Alert button
Picture for Fan Wu

Fan Wu

Alert button

Contrastive Modules with Temporal Attention for Multi-Task Reinforcement Learning

Add code
Bookmark button
Alert button
Nov 02, 2023
Siming Lan, Rui Zhang, Qi Yi, Jiaming Guo, Shaohui Peng, Yunkai Gao, Fan Wu, Ruizhi Chen, Zidong Du, Xing Hu, Xishan Zhang, Ling Li, Yunji Chen

Figure 1 for Contrastive Modules with Temporal Attention for Multi-Task Reinforcement Learning
Figure 2 for Contrastive Modules with Temporal Attention for Multi-Task Reinforcement Learning
Figure 3 for Contrastive Modules with Temporal Attention for Multi-Task Reinforcement Learning
Figure 4 for Contrastive Modules with Temporal Attention for Multi-Task Reinforcement Learning
Viaarxiv icon

Privately Aligning Language Models with Reinforcement Learning

Add code
Bookmark button
Alert button
Oct 25, 2023
Fan Wu, Huseyin A. Inan, Arturs Backurs, Varun Chandrasekaran, Janardhan Kulkarni, Robert Sim

Viaarxiv icon

Flexible Informed Trees (FIT*): Adaptive Batch-Size Approach for Informed Sampling-Based Planner

Add code
Bookmark button
Alert button
Oct 19, 2023
Liding Zhang, Zhenshan Bing, Kejia Chen, Lingyun Chen, Fan Wu, Peter Krumbholz, Zhilin Yuan, Sami Haddadin, Alois Knoll

Viaarxiv icon

VIGC: Visual Instruction Generation and Correction

Add code
Bookmark button
Alert button
Sep 11, 2023
Bin Wang, Fan Wu, Xiao Han, Jiahui Peng, Huaping Zhong, Pan Zhang, Xiaoyi Dong, Weijia Li, Wei Li, Jiaqi Wang, Conghui He

Figure 1 for VIGC: Visual Instruction Generation and Correction
Figure 2 for VIGC: Visual Instruction Generation and Correction
Figure 3 for VIGC: Visual Instruction Generation and Correction
Figure 4 for VIGC: Visual Instruction Generation and Correction
Viaarxiv icon

Factor Graph Neural Networks

Add code
Bookmark button
Alert button
Aug 02, 2023
Zhen Zhang, Mohammed Haroon Dupty, Fan Wu, Javen Qinfeng Shi, Wee Sun Lee

Figure 1 for Factor Graph Neural Networks
Figure 2 for Factor Graph Neural Networks
Figure 3 for Factor Graph Neural Networks
Figure 4 for Factor Graph Neural Networks
Viaarxiv icon

Contact-aware Shaping and Maintenance of Deformable Linear Objects With Fixtures

Add code
Bookmark button
Alert button
Jul 19, 2023
Kejia Chen, Zhenshan Bing, Fan Wu, Yuan Meng, Andre Kraft, Sami Haddadin, Alois Knoll

Figure 1 for Contact-aware Shaping and Maintenance of Deformable Linear Objects With Fixtures
Figure 2 for Contact-aware Shaping and Maintenance of Deformable Linear Objects With Fixtures
Figure 3 for Contact-aware Shaping and Maintenance of Deformable Linear Objects With Fixtures
Figure 4 for Contact-aware Shaping and Maintenance of Deformable Linear Objects With Fixtures
Viaarxiv icon

SoK: Privacy-Preserving Data Synthesis

Add code
Bookmark button
Alert button
Jul 05, 2023
Yuzheng Hu, Fan Wu, Qinbin Li, Yunhui Long, Gonzalo Munilla Garrido, Chang Ge, Bolin Ding, David Forsyth, Bo Li, Dawn Song

Figure 1 for SoK: Privacy-Preserving Data Synthesis
Figure 2 for SoK: Privacy-Preserving Data Synthesis
Figure 3 for SoK: Privacy-Preserving Data Synthesis
Figure 4 for SoK: Privacy-Preserving Data Synthesis
Viaarxiv icon

Learning optimal controllers: a dynamical motion primitive approach

Add code
Bookmark button
Alert button
Jun 10, 2023
Hugo T. M. Kussaba, Abdalla Swikir, Fan Wu, Anastasija Demerdjieva, Gitta Kutyniok, Sami Haddadin

Viaarxiv icon

Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection

Add code
Bookmark button
Alert button
Jun 01, 2023
Mst Shapna Akter, Hossain Shahriar, Sheikh Iqbal Ahamed, Kishor Datta Gupta, Muhammad Rahman, Atef Mohamed, Mohammad Rahman, Akond Rahman, Fan Wu

Figure 1 for Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection
Figure 2 for Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection
Figure 3 for Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection
Figure 4 for Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection
Viaarxiv icon