Le, Thi-Thanh-Huyen, Tran, Xuan-Nam, Van Luong, Thien
Publikováno v:
NOLTA 2024
This paper proposes a novel intrusion detection method for unmanned aerial vehicles (UAV) in the presence of recent actual UAV intrusion dataset. In particular, in the first stage of our method, we design an autoencoder architecture for effectively e
Externí odkaz:
http://arxiv.org/abs/2410.02827
Autor:
Pham, Van-Cuong, Nguyen, Thien Huu
Activation Editing, which involves directly editting the internal representations of large language models (LLMs) to alter their behaviors and achieve desired properties, has emerged as a promising area of research. Existing works primarily treat LLM
Externí odkaz:
http://arxiv.org/abs/2409.10053
Autor:
Yang, Haozhe, Gobbi, Marco, Herling, Franz, Pham, Van Tuong, Calavalle, Francesco, Martín-García, Beatriz, Fert, Albert, Hueso, Luis E., Casanova, Fèlix
Pristine graphene is potentially an ideal medium to transport spin information. Proximity effects, where a neighbouring material is used to alter the properties of a material in adjacent (or proximitized) regions, can also be used in graphene to gene
Externí odkaz:
http://arxiv.org/abs/2408.05759
Nuclei segmentation, despite its fundamental role in histopathological image analysis, is still a challenge work. The main challenge of this task is the existence of overlapping areas, which makes separating independent nuclei more complicated. In th
Externí odkaz:
http://arxiv.org/abs/2407.17181
Early identification of security issues in software development is vital to minimize their unanticipated impacts. Code review is a widely used manual analysis method that aims to uncover security issues along with other coding issues in software proj
Externí odkaz:
http://arxiv.org/abs/2407.12241
We consider the problem of how to verify the security of probabilistic oblivious algorithms formally and systematically. Unfortunately, prior program logics fail to support a number of complexities that feature in the semantics and invariant needed t
Externí odkaz:
http://arxiv.org/abs/2407.00514
Recent works have shown promising results in connecting speech encoders to large language models (LLMs) for speech recognition. However, several limitations persist, including limited fine-tuning options, a lack of mechanisms to enforce speech-text a
Externí odkaz:
http://arxiv.org/abs/2406.17272
Autor:
Pham, Van Dong, Pan, Yi, Erwin, Steven C., von Oppen, Felix, Kanisawa, Kiyoshi, Fölsch, Stefan
Atom manipulation by scanning tunneling microscopy was used to construct quantum dots on the InAs(111)A surface. Each dot comprised six ionized indium adatoms. The positively charged adatoms create a confining potential acting on surface-state electr
Externí odkaz:
http://arxiv.org/abs/2406.13347