Zobrazeno 1 - 10
of 481
pro vyhledávání: '"Wang, Yinghan"'
Autor:
Dai, Enyan, Cui, Limeng, Wang, Zhengyang, Tang, Xianfeng, Wang, Yinghan, Cheng, Monica, Yin, Bing, Wang, Suhang
Graph Neural Networks (GNNs) have achieved great success in modeling graph-structured data. However, recent works show that GNNs are vulnerable to adversarial attacks which can fool the GNN model to make desired predictions of the attacker. In additi
Externí odkaz:
http://arxiv.org/abs/2306.08604
The trade-off between computation time and path optimality is a key consideration in motion planning algorithms. While classical sampling based algorithms fall short of computational efficiency in high dimensional planning, learning based methods hav
Externí odkaz:
http://arxiv.org/abs/2206.03292
Autor:
Xue, Pengyu, Wang, Yinghan, Wang, Xuefei, Zhou, Shilin, Wu, Xiaochen, Long, Lin, Guo, Chuanlong
Publikováno v:
In Chemical Engineering Journal 15 November 2024 500
Autor:
Chen, Jiaxi, Wang, Yinghan, Dai, Wei, Xu, Xinyuan, Ni, Qingrong, Yi, Xiuli, Kang, Pan, Ma, Jingjing, Wu, Lili, Li, Chunying, Li, Shuli
Publikováno v:
In Journal of Dermatological Science June 2024 114(3):115-123
Autor:
Liu, Shi, Chen, Yanting, Zhu, Zhendong, Ren, Erhui, Wang, Jiayu, Wang, Yinghan, Qin, Jiaqiang, Cheng, Pei
Publikováno v:
In Polymer 16 May 2024 302
Publikováno v:
In Heliyon 15 March 2024 10(5)
Keyphrase generation aims to summarize long documents with a collection of salient phrases. Deep neural models have demonstrated a remarkable success in this task, capable of predicting keyphrases that are even absent from a document. However, such a
Externí odkaz:
http://arxiv.org/abs/2104.08729
Publikováno v:
In Journal of Water Process Engineering January 2024 57
We propose Visual News Captioner, an entity-aware model for the task of news image captioning. We also introduce Visual News, a large-scale benchmark consisting of more than one million news images along with associated news articles, image captions,
Externí odkaz:
http://arxiv.org/abs/2010.03743
As one of the important applications of Smart grid, charging between electric vehicles has attracted much attention. However, authentication between vehicle users and an aggregator may be vulnerable to various attacks due to the usage of wireless com
Externí odkaz:
http://arxiv.org/abs/2008.11366