Alert button
Picture for Bo Li

Bo Li

Alert button

Competing for Shareable Arms in Multi-Player Multi-Armed Bandits

Add code
Bookmark button
Alert button
May 30, 2023
Renzhe Xu, Haotian Wang, Xingxuan Zhang, Bo Li, Peng Cui

Figure 1 for Competing for Shareable Arms in Multi-Player Multi-Armed Bandits
Figure 2 for Competing for Shareable Arms in Multi-Player Multi-Armed Bandits
Viaarxiv icon

On the Tool Manipulation Capability of Open-source Large Language Models

Add code
Bookmark button
Alert button
May 25, 2023
Qiantong Xu, Fenglu Hong, Bo Li, Changran Hu, Zhengyu Chen, Jian Zhang

Figure 1 for On the Tool Manipulation Capability of Open-source Large Language Models
Figure 2 for On the Tool Manipulation Capability of Open-source Large Language Models
Figure 3 for On the Tool Manipulation Capability of Open-source Large Language Models
Figure 4 for On the Tool Manipulation Capability of Open-source Large Language Models
Viaarxiv icon

GrowSP: Unsupervised Semantic Segmentation of 3D Point Clouds

Add code
Bookmark button
Alert button
May 25, 2023
Zihui Zhang, Bo Yang, Bing Wang, Bo Li

Figure 1 for GrowSP: Unsupervised Semantic Segmentation of 3D Point Clouds
Figure 2 for GrowSP: Unsupervised Semantic Segmentation of 3D Point Clouds
Figure 3 for GrowSP: Unsupervised Semantic Segmentation of 3D Point Clouds
Figure 4 for GrowSP: Unsupervised Semantic Segmentation of 3D Point Clouds
Viaarxiv icon

Mixture-of-Expert Conformer for Streaming Multilingual ASR

Add code
Bookmark button
Alert button
May 25, 2023
Ke Hu, Bo Li, Tara N. Sainath, Yu Zhang, Francoise Beaufays

Figure 1 for Mixture-of-Expert Conformer for Streaming Multilingual ASR
Figure 2 for Mixture-of-Expert Conformer for Streaming Multilingual ASR
Figure 3 for Mixture-of-Expert Conformer for Streaming Multilingual ASR
Figure 4 for Mixture-of-Expert Conformer for Streaming Multilingual ASR
Viaarxiv icon

Reconstructive Neuron Pruning for Backdoor Defense

Add code
Bookmark button
Alert button
May 24, 2023
Yige Li, Xixiang Lyu, Xingjun Ma, Nodens Koren, Lingjuan Lyu, Bo Li, Yu-Gang Jiang

Figure 1 for Reconstructive Neuron Pruning for Backdoor Defense
Figure 2 for Reconstructive Neuron Pruning for Backdoor Defense
Figure 3 for Reconstructive Neuron Pruning for Backdoor Defense
Figure 4 for Reconstructive Neuron Pruning for Backdoor Defense
Viaarxiv icon

Modular Domain Adaptation for Conformer-Based Streaming ASR

Add code
Bookmark button
Alert button
May 22, 2023
Qiujia Li, Bo Li, Dongseong Hwang, Tara N. Sainath, Pedro M. Mengibar

Figure 1 for Modular Domain Adaptation for Conformer-Based Streaming ASR
Figure 2 for Modular Domain Adaptation for Conformer-Based Streaming ASR
Figure 3 for Modular Domain Adaptation for Conformer-Based Streaming ASR
Figure 4 for Modular Domain Adaptation for Conformer-Based Streaming ASR
Viaarxiv icon

Can Public Large Language Models Help Private Cross-device Federated Learning?

Add code
Bookmark button
Alert button
May 20, 2023
Boxin Wang, Yibo Jacky Zhang, Yuan Cao, Bo Li, H. Brendan McMahan, Sewoong Oh, Zheng Xu, Manzil Zaheer

Figure 1 for Can Public Large Language Models Help Private Cross-device Federated Learning?
Figure 2 for Can Public Large Language Models Help Private Cross-device Federated Learning?
Figure 3 for Can Public Large Language Models Help Private Cross-device Federated Learning?
Figure 4 for Can Public Large Language Models Help Private Cross-device Federated Learning?
Viaarxiv icon

Towards Generalizable Data Protection With Transferable Unlearnable Examples

Add code
Bookmark button
Alert button
May 18, 2023
Bin Fang, Bo Li, Shuang Wu, Tianyi Zheng, Shouhong Ding, Ran Yi, Lizhuang Ma

Figure 1 for Towards Generalizable Data Protection With Transferable Unlearnable Examples
Figure 2 for Towards Generalizable Data Protection With Transferable Unlearnable Examples
Figure 3 for Towards Generalizable Data Protection With Transferable Unlearnable Examples
Figure 4 for Towards Generalizable Data Protection With Transferable Unlearnable Examples
Viaarxiv icon

Re-thinking Data Availablity Attacks Against Deep Neural Networks

Add code
Bookmark button
Alert button
May 18, 2023
Bin Fang, Bo Li, Shuang Wu, Ran Yi, Shouhong Ding, Lizhuang Ma

Figure 1 for Re-thinking Data Availablity Attacks Against Deep Neural Networks
Figure 2 for Re-thinking Data Availablity Attacks Against Deep Neural Networks
Figure 3 for Re-thinking Data Availablity Attacks Against Deep Neural Networks
Figure 4 for Re-thinking Data Availablity Attacks Against Deep Neural Networks
Viaarxiv icon

Content-based Unrestricted Adversarial Attack

Add code
Bookmark button
Alert button
May 18, 2023
Zhaoyu Chen, Bo Li, Shuang Wu, Kaixun Jiang, Shouhong Ding, Wenqiang Zhang

Figure 1 for Content-based Unrestricted Adversarial Attack
Figure 2 for Content-based Unrestricted Adversarial Attack
Figure 3 for Content-based Unrestricted Adversarial Attack
Figure 4 for Content-based Unrestricted Adversarial Attack
Viaarxiv icon