Alert button
Picture for Chong Wang

Chong Wang

Alert button

MM1: Methods, Analysis & Insights from Multimodal LLM Pre-training

Add code
Bookmark button
Alert button
Mar 22, 2024
Brandon McKinzie, Zhe Gan, Jean-Philippe Fauconnier, Sam Dodge, Bowen Zhang, Philipp Dufter, Dhruti Shah, Xianzhi Du, Futang Peng, Floris Weers, Anton Belyi, Haotian Zhang, Karanjeet Singh, Doug Kang, Ankur Jain, Hongyu Hè, Max Schwarzer, Tom Gunter, Xiang Kong, Aonan Zhang, Jianyu Wang, Chong Wang, Nan Du, Tao Lei, Sam Wiseman, Guoli Yin, Mark Lee, Zirui Wang, Ruoming Pang, Peter Grasch, Alexander Toshev, Yinfei Yang

Figure 1 for MM1: Methods, Analysis & Insights from Multimodal LLM Pre-training
Figure 2 for MM1: Methods, Analysis & Insights from Multimodal LLM Pre-training
Figure 3 for MM1: Methods, Analysis & Insights from Multimodal LLM Pre-training
Figure 4 for MM1: Methods, Analysis & Insights from Multimodal LLM Pre-training
Viaarxiv icon

Recurrent Drafter for Fast Speculative Decoding in Large Language Models

Add code
Bookmark button
Alert button
Mar 22, 2024
Aonan Zhang, Chong Wang, Yi Wang, Xuanyu Zhang, Yunfei Cheng

Figure 1 for Recurrent Drafter for Fast Speculative Decoding in Large Language Models
Figure 2 for Recurrent Drafter for Fast Speculative Decoding in Large Language Models
Figure 3 for Recurrent Drafter for Fast Speculative Decoding in Large Language Models
Figure 4 for Recurrent Drafter for Fast Speculative Decoding in Large Language Models
Viaarxiv icon

Benchmarking Adversarial Robustness of Image Shadow Removal with Shadow-adaptive Attacks

Add code
Bookmark button
Alert button
Mar 15, 2024
Chong Wang, Yi Yu, Lanqing Guo, Bihan Wen

Figure 1 for Benchmarking Adversarial Robustness of Image Shadow Removal with Shadow-adaptive Attacks
Figure 2 for Benchmarking Adversarial Robustness of Image Shadow Removal with Shadow-adaptive Attacks
Figure 3 for Benchmarking Adversarial Robustness of Image Shadow Removal with Shadow-adaptive Attacks
Figure 4 for Benchmarking Adversarial Robustness of Image Shadow Removal with Shadow-adaptive Attacks
Viaarxiv icon

Progressive Divide-and-Conquer via Subsampling Decomposition for Accelerated MRI

Add code
Bookmark button
Alert button
Mar 15, 2024
Chong Wang, Lanqing Guo, Yufei Wang, Hao Cheng, Yi Yu, Bihan Wen

Figure 1 for Progressive Divide-and-Conquer via Subsampling Decomposition for Accelerated MRI
Figure 2 for Progressive Divide-and-Conquer via Subsampling Decomposition for Accelerated MRI
Figure 3 for Progressive Divide-and-Conquer via Subsampling Decomposition for Accelerated MRI
Figure 4 for Progressive Divide-and-Conquer via Subsampling Decomposition for Accelerated MRI
Viaarxiv icon

Learn Suspected Anomalies from Event Prompts for Video Anomaly Detection

Add code
Bookmark button
Alert button
Mar 02, 2024
Chenchen Tao, Chong Wang, Yuexian Zou, Xiaohao Peng, Jiafei Wu, Jiangbo Qian

Figure 1 for Learn Suspected Anomalies from Event Prompts for Video Anomaly Detection
Figure 2 for Learn Suspected Anomalies from Event Prompts for Video Anomaly Detection
Figure 3 for Learn Suspected Anomalies from Event Prompts for Video Anomaly Detection
Figure 4 for Learn Suspected Anomalies from Event Prompts for Video Anomaly Detection
Viaarxiv icon

Security Code Review by LLMs: A Deep Dive into Responses

Add code
Bookmark button
Alert button
Jan 29, 2024
Jiaxin Yu, Peng Liang, Yujia Fu, Amjed Tahir, Mojtaba Shahin, Chong Wang, Yangxiao Cai

Viaarxiv icon

A Prompt Learning Framework for Source Code Summarization

Add code
Bookmark button
Alert button
Dec 26, 2023
Weisong Sun, Chunrong Fang, Yudu You, Yuchen Chen, Yi Liu, Chong Wang, Jian Zhang, Quanjun Zhang, Hanwei Qian, Wei Zhao, Yang Liu, Zhenyu Chen

Viaarxiv icon