Zobrazeno 1 - 10
of 206
pro vyhledávání: '"Qu, Wenjie"'
Autor:
Wu, Yongji, Qu, Wenjie, Tao, Tianyang, Wang, Zhuang, Bai, Wei, Li, Zhuohao, Tian, Yuan, Zhang, Jiaheng, Lentz, Matthew, Zhuo, Danyang
Sparsely-activated Mixture-of-Experts (MoE) architecture has increasingly been adopted to further scale large language models (LLMs) due to its sub-linear scaling for computation costs. However, frequent failures still pose significant challenges as
Externí odkaz:
http://arxiv.org/abs/2407.04656
Autor:
Qu, Wenjie, Zheng, Wengrui, Tao, Tianyang, Yin, Dong, Jiang, Yanze, Tian, Zhihua, Zou, Wei, Jia, Jinyuan, Zhang, Jiaheng
Large Language Models (LLMs) have demonstrated remarkable capabilities of generating texts resembling human language. However, they can be misused by criminals to create deceptive content, such as fake news and phishing emails, which raises ethical c
Externí odkaz:
http://arxiv.org/abs/2401.16820
Image segmentation is an important problem in many safety-critical applications. Recent studies show that modern image segmentation models are vulnerable to adversarial perturbations, while existing attack methods mainly follow the idea of attacking
Externí odkaz:
http://arxiv.org/abs/2304.02693
Encoder as a service is an emerging cloud service. Specifically, a service provider first pre-trains an encoder (i.e., a general-purpose feature extractor) via either supervised learning or self-supervised learning and then deploys it as a cloud serv
Externí odkaz:
http://arxiv.org/abs/2301.02905
Classifiers in supervised learning have various security and privacy issues, e.g., 1) data poisoning attacks, backdoor attacks, and adversarial examples on the security side as well as 2) inference attacks and the right to be forgotten for the traini
Externí odkaz:
http://arxiv.org/abs/2212.03334
Multi-label classification, which predicts a set of labels for an input, has many applications. However, multiple recent studies showed that multi-label classification is vulnerable to adversarial examples. In particular, an attacker can manipulate t
Externí odkaz:
http://arxiv.org/abs/2210.01111
Autor:
Wang, Hao, Qu, Wenjie, Katz, Gilad, Zhu, Wenyu, Gao, Zeyu, Qiu, Han, Zhuge, Jianwei, Zhang, Chao
Binary code similarity detection (BCSD) has important applications in various fields such as vulnerability detection, software component analysis, and reverse engineering. Recent studies have shown that deep neural networks (DNNs) can comprehend inst
Externí odkaz:
http://arxiv.org/abs/2205.12713
Autor:
Chen, Jinsong, Lyu, Chengcheng, Jiang, Yijie, Liu, Renlang, Liu, Siqin, Qu, Wenjie, Hou, Kai, Xu, Dongbei, Feng, Dongju, Wu, Wei
Publikováno v:
In Industrial Crops & Products 15 September 2024 216
Autor:
Jiang, Ninghong, Xie, Yu, Qu, Wenjie, Lei, Lei, Gao, Shujun, Zhang, Hongwei, Wang, Qing, Chen, Limei, Sui, Long
Publikováno v:
In The Journal of Minimally Invasive Gynecology September 2024 31(9):756-760
AdNAC20 Regulates Lignin and Coumarin Biosynthesis in the Roots of Angelica dahurica var. Formosana.
Autor:
Qu, Wenjie1 (AUTHOR), Huang, Wenjuan1 (AUTHOR), Chen, Chen1 (AUTHOR) qwj1941428057@163.com, Chen, Jinsong1 (AUTHOR), Zhao, Lin1 (AUTHOR), Jiang, Yijie1 (AUTHOR), Du, Xuan1 (AUTHOR), Liu, Renlang1 (AUTHOR), Chen, Yinyin1 (AUTHOR), Hou, Kai1 (AUTHOR), Xu, Dongbei1 (AUTHOR), Wu, Wei1 (AUTHOR) ewuwei@sicau.edu.cn
Publikováno v:
International Journal of Molecular Sciences. Jul2024, Vol. 25 Issue 14, p7998. 21p.