Zobrazeno 1 - 10
of 4 963
pro vyhledávání: '"Shen Chao"'
Autor:
Shen, Chao, Zhan, Wenkang, Pan, Shujie, Hao, Hongyue, Zhuo, Ning, Xin, Kaiyao, Cong, Hui, Xu, Chi, Xu, Bo, Ng, Tien Khee, Chen, Siming, Xue, Chunlai, Liu, Fengqi, Wang, Zhanguo, Zhao, Chao
Traditional methods for optimizing light source emissions rely on a time-consuming trial-and-error approach. While in-situ optimization of light source gain media emission during growth is ideal, it has yet to be realized. In this work, we integrate
Externí odkaz:
http://arxiv.org/abs/2411.00332
Best-of-N decoding methods instruct large language models (LLMs) to generate multiple solutions, score each using a scoring function, and select the highest scored as the final answer to mathematical reasoning problems. However, this repeated indepen
Externí odkaz:
http://arxiv.org/abs/2410.12934
Autor:
Sun, Aolong, Xing, Sizhe, Deng, Xuyu, Shen, Ruoyu, Yan, An, Hu, Fangchen, Yuan, Yuqin, Dong, Boyu, Zhao, Junhao, Huang, Ouhan, Li, Ziwei, Shi, Jianyang, Zhou, Yingjun, Shen, Chao, Zhao, Yiheng, Hong, Bingzhou, Chu, Wei, Zhang, Junwen, Cai, Haiwen, Chi, Nan
The escalating demands of compute-intensive applications, including artificial intelligence, urgently necessitate the adoption of sophisticated optical on-chip interconnect technologies to overcome critical bottlenecks in scaling future computing sys
Externí odkaz:
http://arxiv.org/abs/2410.07572
Task-specific fine-tuning is essential for the deployment of large language models (LLMs), but it requires significant computational resources and time. Existing solutions have proposed coreset selection methods to improve data efficiency and reduce
Externí odkaz:
http://arxiv.org/abs/2410.01296
Autor:
Shi, Jia, Wang, Dan, Jiang, Nai, Xin, Ziqian, Zheng, Houzhi, Shen, Chao, Zhang, Xinping, Liu, Xinfeng
Controlling magnetic order via external fields or heterostructures enables precise manipulation and tracking of spin and exciton information, facilitating the development of high-performance optical spin valves. However, the weak magneto-optical sign
Externí odkaz:
http://arxiv.org/abs/2409.18437
Despite prior safety alignment efforts, mainstream LLMs can still generate harmful and unethical content when subjected to jailbreaking attacks. Existing jailbreaking methods fall into two main categories: template-based and optimization-based method
Externí odkaz:
http://arxiv.org/abs/2408.11313
This study investigates a networked integrated sensing and communication (ISAC) system, where multiple base stations (BSs), connected to a central processor (CP) via capacity-limited fronthaul links, cooperatively serve communication users while simu
Externí odkaz:
http://arxiv.org/abs/2408.08057
The semiconductor industry has prioritized automating repetitive tasks by closed-loop, autonomous experimentation which enables accelerated optimization of complex multi-step processes. The emergence of machine learning (ML) has ushered in automated
Externí odkaz:
http://arxiv.org/abs/2408.03508
Autor:
Wu, Baoyuan, Chen, Hongrui, Zhang, Mingda, Zhu, Zihao, Wei, Shaokui, Yuan, Danni, Zhu, Mingli, Wang, Ruotong, Liu, Li, Shen, Chao
As an emerging approach to explore the vulnerability of deep neural networks (DNNs), backdoor learning has attracted increasing interest in recent years, and many seminal backdoor attack and defense algorithms are being developed successively or conc
Externí odkaz:
http://arxiv.org/abs/2407.19845
Deep generative models have demonstrated impressive performance in various computer vision applications, including image synthesis, video generation, and medical analysis. Despite their significant advancements, these models may be used for malicious
Externí odkaz:
http://arxiv.org/abs/2407.10575